Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/nodejs-14.13.0~dfsg/benchmark/napi/function_args/binding.cc
Examining data/nodejs-14.13.0~dfsg/benchmark/napi/function_args/napi_binding.c
Examining data/nodejs-14.13.0~dfsg/benchmark/napi/function_call/binding.cc
Examining data/nodejs-14.13.0~dfsg/benchmark/napi/function_call/napi_binding.c
Examining data/nodejs-14.13.0~dfsg/benchmark/napi/ref/addon.c
Examining data/nodejs-14.13.0~dfsg/benchmark/napi/type-tag/binding.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/aix/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/android/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/cygwin/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/darwin/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/freebsd/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/linux/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/netbsd/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/openbsd/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/config/sunos/ares_config.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/include/ares.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/include/ares_build.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/include/ares_rules.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/include/ares_version.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/include/nameser.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares__close_sockets.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares__get_hostent.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares__parse_into_addrinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares__read_line.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares__readaddrinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares__sortaddrinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares__timeval.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_android.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_android.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_cancel.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_create_query.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_data.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_data.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_destroy.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_dns.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_expand_name.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_expand_string.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_fds.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_free_hostent.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_free_string.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_freeaddrinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getenv.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getenv.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getopt.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getopt.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getsock.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_inet_net_pton.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_iphlpapi.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_ipv6.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_library_init.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_library_init.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_llist.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_llist.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_mkquery.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_nowarn.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_nowarn.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_a_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_aaaa_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_mx_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_naptr_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_ns_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_ptr_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_soa_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_srv_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_txt_reply.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_platform.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_platform.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_private.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_query.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_send.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_setup.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strcasecmp.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strcasecmp.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strdup.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strdup.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strerror.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strsplit.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strsplit.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_timeout.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_version.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_writev.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/ares_writev.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/bitncmp.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/bitncmp.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/config-win32.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/inet_net_pton.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/setup_once.h
Examining data/nodejs-14.13.0~dfsg/deps/cares/src/windows_port.c
Examining data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c
Examining data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.h
Examining data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_tests.h
Examining data/nodejs-14.13.0~dfsg/deps/llhttp/include/llhttp.h
Examining data/nodejs-14.13.0~dfsg/deps/llhttp/src/api.c
Examining data/nodejs-14.13.0~dfsg/deps/llhttp/src/http.c
Examining data/nodejs-14.13.0~dfsg/deps/llhttp/src/llhttp.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/includes/config.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/includes/nghttp2/nghttp2.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/includes/nghttp2/nghttp2ver.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_buf.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_buf.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_callbacks.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_callbacks.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_debug.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_debug.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_frame.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_frame.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_hd.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_hd.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_hd_huffman.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_hd_huffman.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_hd_huffman_data.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_helper.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_helper.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_http.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_http.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_int.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_map.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_map.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_mem.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_mem.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_net.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_npn.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_npn.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_option.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_option.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_outbound_item.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_outbound_item.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_pq.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_pq.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_priority_spec.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_priority_spec.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_queue.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_queue.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_rcbuf.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_rcbuf.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_session.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_session.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_stream.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_stream.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_submit.c
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_submit.h
Examining data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_version.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/BSD-x86_64/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN32/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64-ARM/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64-ARM/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64-ARM/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64-ARM/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64-ARM/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/VC-WIN64A/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix-gcc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/aix64-gcc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin-i386-cc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/darwin64-x86_64-cc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-aarch64/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-armv4/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-elf/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-ppc64le/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x32/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux-x86_64/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux32-s390x/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-mips64/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/linux64-s390x/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris-x86-gcc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm_avx2/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm_avx2/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm_avx2/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm_avx2/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/asm_avx2/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/no-asm/crypto/buildinf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/no-asm/crypto/include/internal/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/no-asm/crypto/include/internal/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/no-asm/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/archs/solaris64-x86_64-gcc/no-asm/include/progs.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/bn_conf_asm.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/bn_conf_no-asm.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/dso_conf_asm.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/dso_conf_no-asm.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/opensslconf_asm.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/config/opensslconf_no-asm.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/app_rand.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/asn1pars.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/bf_prefix.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ciphers.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/cms.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/crl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/crl2p7.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/dhparam.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/dsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/dsaparam.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ec.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ecparam.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/errstr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/gendsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/genpkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/genrsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/nseq.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkcs12.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkcs7.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkcs8.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkeyparam.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkeyutl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/prime.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rand.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rsautl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_apps.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_cb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_socket.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_time.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/sess_id.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/smime.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/spkac.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/srp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/storeutl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/testdsa.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/testrsa.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/timeouts.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ts.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/verify.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/version.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_decc_init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/win32_init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/x509.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_nyi.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_unix.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win32.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_wince.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_cbc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_cfb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_misc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ofb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_wrap.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_x86core.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/arm_arch.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/armcap.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_bitstr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_d2i_fp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_digest.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_dup.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_gentm.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_i2d_fp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_int.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_mbstr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_object.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_octet.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_print.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strex.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strnid.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_time.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_type.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_utctm.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_utf8.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_verify.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/ameth_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_gen.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_item_list.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_item_list.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_par.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_moid.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mstbl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_pack.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/bio_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/bio_ndef.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/charmap.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/d2i_pr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/d2i_pu.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/evp_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/f_int.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/f_string.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/i2d_pr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/i2d_pu.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/n_pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/nsseq.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_pbe.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_pbev2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_scrypt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p8_pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/standard_methods.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/t_bitst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/t_pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/t_spki.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_dec.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_fre.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_new.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_scn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_typ.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_utl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tbl_standard.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_algor.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_bignum.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_info.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_int64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_long.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_sig.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_spki.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_val.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/arch/async_null.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/arch/async_null.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/arch/async_posix.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/arch/async_posix.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/arch/async_win.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/arch/async_win.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/async.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/async_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/async_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/async_wait.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_cfb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_ofb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_pi.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_skey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_dump.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_sock.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_sock2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_lbuf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_nbio.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_null.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_cb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_meth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_acpt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_bio.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_conn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_fd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_file.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_mem.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_null.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_sock.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2_impl.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2b.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2s.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/m_blake2b.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/m_blake2s.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/asm/x86_64-gcc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_add.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_asm.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_blind.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_const.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_ctx.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_depr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_dh.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_div.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_exp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_exp2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_gcd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_gf2m.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_intern.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_kron.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_mod.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_mont.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_mpi.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_mul.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_nist.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_prime.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_prime.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_print.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_rand.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_recp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_shift.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_sqr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_sqrt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_srp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_word.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_x931p.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/rsaz_exp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/rsaz_exp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/buffer/buf_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/buffer/buffer.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/camellia.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_cbc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_cfb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_ctr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_misc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_ofb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/c_cfb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/c_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/c_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/c_ofb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/c_skey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/cast_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/cast_s.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/chacha/chacha_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cm_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cm_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_att.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_cd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_dd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_env.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_ess.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_io.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_kari.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_pwri.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_sd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_smime.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/comp/c_zlib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/comp/comp_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/comp/comp_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/comp/comp_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_api.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_mall.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_mod.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_sap.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_ssl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cpt_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_b64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_log.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_oct.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_policy.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_sct.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_sct_ctx.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_vfy.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_x509v3.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ctype.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cversion.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/cbc_cksm.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/cbc_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/cfb64ede.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/cfb64enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/cfb_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/des_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/des_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/ecb3_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/ecb_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt_b.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/ncbc_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/ofb64ede.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/ofb64enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/ofb_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/pcbc_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/qud_cksm.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/rand_key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/set_key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/spr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/str2key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/xcbc_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_check.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_depr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_gen.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_kdf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_meth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_rfc5114.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_rfc7919.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dllmain.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_depr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_meth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_ossl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_vrf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_openssl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ebcdic.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/arch_32/arch_intrinsics.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/arch_32/f_impl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/arch_32/f_impl.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/curve448.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/curve448_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/curve448_tables.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/curve448utils.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/ed448.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/eddsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/f_generic.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/field.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/point_448.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/scalar.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/word.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec2_oct.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec2_smpl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_check.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_cvt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_kmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_mult.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_oct.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_print.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdh_kdf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdh_ossl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdsa_ossl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdsa_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdsa_vrf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/eck_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_mont.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nist.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp224.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp521.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistputil.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256_table.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_oct.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_smpl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecx_meth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_all.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_cnf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_ctrl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_devcrypto.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_dyn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_fat.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_list.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_openssl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_rdrand.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_table.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_asnmth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_cipher.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_dh.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_digest.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_dsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_eckey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_pkmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_rand.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_rsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err_all.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/openssl.ec
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_md.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_alld.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/cmeth_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/digest.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_bf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_camellia.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_cast.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_idea.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_null.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_old.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc4.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc4_hmac_md5.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc5.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_seed.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_sm4.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_xcbc_d.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_cnf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_pbe.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_md2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_md4.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_md5.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_md5_sha1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_mdc2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_null.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_ripemd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sigver.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_wp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/names.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_dec.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_open.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_seal.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_verify.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/pbe_scrypt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/pmeth_fn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/pmeth_gn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/pmeth_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ex_data.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/getenv.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hm_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hm_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/idea/i_cbc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/idea/i_cfb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/idea/i_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/idea/i_ofb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/idea/i_skey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/idea/idea_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/hkdf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/kdf_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/scrypt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/tls1_prf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/lhash/lh_stats.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/lhash/lhash.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/lhash/lhash_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_one.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md4/md4_dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md4/md4_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md4/md4_one.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md5/md5_dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md5/md5_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md5/md5_one.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2_one.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_clr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_dbg.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_sec.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mips_arch.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ccm128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/modes_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ofb128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_dir.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fips.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_str.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_time.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/o_names.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_xref.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_xref.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_asn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_cl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_ext.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_ht.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_srv.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_vfy.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/v3_ocsp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_all.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_info.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_oth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_pk8.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_pkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_x509.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_xaux.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_add.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_asn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_attr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_crpt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_crt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_decr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_key.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_kiss.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_mutl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_npas.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_p8d.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_p8e.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_sbag.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_utl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/pk12err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/bio_pk7.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_attr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_mime.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_smime.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pkcs7err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_base2_44.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_ieee754.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppc_arch.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_ctr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_egd.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_vms.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_win.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2_cbc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2_skey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2cfb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2ofb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc4/rc4_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc4/rc4_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc4/rc4_skey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc5/rc5_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc5/rc5_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc5/rc5_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc5/rc5_skey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc5/rc5cfb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc5/rc5ofb64.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ripemd/rmd_dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ripemd/rmd_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ripemd/rmd_one.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ripemd/rmdconst.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_chk.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_crpt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_depr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_gen.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_meth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_mp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_none.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_oaep.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_ossl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pk1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pss.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_saos.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_ssl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_x931.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_x931g.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/s390x_arch.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/s390xcap.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cbc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cfb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_ecb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_ofb.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/keccak1600.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha1_one.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha1dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha256.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha512.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash_ameth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm2/sm2_crypt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm2/sm2_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm2/sm2_pmeth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm2/sm2_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm3/m_sm3.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm3/sm3.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm3/sm3_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm4/sm4.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sparc_arch.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sparcv9cap.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/stack/stack.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_register.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_strings.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/threads_none.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/threads_pthread.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/threads_win.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_conf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_req_print.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_req_utils.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_print.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_sign.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_utils.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_verify_ctx.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/txt_db/txt_db.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_null.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_util.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/uid.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/vms_rms.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_block.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_dgst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/by_dir.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/by_file.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/t_crl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/t_req.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/t_x509.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_att.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_cmp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_d2.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_def.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_ext.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_lu.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_meth.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_obj.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_r2x.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_req.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_set.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_trs.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_txt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_v3.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_vfy.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_vpm.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509cset.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509name.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509rset.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509spki.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509type.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_all.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_attrib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_crl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_exten.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_name.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_pubkey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_req.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_x509.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_x509a.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/ext_dat.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/pcy_cache.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/pcy_data.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/pcy_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/pcy_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/pcy_map.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/pcy_node.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/pcy_tree.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/standard_exts.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_admis.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_admis.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_akey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_akeya.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_alt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_asid.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_bcons.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_bitst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_conf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_cpols.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_crld.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_enum.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_extku.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_genn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_ia5.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_info.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_int.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_ncons.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pci.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pcia.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pcons.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pku.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pmaps.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_prn.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_purp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_skey.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_sxnet.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_tlsf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/e_os.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.ec
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg_err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.ec
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi_err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_dasync.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_dasync.ec
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_dasync_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_dasync_err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest.ec
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest_err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/asn1parse.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/bignum.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/bndiv.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/client.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/cms.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/conf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/crl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/ct.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/driver.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/fuzzer.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/server.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/test-corpus.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/x509.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/__DECC_INCLUDE_EPILOGUE.H
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/__DECC_INCLUDE_PROLOGUE.H
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/aria.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/asn1.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/async.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/bn.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/bn_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/bn_dh.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/bn_srp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/chacha.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/cryptlib.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/ctype.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/dso_conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/ec.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/engine.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/evp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/lhash.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/md32_common.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/objects.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/poly1305.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/rand.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/sha.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/siphash.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/sm2.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/sm2err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/sm3.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/sm4.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/store.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/x509.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/__DECC_INCLUDE_EPILOGUE.H
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/__DECC_INCLUDE_PROLOGUE.H
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/bio.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/comp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/constant_time.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/cryptlib.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dso.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dsoerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/nelem.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/numbers.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/o_dir.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/o_str.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/refcount.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/sockets.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/sslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/thread_once.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/tsan_assist.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/__DECC_INCLUDE_EPILOGUE.H
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/__DECC_INCLUDE_PROLOGUE.H
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/aes.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/asn1.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/asn1_mac.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/asn1err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/asn1t.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/async.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/asyncerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/bio.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/bioerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/blowfish.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/bn.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/bnerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/buffer.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/buffererr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/camellia.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/cast.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/cmac.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/cms.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/cmserr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/comp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/comperr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/conf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/conf_api.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/conferr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/crypto.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/cryptoerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ct.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/cterr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/des.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/dh.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/dherr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/dsa.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/dsaerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/dtls1.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/e_os2.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ebcdic.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ec.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ecdh.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ecdsa.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ecerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/engine.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/engineerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evperr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/hmac.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/idea.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/kdf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/kdferr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/lhash.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/md2.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/md4.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/md5.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/mdc2.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/obj_mac.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/objects.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/objectserr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ocsp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ocsperr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/opensslconf.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/opensslv.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ossl_typ.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/pem.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/pem2.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/pemerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/pkcs12.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/pkcs12err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/pkcs7.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/pkcs7err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/rand.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/rand_drbg.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/randerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/rc2.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/rc4.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/rc5.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ripemd.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/rsa.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/rsaerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/safestack.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/sha.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/srp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/srtp.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ssl.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ssl2.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ssl3.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/sslerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/stack.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/store.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/storeerr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/symhacks.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/tls1.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ts.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/tserr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/txt_db.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ui.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/uierr.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/whrlpool.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/x509.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/x509_vfy.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/x509err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/x509v3.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/x509v3err.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/applink.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/os-dep/haiku.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/bio_ssl.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_msg.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_srtp.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/methods.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/packet.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/packet_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/pqueue.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/dtls1_bitmap.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_s3.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_buffer.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record_tls13.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_msg.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_asn1.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert_table.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_ciph.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_conf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_err.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_init.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_mcnf.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_sess.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_stat.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_txt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_utst.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_cust.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_srvr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_local.h
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_trce.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c
Examining data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls_srp.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/aix.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/android-ifaddrs.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/bsd.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/darwin.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/errno.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/linux.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/os390.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/posix.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/stdint-msvc2008.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/sunos.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/threadpool.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/tree.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/unix.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/version.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/include/uv/win.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/fs-poll.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/heap-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/idna.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/idna.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/queue.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/random.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/strscpy.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/strscpy.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/threadpool.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/timer.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix-common.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/async.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/atomic-ops.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/bsd-ifaddrs.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/bsd-proctitle.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/cygwin.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin-proctitle.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin-stub.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/dl.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/freebsd.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getnameinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/haiku.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/internal.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/kqueue.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-inotify.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-syscalls.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-syscalls.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/loop-watcher.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/loop.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/netbsd.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/no-fsevents.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/no-proctitle.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/openbsd.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/pipe.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/poll.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/posix-hrtime.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/posix-poll.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/process.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/procfs-exepath.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/pthread-fixes.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/qnx.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/random-devurandom.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/random-getentropy.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/random-getrandom.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/random-sysctl-linux.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/signal.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/spinlock.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/stream.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sunos.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sysinfo-loadavg.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sysinfo-memory.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/tcp.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/thread.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/tty.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/unix/udp.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/uv-data-getter-setters.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/version.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/async.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/atomicops-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/core.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/detect-wakeup.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/dl.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/error.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-fd-hash-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/getnameinfo.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/handle-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/handle.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/internal.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/loop-watcher.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/poll.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/process-stdio.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/req-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/signal.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/snprintf.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/stream-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/stream.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/tcp.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/thread.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/tty.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/udp.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/winapi.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/winapi.h
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/winsock.c
Examining data/nodejs-14.13.0~dfsg/deps/uv/src/win/winsock.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/include/uvwasi.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/include/wasi_serdes.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/include/wasi_types.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/clocks.c
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/clocks.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/debug.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/fd_table.c
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/fd_table.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/poll_oneoff.c
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/poll_oneoff.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uv_mapping.c
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uv_mapping.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi_alloc.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/wasi_rights.c
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/wasi_rights.h
Examining data/nodejs-14.13.0~dfsg/deps/uvwasi/src/wasi_serdes.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/base/trace_event/common/trace_event_common.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/allocation.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/common.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/custom-space.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/garbage-collected.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/accessors.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/api-constants.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/compiler-specific.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/finalizer-trait.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/gc-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/logging.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/persistent-node.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/pointer-policies.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/internal/prefinalizer-handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/liveness-broker.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/macros.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/member.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/persistent.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/platform.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/prefinalizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/source-location.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/trace-trait.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/type-traits.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/cppgc/visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/libplatform/libplatform-export.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/libplatform/libplatform.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/libplatform/v8-tracing.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-fast-api-calls.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-inspector-protocol.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-inspector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-internal.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-platform.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-profiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-util.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-value-serializer-version.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-version-string.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-version.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-wasm-trap-handler-posix.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8-wasm-trap-handler-win.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/include/v8config.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api-arguments-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api-arguments.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api-arguments.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api-natives.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api-natives.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-js.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-js.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-names.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-parser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-parser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-scanner.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-scanner.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-types.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/asmjs/asm-types.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-function-literal-id-reindexer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-function-literal-id-reindexer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-source-ranges.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-traversal-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-value-factory.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-value-factory.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/modules.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/modules.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/prettyprinter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/prettyprinter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/scopes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/scopes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/source-range-ast-visitor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/source-range-ast-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/variables.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ast/variables.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/address-region.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/atomic-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/atomicops.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/atomicops_internals_atomicword_compat.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/atomicops_internals_portable.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/atomicops_internals_std.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/base-export.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/bit-field.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/bits-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/bits.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/bits.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounds.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/build_config.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/compiler-specific.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_android.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_fuchsia.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_posix.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_win.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/division-by-constant.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/division-by-constant.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/enum-set.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/export-template.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/file-utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/file-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/flags.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/free_deleter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/functional.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/functional.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/hashmap-entry.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/hashmap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/ieee754.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/ieee754.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/lazy-instance.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/logging.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/logging.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/lsan.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/macros.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/memory.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/once.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/once.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/optional.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/overflowing-math.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/condition-variable.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/condition-variable.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/elapsed-timer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/mutex.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/mutex.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-freebsd.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-macos.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix-time.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix-time.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-qnx.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-solaris.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/semaphore.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/semaphore.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/time.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/time.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/qnx-math.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/region-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/region-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/ring-buffer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/safe_conversions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/safe_conversions_impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/small-vector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/sys-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/sys-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/template-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/threaded-list.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/timezone-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/type-traits.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/ubsan.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/utils/random-number-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/utils/random-number-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/v8-fallthrough.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/vlq-base64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/vlq-base64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/win32-headers.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/accessors.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/accessors.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/arm/builtins-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/arm64/builtins-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-api.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-array-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-array-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-array.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-arraybuffer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-async-function-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-async-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-async-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-async-generator-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-async-iterator-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-async-module.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-bigint-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-bigint-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-bigint.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-call-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-call-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-call.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-callsite.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-collections-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-collections-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-collections.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-console.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-constructor-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-constructor-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-constructor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-conversion-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-data-view-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-dataview.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-date-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-date.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-debug-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-definitions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-descriptors.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-error.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-function-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-function.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-generator-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-global-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-global.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-handler-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-ic-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-internal-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-internal.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-interpreter-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-intl-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-intl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-iterator-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-iterator-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-json.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-lazy-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-lazy-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-microtask-queue-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-number-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-number.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-object-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-object-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-object.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-promise-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-promise-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-promise.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-proxy-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-proxy-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-reflect.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-regexp-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-regexp-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-regexp.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-sharedarraybuffer-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-sharedarraybuffer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-string-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-string-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-string.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-symbol.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-trace.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-typed-array-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-typed-array-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-typed-array.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-utils-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-utils-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-wasm-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-wasm-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-weak-refs.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/constants-table-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/constants-table-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/generate-bytecodes-builtins-list.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/growable-fixed-array-gen.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/growable-fixed-array-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/mips/builtins-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/mips64/builtins-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ppc/builtins-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/s390/builtins-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/setup-builtins-internal.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/assembler-arm-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/assembler-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/assembler-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/constants-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/constants-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/cpu-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/interface-descriptors-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/macro-assembler-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/macro-assembler-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm/register-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/assembler-arm64-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/assembler-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/assembler-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/constants-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/cpu-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/decoder-arm64-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/decoder-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/decoder-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/instructions-arm64-constants.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/instructions-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/instructions-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/interface-descriptors-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/macro-assembler-arm64-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/macro-assembler-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/macro-assembler-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/register-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/register-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/utils-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/utils-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/assembler-arch.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/assembler-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/bailout-reason.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/bailout-reason.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/callable.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-comments.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-comments.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-desc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-desc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-factory.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-factory.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-reference.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-reference.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-stub-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-stub-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/compilation-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/compilation-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/compiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constant-pool.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constant-pool.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constants-arch.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/cpu-features.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference-encoder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference-encoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/flush-instruction-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/flush-instruction-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/handler-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/handler-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/assembler-ia32-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/assembler-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/assembler-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/constants-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/cpu-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/interface-descriptors-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/register-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/sse-instr.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/interface-descriptors.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/interface-descriptors.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/label.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/machine-type.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/machine-type.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/macro-assembler-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/macro-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/assembler-mips-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/assembler-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/assembler-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/constants-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/cpu-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/interface-descriptors-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/macro-assembler-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/macro-assembler-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/register-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/constants-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/assembler-mips64-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/assembler-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/assembler-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/constants-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/constants-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/cpu-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/interface-descriptors-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/macro-assembler-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/macro-assembler-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/register-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/optimized-compilation-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/optimized-compilation-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/pending-optimization-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/pending-optimization-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/constants-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/constants-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/cpu-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/interface-descriptors-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/macro-assembler-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/macro-assembler-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/register-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/register-arch.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/register-configuration.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/register-configuration.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/register.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/register.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/reglist.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/reloc-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/reloc-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/assembler-s390-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/assembler-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/assembler-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/constants-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/constants-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/cpu-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/interface-descriptors-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/macro-assembler-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/macro-assembler-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/register-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/safepoint-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/safepoint-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/signature.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/source-position-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/source-position-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/source-position.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/source-position.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/string-constants.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/string-constants.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/tick-counter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/tick-counter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/tnode.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/tnode.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/turbo-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/turbo-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/unoptimized-compilation-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/unoptimized-compilation-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/assembler-x64-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/assembler-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/assembler-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/constants-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/cpu-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/fma-instr.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/interface-descriptors-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/register-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/sse-instr.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/assert-scope.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/assert-scope.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/checks.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/external-pointer-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/external-pointer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/message-template.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/ptr-compr-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/ptr-compr.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/common/globals.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler-dispatcher/compiler-dispatcher.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler-dispatcher/compiler-dispatcher.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler-dispatcher/optimizing-compile-dispatcher.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler-dispatcher/optimizing-compile-dispatcher.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/add-type-assertions-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/add-type-assertions-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/all-nodes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/all-nodes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm/code-generator-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm/instruction-codes-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm/instruction-scheduler-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm/instruction-selector-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm/unwinding-info-writer-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm/unwinding-info-writer-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm64/code-generator-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm64/instruction-codes-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm64/instruction-scheduler-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm64/instruction-selector-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm64/unwinding-info-writer-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/arm64/unwinding-info-writer-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/code-generator-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/code-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/code-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/frame-elider.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/frame-elider.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/gap-resolver.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/gap-resolver.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ia32/code-generator-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ia32/instruction-codes-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ia32/instruction-scheduler-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ia32/instruction-selector-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction-codes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction-scheduler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction-scheduler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction-selector-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction-selector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/jump-threading.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/jump-threading.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/live-range-separator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/live-range-separator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips/code-generator-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips/instruction-codes-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips/instruction-scheduler-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips/instruction-selector-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips64/code-generator-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips64/instruction-codes-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips64/instruction-scheduler-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/mips64/instruction-selector-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/move-optimizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/move-optimizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ppc/instruction-codes-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ppc/instruction-scheduler-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ppc/instruction-selector-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ppc/unwinding-info-writer-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ppc/unwinding-info-writer-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ppc/code-generator-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/register-allocator-verifier.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/register-allocator-verifier.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/register-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/register-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/s390/code-generator-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/s390/instruction-codes-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/s390/instruction-scheduler-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/s390/instruction-selector-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/s390/unwinding-info-writer-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/s390/unwinding-info-writer-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/unwinding-info-writer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/instruction-codes-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/instruction-scheduler-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/instruction-selector-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/unwinding-info-writer-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/unwinding-info-writer-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction-selector.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/basic-block-instrumentor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/basic-block-instrumentor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/branch-elimination.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/branch-elimination.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/bytecode-analysis.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/bytecode-analysis.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/bytecode-graph-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/bytecode-graph-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/bytecode-liveness-map.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/bytecode-liveness-map.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/c-linkage.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/checkpoint-elimination.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/checkpoint-elimination.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/code-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/code-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/common-node-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/common-node-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/common-operator-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/common-operator-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/common-operator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/common-operator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/compilation-dependencies.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/compilation-dependencies.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/compilation-dependency.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/compiler-source-position-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/compiler-source-position-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/constant-folding-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/constant-folding-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/control-equivalence.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/control-equivalence.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/control-flow-optimizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/control-flow-optimizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/dead-code-elimination.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/dead-code-elimination.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/decompression-optimizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/decompression-optimizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/diamond.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/feedback-source.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/feedback-source.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/frame-states.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/frame-states.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/frame.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/frame.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/functional-list.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/globals.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-trimmer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-trimmer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-visualizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-visualizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/heap-refs.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/int64-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/int64-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-generic-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-generic-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-graph.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-graph.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-heap-broker.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-heap-broker.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-heap-copy-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-heap-copy-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-inlining-heuristic.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-inlining-heuristic.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-inlining.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-inlining.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-intrinsic-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-intrinsic-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-native-context-specialization.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-native-context-specialization.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-type-hint-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-type-hint-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-typed-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-typed-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/linkage.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/linkage.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/loop-analysis.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/loop-analysis.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/loop-peeling.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/loop-peeling.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/loop-variable-optimizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/loop-variable-optimizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-graph-verifier.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-graph-verifier.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-graph.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-graph.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-operator-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-operator-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-operator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/machine-operator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/map-inference.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/map-inference.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-optimizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-optimizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-aux-data.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-marker.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-marker.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-matchers.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-matchers.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-origin-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-origin-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-properties.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-properties.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/opcodes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/opcodes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/operation-typer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/operation-typer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/operator-properties.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/operator-properties.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/operator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/operator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/osr.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/osr.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/per-isolate-compiler-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/persistent-map.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/pipeline-statistics.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/pipeline-statistics.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/pipeline.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/pipeline.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/processed-feedback.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/property-access-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/property-access-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/raw-machine-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/raw-machine-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/redundancy-elimination.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/redundancy-elimination.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/refs-map.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/refs-map.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/representation-change.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/representation-change.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/schedule.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/schedule.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/scheduled-machine-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/scheduled-machine-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/scheduler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/scheduler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/select-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/select-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/serializer-for-background-compilation.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/serializer-for-background-compilation.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/serializer-hints.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simd-scalar-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simd-scalar-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/state-values-utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/state-values-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/type-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/type-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/type-narrowing-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/type-narrowing-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typed-optimization.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typed-optimization.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/types.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/types.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/value-numbering-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/value-numbering-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/verifier.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/verifier.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/write-barrier-kind.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/zone-stats.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/zone-stats.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/async-hooks-wrapper.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/async-hooks-wrapper.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-console.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-console.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-js.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-platforms.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-platforms.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-windows.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/date/date.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/date/date.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/date/dateparser-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/date/dateparser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/date/dateparser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/arm/debug-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/arm64/debug-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-coverage.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-coverage.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-evaluate.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-evaluate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-frames.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-frames.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-interface.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-property-iterator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-property-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-scope-iterator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-scope-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-scopes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-scopes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-stack-trace-iterator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-stack-trace-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-type-profile.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug-type-profile.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/debug.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/ia32/debug-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/interface-types.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/liveedit.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/liveedit.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/mips/debug-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/mips64/debug-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/ppc/debug-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/s390/debug-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-remote-util.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-remote-util.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-server-thread.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-server-thread.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-server.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-server.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/packet.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/packet.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/session.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/session.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/transport.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/transport.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/wasm-module-debug.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/wasm-module-debug.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/debug/x64/debug-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/arm/deoptimizer-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/arm64/deoptimizer-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/deoptimize-reason.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/deoptimize-reason.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/deoptimizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/deoptimizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/ia32/deoptimizer-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/mips/deoptimizer-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/mips64/deoptimizer-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/ppc/deoptimizer-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/s390/deoptimizer-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/deoptimizer/x64/deoptimizer-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm/disasm-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm/eh-frame-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/eh-frame-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/basic-block-profiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/basic-block-profiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/code-tracer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/compilation-statistics.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/compilation-statistics.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/disasm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/disassembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/disassembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/eh-frame.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/eh-frame.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/ia32/disasm-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/mips/disasm-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/mips64/disasm-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/objects-debug.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/objects-printer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/perf-jit.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/perf-jit.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/ppc/disasm-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/ppc/eh-frame-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/s390/disasm-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/s390/eh-frame-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/unwinder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/unwinding-info-win64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/unwinding-info-win64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/x64/disasm-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/x64/eh-frame-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arguments-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arguments.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arguments.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/frame-constants-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/frame-constants-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/frame-constants-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/frame-constants-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/pointer-auth-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/pointer-authentication-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-logic-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/execution.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/execution.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/frame-constants.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/frames-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/frames.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/frames.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/futex-emulation.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/futex-emulation.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ia32/frame-constants-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ia32/frame-constants-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/interrupts-scope.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/interrupts-scope.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate-data.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate-utils-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/messages.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/messages.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/microtask-queue.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/microtask-queue.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/frame-constants-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/frame-constants-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/frame-constants-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/frame-constants-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/off-thread-isolate-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/off-thread-isolate.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/off-thread-isolate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/pointer-authentication-dummy.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/pointer-authentication.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/frame-constants-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/frame-constants-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/protectors-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/protectors.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/protectors.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/runtime-profiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/runtime-profiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/frame-constants-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/frame-constants-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/simulator-base.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/simulator-base.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/thread-id.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/thread-id.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/thread-local-top.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/thread-local-top.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/v8threads.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/v8threads.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/vm-state-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/vm-state.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/x64/frame-constants-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/x64/frame-constants-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/execution/simulator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/cputracemark-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/cputracemark-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/externalize-string-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/externalize-string-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/gc-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/gc-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/ignition-statistics-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/ignition-statistics-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/statistics-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/statistics-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/trigger-failure-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/trigger-failure-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/vtunedomain-support-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/vtunedomain-support-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/flags/flag-definitions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/flags/flags.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/flags/flags.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/global-handles.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/global-handles.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/handles-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/handles.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/handles.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/local-handles-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/local-handles.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/local-handles.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/maybe-handles-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/maybe-handles.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/persistent-handles.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/handles/persistent-handles.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/array-buffer-collector.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/array-buffer-collector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/array-buffer-sweeper.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/array-buffer-sweeper.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/array-buffer-tracker-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/array-buffer-tracker.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/array-buffer-tracker.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/barrier.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/basic-memory-chunk.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/basic-memory-chunk.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/code-stats.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/code-stats.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/combined-heap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/combined-heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/concurrent-allocator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/concurrent-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/concurrent-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/concurrent-marking.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/concurrent-marking.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/allocation.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/arm/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/arm64/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/ia32/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/mips/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/mips64/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/ppc/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/s390/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/asm/x64/push_registers_asm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/free-list.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/free-list.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/gc-info-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/gc-info-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/gc-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/globals.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-object-header-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-object-header.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-object-header.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-page.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-page.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-space.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-space.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/liveness-broker.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/logging.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/marker.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/marker.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/marking-visitor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/marking-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/object-allocator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/object-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/object-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/object-start-bitmap-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/object-start-bitmap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/page-memory-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/page-memory.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/page-memory.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/persistent-node.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/platform.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/pointer-policies.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/prefinalizer-handler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/prefinalizer-handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/raw-heap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/raw-heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/sanitizers.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/source-location.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/stack.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/stack.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/sweeper.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/sweeper.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/worklist.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/embedder-tracing.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/embedder-tracing.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory-base-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory-base.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory-base.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/finalization-registry-cleanup-task.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/finalization-registry-cleanup-task.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/gc-idle-time-handler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/gc-idle-time-handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/gc-tracer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/gc-tracer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap-controller.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap-controller.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap-write-barrier-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap-write-barrier.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/incremental-marking-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/incremental-marking-job.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/incremental-marking-job.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/incremental-marking.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/incremental-marking.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/invalidated-slots-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/invalidated-slots.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/invalidated-slots.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/item-parallel-job.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/item-parallel-job.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/large-spaces.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/large-spaces.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/list.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/local-allocator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/local-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/local-heap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/local-heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/mark-compact-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/mark-compact.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/mark-compact.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/marking-visitor-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/marking-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/marking-worklist.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/marking-worklist.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/marking.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/marking.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-chunk-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-chunk.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-chunk.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-measurement-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-measurement.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-measurement.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-reducer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/memory-reducer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/object-stats.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/object-stats.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/objects-visiting-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/objects-visiting.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/objects-visiting.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/off-thread-factory-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/off-thread-factory.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/off-thread-factory.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/off-thread-heap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/off-thread-heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-heap-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-heap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-heap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-spaces.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-spaces.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/remembered-set-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/safepoint.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/safepoint.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/scavenge-job.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/scavenge-job.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/scavenger-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/scavenger.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/scavenger.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/setup-heap-internal.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/slot-set.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/slot-set.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/spaces-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/spaces.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/spaces.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/stress-marking-observer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/stress-marking-observer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/stress-scavenge-observer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/stress-scavenge-observer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/sweeper.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/sweeper.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/third-party/heap-api-stub.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/third-party/heap-api.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/heap/worklist.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/accessor-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/accessor-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/binary-op-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/binary-op-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/call-optimization.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/call-optimization.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/handler-configuration-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/handler-configuration.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/handler-configuration.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/ic-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/ic-stats.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/ic-stats.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/ic.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/ic.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/keyed-store-generic.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/keyed-store-generic.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/stub-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/ic/stub-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/bootstrapper.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/bootstrapper.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/heap-symbols.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/icu_util.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/icu_util.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/isolate-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/isolate-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/setup-isolate-deserialize.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/setup-isolate-full.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/setup-isolate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/startup-data-util.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/startup-data-util.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/v8.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/init/v8.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/custom-preview.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/custom-preview.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/injected-script.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/injected-script.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/inspected-context.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/inspected-context.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/remote-object-id.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/remote-object-id.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/search-util.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/search-util.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-util.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-util.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/test-interface.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/test-interface.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-console-agent-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-console-agent-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-console-message.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-console-message.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-console.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-console.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger-agent-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger-agent-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger-script.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger-script.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-heap-profiler-agent-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-heap-profiler-agent-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-inspector-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-inspector-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-inspector-session-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-inspector-session-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-profiler-agent-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-profiler-agent-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-regex.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-regex.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-runtime-agent-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-runtime-agent-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-schema-agent-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-schema-agent-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-stack-trace-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-stack-trace-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-string-conversions.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-string-conversions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-value-utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-value-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/value-mirror.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/value-mirror.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/block-coverage-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-accessor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-accessor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-iterator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-random-iterator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-random-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-writer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-array-writer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-decoder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-decoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-flags.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-flags.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-jump-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-label.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-label.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-node.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-node.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-operands.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-operands.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-register-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-register-optimizer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-register-optimizer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-register.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-register.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-source-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-source-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecode-traits.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecodes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/bytecodes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/constant-array-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/constant-array-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/control-flow-builders.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/control-flow-builders.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/handler-table-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/handler-table-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-intrinsics-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-intrinsics-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-intrinsics.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter-intrinsics.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/interpreter/interpreter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/json/json-parser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/json/json-parser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/json/json-stringifier.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/json/json-stringifier.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-foreground-task-runner.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-foreground-task-runner.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-job.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-job.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-platform.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-platform.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-worker-threads-task-runner.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/default-worker-threads-task-runner.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/delayed-task-queue.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/delayed-task-queue.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/task-queue.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/task-queue.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-buffer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-buffer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-config.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-event-listener.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-event-listener.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-object.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-writer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-writer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/tracing-controller.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/worker-thread.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/worker-thread.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libsampler/sampler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/libsampler/sampler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/code-events.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/counters-definitions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/counters-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/counters.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/counters.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log-utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/logging/off-thread-logger.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/bignum-dtoa.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/bignum-dtoa.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/bignum.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/bignum.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/cached-powers.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/cached-powers.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/diy-fp.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/diy-fp.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/double.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/dtoa.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/dtoa.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/fast-dtoa.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/fast-dtoa.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/fixed-dtoa.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/fixed-dtoa.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/hash-seed-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/math-random.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/math-random.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/strtod.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/strtod.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/allocation-site-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/allocation-site-scopes-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/allocation-site-scopes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/allocation-site.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/api-callbacks-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/api-callbacks.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/arguments-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/arguments.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/backing-store.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/backing-store.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/bigint.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/bigint.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/cell-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/cell.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/class-definitions-tq-deps-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/code-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/code.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/code.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/compilation-cache-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/compilation-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/compressed-slots-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/compressed-slots.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/contexts-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/contexts.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/contexts.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/data-handler-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/data-handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/debug-objects-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/debug-objects.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/debug-objects.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/descriptor-array-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/descriptor-array.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/dictionary-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/dictionary.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/elements-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/elements-kind.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/elements-kind.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/elements.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/elements.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/embedder-data-array-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/embedder-data-array.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/embedder-data-array.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/embedder-data-slot-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/embedder-data-slot.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/feedback-cell-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/feedback-cell.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/feedback-vector-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/feedback-vector.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/feedback-vector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/field-index-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/field-index.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/field-type.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/field-type.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/fixed-array-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/fixed-array.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/foreign-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/foreign.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/frame-array-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/frame-array.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/free-space-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/free-space.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/function-kind.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/function-syntax-kind.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/hash-table-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/hash-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/heap-number-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/heap-number.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/heap-object-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/heap-object.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/instance-type-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/instance-type.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/internal-index.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/intl-objects.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/intl-objects.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-aggregate-error-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-aggregate-error.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-array-buffer-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-array-buffer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-array-buffer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-array-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-array.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-break-iterator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-break-iterator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-break-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-collator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-collator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-collator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-collection-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-collection-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-collection.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-date-time-format-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-date-time-format.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-date-time-format.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-display-names-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-display-names.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-display-names.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-generator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-list-format-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-list-format.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-list-format.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-locale-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-locale.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-locale.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-number-format-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-number-format.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-number-format.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-objects-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-objects.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-objects.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-plural-rules-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-plural-rules.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-plural-rules.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-promise-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-promise.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-proxy-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-proxy.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-regexp-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-regexp-string-iterator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-regexp-string-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-regexp.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-regexp.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-relative-time-format-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-relative-time-format.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-relative-time-format.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-segment-iterator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-segment-iterator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-segment-iterator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-segmenter-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-segmenter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-segmenter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-weak-refs-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-weak-refs.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/keys.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/keys.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/layout-descriptor-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/layout-descriptor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/layout-descriptor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/literal-objects-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/literal-objects.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/literal-objects.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/lookup-cache-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/lookup-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/lookup-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/lookup-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/lookup.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/lookup.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/managed.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/managed.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/map-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/map-updater.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/map-updater.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/map.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/map.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/maybe-object-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/maybe-object.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/microtask-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/microtask.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/module-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/module.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/module.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/name-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/name.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/object-list-macros.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/object-macros-undef.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/object-macros.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects-body-descriptors-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects-body-descriptors.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects-definitions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/oddball-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/oddball.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/ordered-hash-table-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/ordered-hash-table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/ordered-hash-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/osr-optimized-code-cache-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/osr-optimized-code-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/osr-optimized-code-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/primitive-heap-object-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/primitive-heap-object.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/promise-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/promise.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-array-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-array.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-cell-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-cell.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-descriptor-object-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-descriptor-object.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-descriptor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-descriptor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property-details.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/property.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/prototype-info-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/prototype-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/prototype-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/prototype.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/regexp-match-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/scope-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/scope-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/script-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/script.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/shared-function-info-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/shared-function-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/slots-atomic-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/slots-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/slots.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/smi-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/smi.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/source-text-module.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/source-text-module.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/stack-frame-info-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/stack-frame-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/stack-frame-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/string-comparator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/string-comparator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/string-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/string-table-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/string-table.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/string.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/string.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/struct-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/struct.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/synthetic-module.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/synthetic-module.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-field-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-field.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-impl-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-impl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-index.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-value-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/tagged-value.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/template-objects-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/template-objects.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/template-objects.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/templates-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/templates.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/transitions-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/transitions.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/transitions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/type-hints.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/type-hints.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/value-serializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/value-serializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/visitors.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/objects/visitors.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/expression-scope.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/func-name-inferrer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/func-name-inferrer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/keywords-gen.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/literal-buffer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/literal-buffer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parse-info.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parse-info.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parser-base.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parsing.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parsing.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/pending-compilation-error-handler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/pending-compilation-error-handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/preparse-data-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/preparse-data.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/preparse-data.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/preparser-logger.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/preparser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/preparser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/rewriter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/rewriter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner-character-streams.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner-character-streams.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/token.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/token.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/allocation-tracker.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/allocation-tracker.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/circular-queue-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/circular-queue.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/cpu-profiler-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/cpu-profiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/cpu-profiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-profiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-profiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-snapshot-generator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-snapshot-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-snapshot-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/profile-generator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/profile-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/profile-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/profiler-listener.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/profiler-listener.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/sampling-heap-profiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/sampling-heap-profiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/strings-storage.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/strings-storage.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/tick-sample.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/tick-sample.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/tracing-cpu-profiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/tracing-cpu-profiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/protobuf/protobuf-compiler-main.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/arm/regexp-macro-assembler-arm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/arm/regexp-macro-assembler-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/arm64/regexp-macro-assembler-arm64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/arm64/regexp-macro-assembler-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/gen-regexp-special-case.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/mips/regexp-macro-assembler-mips.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/mips/regexp-macro-assembler-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/mips64/regexp-macro-assembler-mips64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/mips64/regexp-macro-assembler-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ppc/regexp-macro-assembler-ppc.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ppc/regexp-macro-assembler-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/property-sequences.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/property-sequences.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-ast.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-ast.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-bytecode-generator-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-bytecode-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-bytecode-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-bytecode-peephole.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-bytecode-peephole.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-bytecodes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-bytecodes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-compiler-tonode.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-compiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-dotprinter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-dotprinter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-error.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-error.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-interpreter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-interpreter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-macro-assembler-arch.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-macro-assembler-tracer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-macro-assembler-tracer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-macro-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-macro-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-nodes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-parser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-parser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-stack.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-stack.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/s390/regexp-macro-assembler-s390.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/s390/regexp-macro-assembler-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/special-case.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/roots/roots-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/roots/roots.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/roots/roots.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-array.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-atomics.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-bigint.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-classes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-collections.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-date.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-debug.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-forin.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-function.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-futex.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-internal.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-interpreter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-intl.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-literals.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-module.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-numbers.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-object.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-operators.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-promise.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-proxy.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-regexp.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-scopes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-strings.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-symbol.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-typedarray.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-wasm.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-weak-refs.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/asan.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/lsan-page-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/lsan-page-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/msan.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/tsan.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/code-serializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/code-serializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/context-deserializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/context-deserializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/context-serializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/context-serializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/deserializer-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/deserializer-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/deserializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/deserializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-data.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-data.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-empty.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-file-writer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-file-writer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-aix.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-aix.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-generic.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-generic.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-mac.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-mac.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-win.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-win.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/mksnapshot.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/object-deserializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/object-deserializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/read-only-deserializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/read-only-deserializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/read-only-serializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/read-only-serializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/references.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/roots-serializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/roots-serializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/serializer-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/serializer-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/serializer-deserializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/serializer-deserializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/serializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/serializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-compression.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-compression.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-data.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-data.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-empty.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-external.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-source-sink.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-source-sink.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/startup-deserializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/startup-deserializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/startup-serializer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/startup-serializer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/char-predicates-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/char-predicates.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/char-predicates.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-builder-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-case.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-case.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-hasher-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-hasher.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-search.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-stream.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-stream.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/unicode-decoder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/unicode-decoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/unicode-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/unicode.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/unicode.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/uri.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/strings/uri.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tasks/cancelable-task.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tasks/cancelable-task.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tasks/task-utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tasks/task-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/siphash/halfsiphash.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/siphash/halfsiphash.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/utf8-decoder/utf8-decoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/valgrind/valgrind.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/v8-vtune.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/vtune-jit.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/vtune-jit.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/vtuneapi.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/vtuneapi.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ast.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/cfg.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/cfg.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/class-debug-reader-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/constants.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/contextual.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/csa-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/csa-generator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/declarable.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/declarable.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/declaration-visitor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/declaration-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/declarations.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/declarations.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/earley-parser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/earley-parser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/global-context.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/global-context.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/implementation-visitor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/implementation-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/instance-type-generator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/instructions.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/instructions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/globals.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/json-parser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/json-parser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/json.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/json.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/message-handler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/message-handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/message-macros.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/message-pipe.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/message.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/torque-language-server.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/parameter-difference.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/runtime-support.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/server-data.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/server-data.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/source-positions.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/source-positions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/torque-compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/torque-compiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/torque-parser.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/torque-parser.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/torque.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/type-inference.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/type-inference.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/type-oracle.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/type-oracle.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/type-visitor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/type-visitor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/types.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/types.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/torque/utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/trace-categories.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/trace-categories.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/trace-event.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/trace-event.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/traced-value.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/traced-value.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/tracing-category-observer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/tracing-category-observer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-inside-posix.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-inside-posix.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-inside-win.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-inside-win.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-inside.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-outside-posix.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-outside-win.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-outside.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-shared.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/trap-handler-internal.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/trap-handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/address-map.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/address-map.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/bit-vector.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/bit-vector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/boxed-float.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/detachable-vector.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/detachable-vector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/identity-map.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/identity-map.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/locked-queue-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/locked-queue.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/memcopy.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/memcopy.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/pointer-with-payload.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/v8dll-main.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/vector.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/version.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/utils/version.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/arm/liftoff-assembler-arm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/arm64/liftoff-assembler-arm64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/ia32/liftoff-assembler-ia32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/liftoff-assembler-defs.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/liftoff-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/liftoff-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/liftoff-compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/liftoff-compiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/liftoff-register.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/mips/liftoff-assembler-mips.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/mips64/liftoff-assembler-mips64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/ppc/liftoff-assembler-ppc.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/s390/liftoff-assembler-s390.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/x64/liftoff-assembler-x64.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/c-api.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/c-api.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/compilation-environment.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/decoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/function-body-decoder-impl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/function-body-decoder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/function-body-decoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/function-compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/function-compiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/graph-builder-interface.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/graph-builder-interface.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/jump-table-assembler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/jump-table-assembler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/leb-helper.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/local-decl-encoder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/local-decl-encoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/memory-tracing.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/memory-tracing.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-compiler.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-compiler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-decoder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-decoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-instantiate.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-instantiate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/object-access.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/signature-map.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/signature-map.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/struct-types.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/value-type.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-arguments.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-constants.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-debug-evaluate.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-debug-evaluate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-debug.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-debug.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-engine.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-engine.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-external-refs.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-external-refs.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-feature-flags.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-features.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-features.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-import-wrapper-cache.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-import-wrapper-cache.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-interpreter.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-interpreter.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-js.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-js.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-limits.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-linkage.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module-builder.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module-builder.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module-sourcemap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module-sourcemap.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-objects-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-objects.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-objects.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-opcodes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-opcodes.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-result.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-result.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-serialization.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-serialization.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-tier.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-value.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/accounting-allocator.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/accounting-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-allocator.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-chunk-list.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-containers.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-handle-set.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-list-inl.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-segment.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-segment.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gmock-support.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gmock/include/gmock/gmock-actions.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gmock/include/gmock/gmock-matchers.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gmock/include/gmock/gmock.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest-support.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest/empty.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest/include/gtest/gtest-death-test.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest/include/gtest/gtest-message.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest/include/gtest/gtest-param-test.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest/include/gtest/gtest-spi.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest/include/gtest/gtest.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/testing/gtest/include/gtest/gtest_prod.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/googletest/custom/gtest/internal/custom/gtest-port.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/googletest/gmock_custom/gmock/internal/custom/gmock-port.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/googletest/src/googletest/include/gtest/gtest_prod.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/cbor.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/cbor.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/cbor_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/dispatch.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/dispatch.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/dispatch_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/error_support.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/error_support.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/error_support_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/export.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/find_by_first.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/find_by_first_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/frontend_channel.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/glue.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/glue_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json_platform.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json_platform_v8.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/parser_handler.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/serializable.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/serializable.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/serializable_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/serializer_traits.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/serializer_traits_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/span.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/span.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/span_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/status.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/status.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/status_test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/status_test_support.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/status_test_support.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/test_platform.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/test_platform_v8.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/jsoncpp/generated/version.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/markupsafe/_speedups.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/callback.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/callback.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/finalize.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/finalize.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/global.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/global.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hello.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hello.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hostref.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hostref.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/memory.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/memory.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/multi.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/multi.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/reflect.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/reflect.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/serialize.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/serialize.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/start.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/start.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/table.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/table.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/threads.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/threads.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/trap.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/trap.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/wasm.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/adler32.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/adler32_simd.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/adler32_simd.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/chromeconf.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/compress.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/crypt.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/ioapi.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/ioapi.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/iowin32.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/iowin32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/unzip.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/unzip.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/chunkcopy.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/inffast_chunk.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/inffast_chunk.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/inflate.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/insert_string.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/slide_hash_neon.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/cpu_features.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/cpu_features.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc32.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc32.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc32_simd.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc32_simd.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc_folding.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/deflate.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/deflate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/fill_window_sse.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/compression_utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/compression_utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/compression_utils_portable.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/compression_utils_portable.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/compression_utils_unittest.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_internal.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_internal.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_reader.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_reader.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_reader_unittest.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_unittest.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_writer.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_writer.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzclose.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzguts.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzread.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/infback.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inffast.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inffast.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inffixed.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inflate.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inflate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inftrees.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inftrees.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/trees.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/trees.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/uncompr.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zconf.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zlib.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.c
Examining data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/debug_helper/debug-helper-internal.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/debug_helper/debug-helper-internal.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/debug_helper/debug-helper.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/debug_helper/get-object-properties.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/debug_helper/heap-constants.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/debug_helper/heap-constants.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/debug_helper/list-object-classes.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/gcmole/gcmole-test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/gcmole/gcmole.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/release/testdata/v8/third_party/googletest/src/googletest/include/gtest/gtest_prod.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/shell-utils.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/base/dbgext.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/base/dbgext.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/base/utilities.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/base/utilities.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/cur-isolate.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/cur-isolate.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/list-chunks.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/list-chunks.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/local-variables.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/local-variables.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/object-inspection.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/object-inspection.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/v8-debug-helper-interop.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/v8-debug-helper-interop.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/v8windbg-extension.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/src/v8windbg-extension.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/test/debug-callbacks.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/test/debug-callbacks.h
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/test/v8windbg-test.cc
Examining data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/test/v8windbg-test.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/adler32.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/adler32_simd.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/adler32_simd.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/arm_features.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/arm_features.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/chromeconf.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/compress.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/chunkcopy.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/inffast_chunk.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/inffast_chunk.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/inflate.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/insert_string.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/slide_hash_neon.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/crc32.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/crc32.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/crc32_simd.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/crc32_simd.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/crc_folding.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/deflate.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/deflate.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/fill_window_sse.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/compression_utils.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/compression_utils.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/compression_utils_portable.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/compression_utils_portable.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/compression_utils_unittest.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_internal.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_internal.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_reader.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_reader.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_reader_unittest.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_unittest.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_writer.cc
Examining data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_writer.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/gzclose.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/gzguts.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/gzread.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/infback.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/inffast.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/inffast.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/inffixed.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/inflate.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/inflate.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/inftrees.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/inftrees.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/simd_stub.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/trees.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/trees.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/uncompr.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/x86.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/x86.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/zconf.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/zlib.h
Examining data/nodejs-14.13.0~dfsg/deps/zlib/zutil.c
Examining data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h
Examining data/nodejs-14.13.0~dfsg/src/aliased_buffer.h
Examining data/nodejs-14.13.0~dfsg/src/aliased_struct-inl.h
Examining data/nodejs-14.13.0~dfsg/src/aliased_struct.h
Examining data/nodejs-14.13.0~dfsg/src/allocated_buffer-inl.h
Examining data/nodejs-14.13.0~dfsg/src/allocated_buffer.h
Examining data/nodejs-14.13.0~dfsg/src/api/async_resource.cc
Examining data/nodejs-14.13.0~dfsg/src/api/callback.cc
Examining data/nodejs-14.13.0~dfsg/src/api/encoding.cc
Examining data/nodejs-14.13.0~dfsg/src/api/environment.cc
Examining data/nodejs-14.13.0~dfsg/src/api/exceptions.cc
Examining data/nodejs-14.13.0~dfsg/src/api/hooks.cc
Examining data/nodejs-14.13.0~dfsg/src/api/utils.cc
Examining data/nodejs-14.13.0~dfsg/src/async_wrap-inl.h
Examining data/nodejs-14.13.0~dfsg/src/async_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/async_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/base64.h
Examining data/nodejs-14.13.0~dfsg/src/base_object-inl.h
Examining data/nodejs-14.13.0~dfsg/src/base_object.h
Examining data/nodejs-14.13.0~dfsg/src/callback_queue-inl.h
Examining data/nodejs-14.13.0~dfsg/src/callback_queue.h
Examining data/nodejs-14.13.0~dfsg/src/cares_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/connect_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/connect_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/connection_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/connection_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/debug_utils-inl.h
Examining data/nodejs-14.13.0~dfsg/src/debug_utils.cc
Examining data/nodejs-14.13.0~dfsg/src/debug_utils.h
Examining data/nodejs-14.13.0~dfsg/src/diagnosticfilename-inl.h
Examining data/nodejs-14.13.0~dfsg/src/env-inl.h
Examining data/nodejs-14.13.0~dfsg/src/env.cc
Examining data/nodejs-14.13.0~dfsg/src/env.h
Examining data/nodejs-14.13.0~dfsg/src/fs_event_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/handle_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/handle_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/heap_utils.cc
Examining data/nodejs-14.13.0~dfsg/src/histogram-inl.h
Examining data/nodejs-14.13.0~dfsg/src/histogram.cc
Examining data/nodejs-14.13.0~dfsg/src/histogram.h
Examining data/nodejs-14.13.0~dfsg/src/inspector/main_thread_interface.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector/main_thread_interface.h
Examining data/nodejs-14.13.0~dfsg/src/inspector/node_string.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector/node_string.h
Examining data/nodejs-14.13.0~dfsg/src/inspector/runtime_agent.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector/runtime_agent.h
Examining data/nodejs-14.13.0~dfsg/src/inspector/tracing_agent.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector/tracing_agent.h
Examining data/nodejs-14.13.0~dfsg/src/inspector/worker_agent.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector/worker_agent.h
Examining data/nodejs-14.13.0~dfsg/src/inspector/worker_inspector.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector/worker_inspector.h
Examining data/nodejs-14.13.0~dfsg/src/inspector_agent.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector_agent.h
Examining data/nodejs-14.13.0~dfsg/src/inspector_io.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector_io.h
Examining data/nodejs-14.13.0~dfsg/src/inspector_js_api.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector_profiler.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector_profiler.h
Examining data/nodejs-14.13.0~dfsg/src/inspector_socket.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector_socket.h
Examining data/nodejs-14.13.0~dfsg/src/inspector_socket_server.cc
Examining data/nodejs-14.13.0~dfsg/src/inspector_socket_server.h
Examining data/nodejs-14.13.0~dfsg/src/js_native_api.h
Examining data/nodejs-14.13.0~dfsg/src/js_native_api_types.h
Examining data/nodejs-14.13.0~dfsg/src/js_native_api_v8.cc
Examining data/nodejs-14.13.0~dfsg/src/js_native_api_v8.h
Examining data/nodejs-14.13.0~dfsg/src/js_native_api_v8_internals.h
Examining data/nodejs-14.13.0~dfsg/src/js_stream.cc
Examining data/nodejs-14.13.0~dfsg/src/js_stream.h
Examining data/nodejs-14.13.0~dfsg/src/js_udp_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/json_utils.cc
Examining data/nodejs-14.13.0~dfsg/src/json_utils.h
Examining data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc
Examining data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.h
Examining data/nodejs-14.13.0~dfsg/src/memory_tracker-inl.h
Examining data/nodejs-14.13.0~dfsg/src/memory_tracker.h
Examining data/nodejs-14.13.0~dfsg/src/module_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/module_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/node.cc
Examining data/nodejs-14.13.0~dfsg/src/node.h
Examining data/nodejs-14.13.0~dfsg/src/node_api.cc
Examining data/nodejs-14.13.0~dfsg/src/node_api.h
Examining data/nodejs-14.13.0~dfsg/src/node_api_types.h
Examining data/nodejs-14.13.0~dfsg/src/node_binding.cc
Examining data/nodejs-14.13.0~dfsg/src/node_binding.h
Examining data/nodejs-14.13.0~dfsg/src/node_buffer.cc
Examining data/nodejs-14.13.0~dfsg/src/node_buffer.h
Examining data/nodejs-14.13.0~dfsg/src/node_code_cache_stub.cc
Examining data/nodejs-14.13.0~dfsg/src/node_config.cc
Examining data/nodejs-14.13.0~dfsg/src/node_constants.cc
Examining data/nodejs-14.13.0~dfsg/src/node_constants.h
Examining data/nodejs-14.13.0~dfsg/src/node_context_data.h
Examining data/nodejs-14.13.0~dfsg/src/node_contextify.cc
Examining data/nodejs-14.13.0~dfsg/src/node_contextify.h
Examining data/nodejs-14.13.0~dfsg/src/node_credentials.cc
Examining data/nodejs-14.13.0~dfsg/src/node_crypto.cc
Examining data/nodejs-14.13.0~dfsg/src/node_crypto.h
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_bio.cc
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_bio.h
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_clienthello-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_clienthello.cc
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_clienthello.h
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_common.cc
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_common.h
Examining data/nodejs-14.13.0~dfsg/src/node_crypto_groups.h
Examining data/nodejs-14.13.0~dfsg/src/node_dir.cc
Examining data/nodejs-14.13.0~dfsg/src/node_dir.h
Examining data/nodejs-14.13.0~dfsg/src/node_dtrace.cc
Examining data/nodejs-14.13.0~dfsg/src/node_dtrace.h
Examining data/nodejs-14.13.0~dfsg/src/node_env_var.cc
Examining data/nodejs-14.13.0~dfsg/src/node_errors.cc
Examining data/nodejs-14.13.0~dfsg/src/node_errors.h
Examining data/nodejs-14.13.0~dfsg/src/node_file-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_file.cc
Examining data/nodejs-14.13.0~dfsg/src/node_file.h
Examining data/nodejs-14.13.0~dfsg/src/node_http2.cc
Examining data/nodejs-14.13.0~dfsg/src/node_http2.h
Examining data/nodejs-14.13.0~dfsg/src/node_http2_state.h
Examining data/nodejs-14.13.0~dfsg/src/node_http_common-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_http_common.h
Examining data/nodejs-14.13.0~dfsg/src/node_http_parser.cc
Examining data/nodejs-14.13.0~dfsg/src/node_i18n.cc
Examining data/nodejs-14.13.0~dfsg/src/node_i18n.h
Examining data/nodejs-14.13.0~dfsg/src/node_internals.h
Examining data/nodejs-14.13.0~dfsg/src/node_main.cc
Examining data/nodejs-14.13.0~dfsg/src/node_main_instance.cc
Examining data/nodejs-14.13.0~dfsg/src/node_main_instance.h
Examining data/nodejs-14.13.0~dfsg/src/node_mem-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_mem.h
Examining data/nodejs-14.13.0~dfsg/src/node_messaging.cc
Examining data/nodejs-14.13.0~dfsg/src/node_messaging.h
Examining data/nodejs-14.13.0~dfsg/src/node_metadata.cc
Examining data/nodejs-14.13.0~dfsg/src/node_metadata.h
Examining data/nodejs-14.13.0~dfsg/src/node_mutex.h
Examining data/nodejs-14.13.0~dfsg/src/node_native_module.cc
Examining data/nodejs-14.13.0~dfsg/src/node_native_module.h
Examining data/nodejs-14.13.0~dfsg/src/node_native_module_env.cc
Examining data/nodejs-14.13.0~dfsg/src/node_native_module_env.h
Examining data/nodejs-14.13.0~dfsg/src/node_object_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/node_options-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_options.cc
Examining data/nodejs-14.13.0~dfsg/src/node_options.h
Examining data/nodejs-14.13.0~dfsg/src/node_os.cc
Examining data/nodejs-14.13.0~dfsg/src/node_perf.cc
Examining data/nodejs-14.13.0~dfsg/src/node_perf.h
Examining data/nodejs-14.13.0~dfsg/src/node_perf_common.h
Examining data/nodejs-14.13.0~dfsg/src/node_platform.cc
Examining data/nodejs-14.13.0~dfsg/src/node_platform.h
Examining data/nodejs-14.13.0~dfsg/src/node_postmortem_metadata.cc
Examining data/nodejs-14.13.0~dfsg/src/node_process.h
Examining data/nodejs-14.13.0~dfsg/src/node_process_events.cc
Examining data/nodejs-14.13.0~dfsg/src/node_process_methods.cc
Examining data/nodejs-14.13.0~dfsg/src/node_process_object.cc
Examining data/nodejs-14.13.0~dfsg/src/node_report.cc
Examining data/nodejs-14.13.0~dfsg/src/node_report.h
Examining data/nodejs-14.13.0~dfsg/src/node_report_module.cc
Examining data/nodejs-14.13.0~dfsg/src/node_report_utils.cc
Examining data/nodejs-14.13.0~dfsg/src/node_revert.h
Examining data/nodejs-14.13.0~dfsg/src/node_root_certs.h
Examining data/nodejs-14.13.0~dfsg/src/node_serdes.cc
Examining data/nodejs-14.13.0~dfsg/src/node_snapshot_stub.cc
Examining data/nodejs-14.13.0~dfsg/src/node_sockaddr-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_sockaddr.cc
Examining data/nodejs-14.13.0~dfsg/src/node_sockaddr.h
Examining data/nodejs-14.13.0~dfsg/src/node_stat_watcher.cc
Examining data/nodejs-14.13.0~dfsg/src/node_stat_watcher.h
Examining data/nodejs-14.13.0~dfsg/src/node_symbols.cc
Examining data/nodejs-14.13.0~dfsg/src/node_task_queue.cc
Examining data/nodejs-14.13.0~dfsg/src/node_trace_events.cc
Examining data/nodejs-14.13.0~dfsg/src/node_types.cc
Examining data/nodejs-14.13.0~dfsg/src/node_union_bytes.h
Examining data/nodejs-14.13.0~dfsg/src/node_url.cc
Examining data/nodejs-14.13.0~dfsg/src/node_url.h
Examining data/nodejs-14.13.0~dfsg/src/node_util.cc
Examining data/nodejs-14.13.0~dfsg/src/node_v8.cc
Examining data/nodejs-14.13.0~dfsg/src/node_v8_platform-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_version.h
Examining data/nodejs-14.13.0~dfsg/src/node_wasi.cc
Examining data/nodejs-14.13.0~dfsg/src/node_wasi.h
Examining data/nodejs-14.13.0~dfsg/src/node_watchdog.cc
Examining data/nodejs-14.13.0~dfsg/src/node_watchdog.h
Examining data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider-inl.h
Examining data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider.cc
Examining data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider.h
Examining data/nodejs-14.13.0~dfsg/src/node_worker.cc
Examining data/nodejs-14.13.0~dfsg/src/node_worker.h
Examining data/nodejs-14.13.0~dfsg/src/node_zlib.cc
Examining data/nodejs-14.13.0~dfsg/src/pipe_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/pipe_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/process_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/req_wrap-inl.h
Examining data/nodejs-14.13.0~dfsg/src/req_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/signal_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/spawn_sync.cc
Examining data/nodejs-14.13.0~dfsg/src/spawn_sync.h
Examining data/nodejs-14.13.0~dfsg/src/stream_base-inl.h
Examining data/nodejs-14.13.0~dfsg/src/stream_base.cc
Examining data/nodejs-14.13.0~dfsg/src/stream_base.h
Examining data/nodejs-14.13.0~dfsg/src/stream_pipe.cc
Examining data/nodejs-14.13.0~dfsg/src/stream_pipe.h
Examining data/nodejs-14.13.0~dfsg/src/stream_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/stream_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/string_bytes.cc
Examining data/nodejs-14.13.0~dfsg/src/string_bytes.h
Examining data/nodejs-14.13.0~dfsg/src/string_decoder-inl.h
Examining data/nodejs-14.13.0~dfsg/src/string_decoder.cc
Examining data/nodejs-14.13.0~dfsg/src/string_decoder.h
Examining data/nodejs-14.13.0~dfsg/src/string_search.h
Examining data/nodejs-14.13.0~dfsg/src/tcp_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/tcp_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/threadpoolwork-inl.h
Examining data/nodejs-14.13.0~dfsg/src/timers.cc
Examining data/nodejs-14.13.0~dfsg/src/tls_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/tls_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/tracing/agent.cc
Examining data/nodejs-14.13.0~dfsg/src/tracing/agent.h
Examining data/nodejs-14.13.0~dfsg/src/tracing/node_trace_buffer.cc
Examining data/nodejs-14.13.0~dfsg/src/tracing/node_trace_buffer.h
Examining data/nodejs-14.13.0~dfsg/src/tracing/node_trace_writer.cc
Examining data/nodejs-14.13.0~dfsg/src/tracing/node_trace_writer.h
Examining data/nodejs-14.13.0~dfsg/src/tracing/trace_event.cc
Examining data/nodejs-14.13.0~dfsg/src/tracing/trace_event.h
Examining data/nodejs-14.13.0~dfsg/src/tracing/trace_event_common.h
Examining data/nodejs-14.13.0~dfsg/src/tracing/traced_value.cc
Examining data/nodejs-14.13.0~dfsg/src/tracing/traced_value.h
Examining data/nodejs-14.13.0~dfsg/src/tty_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/tty_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/udp_wrap.cc
Examining data/nodejs-14.13.0~dfsg/src/udp_wrap.h
Examining data/nodejs-14.13.0~dfsg/src/util-inl.h
Examining data/nodejs-14.13.0~dfsg/src/util.cc
Examining data/nodejs-14.13.0~dfsg/src/util.h
Examining data/nodejs-14.13.0~dfsg/src/uv.cc
Examining data/nodejs-14.13.0~dfsg/src/v8abbr.h
Examining data/nodejs-14.13.0~dfsg/test/addons/async-cleanup-hook/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/async-hello-world/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/async-hooks-id/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/async-hooks-promise/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/async-resource/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/buffer-free-callback/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/callback-scope/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/dlopen-ping-pong/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/dlopen-ping-pong/ping.c
Examining data/nodejs-14.13.0~dfsg/test/addons/errno-exception/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/force-context-aware/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/heap-profiler/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/hello-world-function-export/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/hello-world/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/load-long-path/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/make-callback-domain-warning/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/make-callback-recurse/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/make-callback/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/new-target/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/node-module-version/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/non-node-context/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/not-a-binding/not_a_binding.c
Examining data/nodejs-14.13.0~dfsg/test/addons/null-buffer-neuter/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/openssl-binding/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/openssl-client-cert-engine/testengine.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/openssl-key-engine/testkeyengine.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/parse-encoding/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/register-signal-handler/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/repl-domain-abort/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/stringbytes-external-exceed-max/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/symlinked-module/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/uv-handle-leak/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/worker-addon/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/worker-buffer-callback/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/addons/zlib-binding/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h
Examining data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest_main.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/node_test_fixture.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/node_test_fixture.h
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_aliased_buffer.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_base64.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_base_object_ptr.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_environment.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_inspector_socket.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_inspector_socket_server.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_json_utils.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_linked_binding.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_node_postmortem_metadata.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_per_process.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_platform.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_sockaddr.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_traced_value.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_url.cc
Examining data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc
Examining data/nodejs-14.13.0~dfsg/test/embedding/embedtest.cc
Examining data/nodejs-14.13.0~dfsg/test/fixtures/tools/checkimports/invalid.cc
Examining data/nodejs-14.13.0~dfsg/test/fixtures/tools/checkimports/maybe.cc
Examining data/nodejs-14.13.0~dfsg/test/fixtures/tools/checkimports/unsorted.cc
Examining data/nodejs-14.13.0~dfsg/test/fixtures/tools/checkimports/unused.cc
Examining data/nodejs-14.13.0~dfsg/test/fixtures/tools/checkimports/valid.cc
Examining data/nodejs-14.13.0~dfsg/test/fuzzers/fuzz_url.cc
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/2_function_arguments/binding.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/3_callbacks/binding.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/4_object_factory/binding.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/5_function_factory/binding.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/6_object_wrap/myobject.cc
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/6_object_wrap/myobject.h
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/7_factory_wrap/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/7_factory_wrap/myobject.cc
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/7_factory_wrap/myobject.h
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/8_passing_wrapped/binding.cc
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/8_passing_wrapped/myobject.cc
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/8_passing_wrapped/myobject.h
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/common.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/common.h
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/entry_point.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_array/test_array.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_bigint/test_bigint.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_constructor/test_constructor.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_conversions/test_conversions.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_conversions/test_null.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_conversions/test_null.h
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_dataview/test_dataview.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_date/test_date.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_error/test_error.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_exception/test_exception.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_function/test_function.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_general/test_general.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_handle_scope/test_handle_scope.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_instance_data/test_instance_data.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_new_target/binding.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_number/test_number.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_object/test_null.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_object/test_null.h
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_object/test_object.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_promise/test_promise.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_properties/test_properties.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_reference/test_reference.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_string/test_string.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_symbol/test_symbol.c
Examining data/nodejs-14.13.0~dfsg/test/js-native-api/test_typedarray/test_typedarray.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/1_hello_world/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_async/test_async.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_async_cleanup_hook/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_buffer/test_buffer.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_callback_scope/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_cleanup_hook/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_exception/test_exception.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_fatal/test_fatal.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_fatal_exception/test_fatal_exception.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_general/test_general.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_instance_data/addon.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_instance_data/test_instance_data.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_instance_data/test_ref_then_set.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_instance_data/test_set_then_ref.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_make_callback/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_make_callback_recurse/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_null_init/test_null_init.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_policy/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_threadsafe_function/binding.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_uv_loop/test_uv_loop.cc
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_worker_buffer_callback/test_worker_buffer_callback.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_worker_terminate/test_worker_terminate.c
Examining data/nodejs-14.13.0~dfsg/test/node-api/test_worker_terminate_finalization/test_worker_terminate_finalization.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/cant_dotdot.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/clock_getres.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/create_symlink.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/exitcode.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/fd_prestat_get_refresh.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/follow_symlink.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/freopen.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/ftruncate.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/getentropy.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/getrusage.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/gettimeofday.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/link.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/main_args.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/notdir.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/poll.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/preopen_populates.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/read_file.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/read_file_twice.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/readdir.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/stat.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/stdin.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/symlink_escape.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/symlink_loop.c
Examining data/nodejs-14.13.0~dfsg/test/wasi/c/write_file.c
Examining data/nodejs-14.13.0~dfsg/tools/code_cache/cache_builder.cc
Examining data/nodejs-14.13.0~dfsg/tools/code_cache/cache_builder.h
Examining data/nodejs-14.13.0~dfsg/tools/code_cache/mkcodecache.cc
Examining data/nodejs-14.13.0~dfsg/tools/gyp/data/win/large-pdb-shim.cc
Examining data/nodejs-14.13.0~dfsg/tools/icu/iculslocs.cc
Examining data/nodejs-14.13.0~dfsg/tools/icu/no-op.cc
Examining data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp
Examining data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/i18n/dtptngen.cpp
Examining data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding.cc
Examining data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding.h
Examining data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding_test.cc
Examining data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding_test_helper.h
Examining data/nodejs-14.13.0~dfsg/tools/inspector_protocol/markupsafe/_speedups.c
Examining data/nodejs-14.13.0~dfsg/tools/msvs/msi/custom_actions.cc
Examining data/nodejs-14.13.0~dfsg/tools/msvs/pch/node_pch.cc
Examining data/nodejs-14.13.0~dfsg/tools/msvs/pch/node_pch.h
Examining data/nodejs-14.13.0~dfsg/tools/msvs/pch/v8_pch.cc
Examining data/nodejs-14.13.0~dfsg/tools/msvs/pch/v8_pch.h
Examining data/nodejs-14.13.0~dfsg/tools/snapshot/node_mksnapshot.cc
Examining data/nodejs-14.13.0~dfsg/tools/snapshot/snapshot_builder.cc
Examining data/nodejs-14.13.0~dfsg/tools/snapshot/snapshot_builder.h
Examining data/nodejs-14.13.0~dfsg/tools/v8_gypfiles/extras-libraries.cc

FINAL RESULTS:

data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:67:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
ssize_t readlink(const char *pathname, char *buf, size_t bufsiz)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:221:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    n = readlink(fullpath, linktarget, sizeof(linktarget));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:33:11:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#  define chmod   _chmod
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:242:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    chmod(file, 0600);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/bio.h:784:29:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
                      int (*gets) (BIO *, char *, int));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:792:10:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    rc = readlink(cwd, readlink_cwd, sizeof(readlink_cwd) - 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:725:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  len = readlink(req->path, buf, maxlen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:1591:14:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    X(CHMOD, chmod(req->path, req->mode));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:1592:14:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    X(CHOWN, chown(req->path, req->uid, req->gid));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:499:10:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  rlen = readlink(path, tmpbuf, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/pipe.c:377:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  r = chmod(name_buffer, pipe_stat.st_mode);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/procfs-exepath.c:36:9:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    n = readlink("/proc/self/exe", buffer, n);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sunos.c:393:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    res = readlink(buf, buffer, res);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2803:15:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    XX(CHMOD, chmod)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2819:18:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    XX(READLINK, readlink)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2821:15:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    XX(CHOWN, chown)
data/nodejs-14.13.0~dfsg/src/node_file.cc:1169:25:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    FS_SYNC_TRACE_BEGIN(readlink);
data/nodejs-14.13.0~dfsg/src/node_file.cc:1172:23:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    FS_SYNC_TRACE_END(readlink);
data/nodejs-14.13.0~dfsg/src/node_file.cc:2122:25:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    FS_SYNC_TRACE_BEGIN(chmod);
data/nodejs-14.13.0~dfsg/src/node_file.cc:2125:23:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    FS_SYNC_TRACE_END(chmod);
data/nodejs-14.13.0~dfsg/src/node_file.cc:2185:25:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    FS_SYNC_TRACE_BEGIN(chown);
data/nodejs-14.13.0~dfsg/src/node_file.cc:2188:23:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    FS_SYNC_TRACE_END(chown);
data/nodejs-14.13.0~dfsg/test/wasi/c/create_symlink.c:13:10:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  assert(readlink(linkpath, readlink_result, result_size) ==
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1113:32:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        int32_t ret = (int32_t)readlink(TZDEFAULT, gTimeZoneBuffer, sizeof(gTimeZoneBuffer)-1);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:474:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(PATH_HOSTS, WIN_PATH_HOSTS);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:208:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(PATH_HOSTS, WIN_PATH_HOSTS);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:383:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(PATH_HOSTS, WIN_PATH_HOSTS);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:410:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[bufl], tmpbuf);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:275:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(csv, _csv);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_ns_reply.c:135:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(nameservers[nameservers_num],rr_data);
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c:93:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  if ((size_t)sprintf(tmp, fmt, src[0], src[1], src[2], src[3]) >= size) {
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c:97:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst, tmp);
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c:194:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dst, tmp);
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:797:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:797:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:806:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(str, len, format_str, "%.", significant_figures, "f,%f,%d,%.2f\n");
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:809:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(str, len, format_str, "%12.", significant_figures, "f %12f %12d %12.2f\n");
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:812:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            snprintf(str, len, format_str, "%12.", significant_figures, "f %12f %12d %12.2f\n");
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:815:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:1006:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    if (fprintf(
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:1022:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        if (fprintf(
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:1036:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        if (fprintf(
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_debug.c:33:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, fmt, args);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_session.c:167:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  rv = vsnprintf(NULL, 0, fmt, ap);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_session.c:182:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  rv = vsnprintf(buf, bufsize, fmt, ap);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2351:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return access(name, flag);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:79:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, s);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c:843:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        if (vsnprintf(buf, sizeof(buf), fmt, ap) > 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:110:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, t);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:114:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(p, OPENSSL_CONF);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:230:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    p += strlen(strcpy(p, text));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:237:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                p += strlen(strcpy(p, text));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:882:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            p += strlen(strcpy(p, o->name));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:887:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            p += strlen(strcpy(p, valtype2param(o)));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3232:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            printf(mr ? ":%d" : "%7d bytes", lengths[testnum]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3247:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(mr ? ":%.2f" : " %11.2f ", results[k][testnum]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:570:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (MsgBuff, "%02d-%s-%04d %02d:%02d:%02d [%08X] %s\n",
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:580:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf (stderr, MsgBuff, args);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/win32_init.c:164:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(p, wcmdline);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:126:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((*ctx)->filespec, directory);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:134:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ctx_filespec_32p, (*ctx)->filespec);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:147:21:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                    _tcscpy(wdir + sz, TEXT("/*"));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:149:21:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                    _tcscpy(wdir + sz, TEXT("*"));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:157:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(buf, directory);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_sock.c:264:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(*ip_port, host);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_sock.c:266:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(*ip_port, port);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_local.h:160:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define UP_fprintf      fprintf
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:175:12:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#   define _vsntprintf _vsnwprintf
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:177:12:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#   define _vsntprintf _vsnprintf
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:345:5:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _vsntprintf(buf, OSSL_NELEM(buf) - 1, fmt, ap);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:405:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmta, ap);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:197:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(merged, filespec2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:199:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&merged[spec2len + 1], filespec1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:232:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(translated, "lib%s%s", filename, DSO_EXTENSION);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:234:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(translated, "%s%s", filename, DSO_EXTENSION);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:236:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s", filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:246:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(merged, filespec2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:248:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&merged[spec2len + 1], filespec1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:274:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(translated, "lib%s" DSO_EXTENSION, filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:276:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(translated, "%s" DSO_EXTENSION, filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:278:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s", filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:188:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(p->imagename, ext);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:192:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(p->imagename, sp2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:296:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(symname_32p, symname);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:400:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filespec1_32p, filespec1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:401:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filespec2_32p, filespec2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:462:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(not_translated, filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:473:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s.dll", filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:475:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(translated, "%s", filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_ctrl.c:110:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        return strlen(strcpy(s, cdp->cmd_name));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_ctrl.c:115:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        return strlen(strcpy(s, cdp->cmd_desc == NULL ? int_no_description
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:21:20:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_cfb());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:29:20:  [4] (crypto) EVP_des_ofb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_ofb());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:33:20:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_desx_cbc());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:37:20:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_cbc());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:45:20:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_ecb());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:58:20:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
    EVP_add_cipher(EVP_rc4_40());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:97:20:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
    EVP_add_cipher(EVP_rc2_40_cbc());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/c_allc.c:98:20:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
    EVP_add_cipher(EVP_rc2_64_cbc());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_old.c:34:10:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
#  undef EVP_des_cfb
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_old.c:35:19:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cfb(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_old.c:36:19:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cfb(void)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc2.c:73:19:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_64_cbc(void)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc2.c:78:19:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_40_cbc(void)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc4.c:64:19:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc4_40(void)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_xcbc_d.c:47:19:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_desx_cbc(void)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_str.c:35:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ret, str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_egd.c:75:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(addr.sun_path, path);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:302:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(buf, s);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:306:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(buf, s);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:310:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buf, RFILE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/keccak1600.c:1235:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(++i % 16 && i != sizeof(out) ? " " : "\n");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:504:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(failure_text, ts_failure_info[i].text);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_alt.c:132:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(oline, htmp);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.h:19:27:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define ALG_DGB(x, ...) fprintf(stderr, "ALG_DBG: " x, __VA_ARGS__)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.h:20:28:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define ALG_INFO(x, ...) fprintf(stderr, "ALG_INFO: " x, __VA_ARGS__)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.h:21:28:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define ALG_WARN(x, ...) fprintf(stderr, "ALG_WARN: " x, __VA_ARGS__)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.h:28:26:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define ALG_ERR(x, ...) fprintf(stderr, "ALG_ERR: " x, __VA_ARGS__)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.h:31:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, "ALG_PERR: " x, __VA_ARGS__); \
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.h:36:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                    fprintf(stderr, "ALG_PERR: " x, __VA_ARGS__); \
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/test-corpus.c:82:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(pathname, argv[n]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/test-corpus.c:89:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(pathname + dirname_len, filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:736:19:  [4] (crypto) EVP_des_ecb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ecb(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:742:11:  [4] (crypto) EVP_des_cfb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
#  define EVP_des_cfb EVP_des_cfb64
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:751:19:  [4] (crypto) EVP_des_ofb:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_ofb(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:754:19:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_des_cbc(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:757:19:  [4] (crypto) EVP_desx_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
const EVP_CIPHER *EVP_desx_cbc(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:767:19:  [4] (crypto) EVP_rc4_40:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc4_40(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:782:19:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_40_cbc(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:783:19:  [4] (crypto) EVP_rc2_64_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
const EVP_CIPHER *EVP_rc2_64_cbc(void);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/applink.c:107:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        OPENSSL_ApplinkTable[APPLINK_FPRINTF] = fprintf;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_init.c:31:20:  [4] (crypto) EVP_des_cbc:
  DES only supports a 56-bit keysize, which is too small given today's
  computers (CWE-327). Use a different patent-free encryption algorithm with
  a larger keysize, such as 3DES or AES.
    EVP_add_cipher(EVP_des_cbc());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_init.c:49:20:  [4] (crypto) EVP_rc2_40_cbc:
  These keysizes are too small given today's computers (CWE-327). Use a
  different patent-free encryption algorithm with a larger keysize, such as
  3DES or AES.
    EVP_add_cipher(EVP_rc2_40_cbc());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:2617:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(p, c->name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:5240:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(cursor, prefix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_mcnf.c:23:70:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
static int ssl_do_config(SSL *s, SSL_CTX *ctx, const char *name, int system)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_mcnf.c:37:25:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (name == NULL && system)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_mcnf.c:40:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (!system) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_mcnf.c:51:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (!system)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:192:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy((char *)tls13tbs + TLS13_TBS_START_SIZE, servercontext);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:194:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy((char *)tls13tbs + TLS13_TBS_START_SIZE, clientcontext);
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:58:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  l = snprintf(tmp, sizeof(tmp), fmt, src[0], src[1], src[2], src[3]);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:575:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(mon_file, filename);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:683:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        if (sscanf(p, "BEGIN_EVPROD_INFO\n%sEND_EVPROD_INFO", filename) == 1) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1593:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access(abspath, X_OK) == 0) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:1590:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    X(ACCESS, access(req->path, req->flags));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/haiku.c:117:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system_info system;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/haiku.c:149:29:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  status = get_system_info(&system);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/haiku.c:153:27:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  *cpu_infos = uv__calloc(system.cpu_count, sizeof(**cpu_infos));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/haiku.c:159:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  for (i = 0; i < (int)system.cpu_count; i++) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/haiku.c:164:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  *count = system.cpu_count;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:860:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (6 != sscanf(buf + len,
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:898:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(fp, "%" PRIu64, &val) != 1)
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:1116:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    sscanf(buf, "%" PRIu64, &rc);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/process.c:401:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  execvp(options->file, options->args);
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.h:51:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#if !defined(snprintf) && defined(_MSC_VER) && _MSC_VER < 1900
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.h:52:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
extern int snprintf(char*, size_t, const char*, ...);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:451:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DWORD access;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:501:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access &= ~FILE_WRITE_DATA;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:502:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access |= FILE_APPEND_DATA;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:553:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access |= DELETE;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:594:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access & FILE_APPEND_DATA) {
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:595:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access & FILE_WRITE_DATA) {
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:596:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access &= ~FILE_APPEND_DATA;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:619:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2802:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    XX(ACCESS, access)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/internal.h:118:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int uv_stdio_pipe_server(uv_loop_t* loop, uv_pipe_t* handle, DWORD access,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:205:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int uv_stdio_pipe_server(uv_loop_t* loop, uv_pipe_t* handle, DWORD access,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:215:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access | FILE_FLAG_OVERLAPPED | FILE_FLAG_FIRST_PIPE_INSTANCE | WRITE_DAC,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2085:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  FILE_ACCESS_INFORMATION access;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2116:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      &access,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2117:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      sizeof(access),
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2123:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!(access.AccessFlags & FILE_WRITE_DATA) ||
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2124:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        !(access.AccessFlags & FILE_READ_DATA)) {
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2129:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.AccessFlags & FILE_WRITE_DATA)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2131:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.AccessFlags & FILE_READ_DATA)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process-stdio.c:241:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DWORD access) {
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process-stdio.c:250:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                       access,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process-stdio.c:318:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      access);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:594:7:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      wcscpy(pos, temp_buffer);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:796:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        wcscpy(ptr, required_vars[i].wide_eq);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/snprintf.c:30:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int snprintf(char* buf, size_t len, const char* fmt, ...) {
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1692:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static int uv__get_handle(uv_pid_t pid, int access, HANDLE* handle) {
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1698:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    *handle = OpenProcess(access, FALSE, pid);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/winapi.h:4496:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
# define CTL_CODE(device_type, function, method, access)                      \
data/nodejs-14.13.0~dfsg/deps/uv/src/win/winapi.h:4497:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    (((device_type) << 16) | ((access) << 14) | ((function) << 2) | (method))
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/clocks.c:18:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILETIME system;                                                          \
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/clocks.c:22:57:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (0 == GetProcessTimes((handle), &create, &exit, &system, &user)) {     \
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/clocks.c:28:36:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (0 == FileTimeToSystemTime(&system, &sys_system)) {                    \
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/debug.h:10:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    do { fprintf(stderr, fmt, __VA_ARGS__); } while (0)
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.cc:30:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.cc:44:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                        access));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.cc:49:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                           PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.cc:58:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                        access));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.cc:107:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.cc:111:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return page_allocator_->SetPermissions(address, size, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.h:57:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      Permission access) override;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.h:60:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool AllocatePagesAt(Address address, size_t size, Permission access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/bounded-page-allocator.h:66:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bool SetPermissions(void* address, size_t size, Permission access) override;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/compiler-specific.h:26:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  __attribute__((format(printf, format_param, dots_param)))
data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.cc:40:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                   PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.cc:42:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            static_cast<base::OS::MemoryPermission>(access));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.cc:56:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                   PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.cc:58:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      address, size, static_cast<base::OS::MemoryPermission>(access));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.h:30:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      PageAllocator::Permission access) override;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/page-allocator.h:37:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      PageAllocator::Permission access) override;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:33:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
DWORD GetProtectionFromMemoryPermission(OS::MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:34:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:99:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                   MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:109:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DWORD protect = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:164:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool OS::SetPermissions(void* address, size_t size, MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:170:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DWORD protect = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:224:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(fp, "%" V8PRIxPTR "-%" V8PRIxPTR, &start, &end) != 2) break;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:249:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(lib_name, kLibNameLen,
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc:18:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
uint32_t GetProtectionFromMemoryPermission(OS::MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc:19:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc:42:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                   OS::MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc:67:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t prot = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc:122:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool OS::SetPermissions(void* address, size_t size, MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc:125:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uint32_t prot = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:63:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(fp, "%" V8PRIxPTR "-%" V8PRIxPTR, &start, &end) != 2) break;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:65:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(fp, "%" V8PRIxPTR, &offset) != 1) break;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:90:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(lib_name, kLibNameLen, "%08" V8PRIxPTR "-%08" V8PRIxPTR, start,
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc:58:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (fscanf(fp, "%" V8PRIxPTR "-%" V8PRIxPTR, &start, &end) != 2) break;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc:83:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(lib_name, kLibNameLen,
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:118:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int GetProtectionFromMemoryPermission(OS::MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:119:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:134:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int GetFlagsForMemoryPermission(OS::MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:147:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void* Allocate(void* hint, size_t size, OS::MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:148:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int prot = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:149:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int flags = GetFlagsForMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:333:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                   MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:341:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void* result = base::Allocate(hint, request_size, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:381:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool OS::SetPermissions(void* address, size_t size, MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:385:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int prot = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:399:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access != OS::MemoryPermission::kNoAccess)
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:670:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(format, args);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:687:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(out, format, args);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:704:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, args);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:722:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int n = vsnprintf(str, length, format, args);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:738:10:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
void OS::StrNCpy(char* dest, int length, const char* src, size_t n) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:561:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stream, format, args);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:673:10:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
void OS::StrNCpy(char* dest, int length, const char* src, size_t n) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:753:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
DWORD GetProtectionFromMemoryPermission(OS::MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:754:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:802:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                   MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:812:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DWORD protect = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:869:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
bool OS::SetPermissions(void* address, size_t size, MemoryPermission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:875:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DWORD protect = GetProtectionFromMemoryPermission(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:976:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access |= GENERIC_WRITE;
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:978:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  HANDLE file = CreateFileA(name, access, FILE_SHARE_READ | FILE_SHARE_WRITE,
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:1340:7:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  OS::StrNCpy(name_, sizeof(name_), name, strlen(name));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform.h:214:15:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  static void StrNCpy(char* dest, int length, const char* src, size_t n);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform.h:275:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                              MemoryPermission access);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform.h:282:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                                   MemoryPermission access);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/instructions-arm64.cc:369:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(form_buffer_, sizeof(form_buffer_), string, GetSubstitute(0, mode0),
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constant-pool.cc:89:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (merged || info.overflow()) return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constant-pool.cc:97:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constant-pool.cc:126:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                    ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constant-pool.cc:162:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      entry_access = access;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/constant-pool.h:144:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void EmitGroup(Assembler* assm, ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference.cc:585:56:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return ExternalReference(Redirect(FUNCTION_ADDR(std::printf)));
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:115:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    ConstantPoolEntry::Access access;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:116:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (Assembler::IsConstantPoolLoadStart(pc_, &access))
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:118:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          pc_, constant_pool_, access, ConstantPoolEntry::INTPTR);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:277:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    ConstantPoolEntry::Access access;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:278:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsConstantPoolLoadStart(pc, &access))
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:280:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          pc, constant_pool, access, ConstantPoolEntry::INTPTR));
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:320:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                        ConstantPoolEntry::Access* access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:331:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:339:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      ConstantPoolEntry::Access* access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:352:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:360:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                     ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:367:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DCHECK(access_check == access);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:381:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    int pc_offset, int offset, ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:390:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DCHECK(access_check == access);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:414:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Address pc, Address constant_pool, ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:418:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  addr += GetConstantPoolOffset(pc, access, type);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:452:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    ConstantPoolEntry::Access access;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:453:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (IsConstantPoolLoadStart(pc, &access)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc-inl.h:455:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          pc, constant_pool, access, ConstantPoolEntry::INTPTR)) = target;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc.h:238:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                             ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc.h:241:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      int pc_offset, int offset, ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ppc/assembler-ppc.h:247:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      Address pc, Address constant_pool, ConstantPoolEntry::Access access,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:30:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:39:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:48:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:57:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:67:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:77:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:86:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:95:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:104:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:115:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:125:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:134:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:144:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:156:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:166:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:175:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:185:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:194:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:203:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:213:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:222:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:232:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:241:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:250:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:259:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:269:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:279:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:289:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:299:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:309:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:319:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:329:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:343:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.type = type_cache->kFixedDoubleArrayLengthType;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:344:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.machine_type = MachineType::TaggedSigned();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:345:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.write_barrier_kind = kNoWriteBarrier;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:347:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.type = type_cache->kFixedArrayLengthType;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:348:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.machine_type = MachineType::TaggedSigned();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:349:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.write_barrier_kind = kNoWriteBarrier;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:351:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:360:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:369:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:381:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:393:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:405:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:414:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:428:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:441:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:453:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:463:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:472:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:481:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:490:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:499:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:508:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:517:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:529:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:539:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:549:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:558:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:567:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:576:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:585:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:594:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:603:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:613:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:623:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:632:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:644:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:653:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:662:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:671:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:680:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:689:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:702:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:710:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:718:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:728:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:738:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:752:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:764:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:773:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:785:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:796:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:806:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:817:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:826:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:835:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:847:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:859:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:866:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:877:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.type = Type::SignedSmall();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:878:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.machine_type = MachineType::TaggedSigned();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:879:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.write_barrier_kind = kNoWriteBarrier;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:882:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.type = TypeCache::Get()->kHoleySmi;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:885:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.type = Type::NonInternal();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:890:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.type = Type::Number();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:891:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.write_barrier_kind = kNoWriteBarrier;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:892:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.machine_type = MachineType::Float64();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:895:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.type = Type::NumberOrHole();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:896:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.write_barrier_kind = kNoWriteBarrier;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:897:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.machine_type = MachineType::Float64();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:902:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:912:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:920:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:929:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:938:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:952:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:959:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:965:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:971:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:977:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:983:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:989:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:995:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1015:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1028:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1041:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1055:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1071:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1087:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1103:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1113:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1126:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/access-builder.cc:1139:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder.h:40:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void Store(const FieldAccess& access, Node* value) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder.h:41:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    effect_ = graph()->NewNode(simplified()->StoreField(access), allocation_,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder.h:46:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void Store(ElementAccess const& access, Node* index, Node* value) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder.h:47:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    effect_ = graph()->NewNode(simplified()->StoreElement(access), allocation_,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder.h:59:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void Store(const FieldAccess& access, const ObjectRef& value) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/allocation-builder.h:60:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Store(access, jsgraph()->Constant(value));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.cc:172:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                                   ObjectAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.cc:179:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MachineRepresentation representation = access.machine_type.representation();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.cc:198:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                                  ObjectAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.cc:206:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  FieldInfo info(value, access.machine_type.representation());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.h:86:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Reduction ReduceLoadFromObject(Node* node, ObjectAccess const& access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/csa-load-elimination.h:87:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Reduction ReduceStoreToObject(Node* node, ObjectAccess const& access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:3580:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ StoreElement(access, result, index, the_hole);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:3625:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ StoreElement(access, result, index, the_hole);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:5402:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.type = value_type;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:5403:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.write_barrier_kind = kNoWriteBarrier;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:5405:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  __ StoreElement(access, elements, index, value);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:5447:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.type = Type::SignedSmall();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:5448:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.machine_type = MachineType::TaggedSigned();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:5449:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.write_barrier_kind = kNoWriteBarrier;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/effect-control-linearizer.cc:5451:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ StoreElement(access, elements, index, smi_value);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:509:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.offset;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:512:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int OffsetOfElementAt(ElementAccess const& access, int index) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:514:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DCHECK_GE(ElementSizeLog2Of(access.machine_type.representation()),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:516:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.header_size +
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:517:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         (index << ElementSizeLog2Of(access.machine_type.representation()));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:640:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            (vobject->size() - access.header_size) >>
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:641:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            ElementSizeLog2Of(access.machine_type.representation());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:646:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            vobject->FieldAt(OffsetOfElementAt(access, 0)).To(&var) &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:649:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
             NodeProperties::GetType(value).Is(access.type))) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:656:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                   vobject->FieldAt(OffsetOfElementAt(access, 0)).To(&var0) &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:659:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                    NodeProperties::GetType(value0).Is(access.type)) &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:660:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                   vobject->FieldAt(OffsetOfElementAt(access, 1)).To(&var1) &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:663:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                    NodeProperties::GetType(value1).Is(access.type))) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:676:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                jsgraph->common()->Select(access.machine_type.representation()),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/escape-analysis.cc:678:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            NodeProperties::SetType(select, access.type);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:571:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* JSGraphAssembler::LoadField(FieldAccess const& access, Node* object) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:572:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* value = AddNode(graph()->NewNode(simplified()->LoadField(access),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:577:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* JSGraphAssembler::LoadElement(ElementAccess const& access, Node* object,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:579:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* value = AddNode(graph()->NewNode(simplified()->LoadElement(access),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:584:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* JSGraphAssembler::StoreField(FieldAccess const& access, Node* object,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:586:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return AddNode(graph()->NewNode(simplified()->StoreField(access), object,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:590:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* JSGraphAssembler::StoreElement(ElementAccess const& access, Node* object,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.cc:592:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return AddNode(graph()->NewNode(simplified()->StoreElement(access), object,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.h:803:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  TNode<T> LoadField(FieldAccess const& access, TNode<HeapObject> object) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.h:807:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return TNode<T>::UncheckedCast(LoadField(access, object));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.h:811:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  TNode<T> LoadElement(ElementAccess const& access, TNode<HeapObject> object,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-assembler.h:816:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return TNode<T>::UncheckedCast(LoadElement(access, object, index));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:927:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    FieldAccess access(
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:932:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        simplified()->LoadField(access), node, effect(), control()));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:3654:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access.offset == JSArray::kLengthOffset) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:3663:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        } else if (access.offset == JSObject::kElementsOffset) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:5326:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              graph()->NewNode(simplified()->LoadElement(access), elements,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:5329:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              simplified()->StoreElement(access), elements,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:7130:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* node, InstanceType instance_type, FieldAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:7144:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* value = effect = graph()->NewNode(simplified()->LoadField(access),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:7192:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Reduction JSCallReducer::ReduceDataViewAccess(Node* node, DataViewAccess access,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.cc:7313:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.h:193:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          FieldAccess const& access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-call-reducer.h:196:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Reduction ReduceDataViewAccess(Node* node, DataViewAccess access,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:53:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DCHECK_LE(new_depth, access.depth());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:55:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (new_depth == access.depth() &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:61:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      new_depth, access.index(), access.immutable());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:61:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      new_depth, access.index(), access.immutable());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:72:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DCHECK_LE(new_depth, access.depth());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:74:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (new_depth == access.depth() &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:80:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      jsgraph_->javascript()->StoreContext(new_depth, access.index());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:133:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  size_t depth = access.depth();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:154:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.immutable()) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:162:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  maybe_value = concrete.get(static_cast<int>(access.index()));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:165:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    TRACE_BROKER_MISSING(broker(), "slot value " << access.index()
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-context-specialization.cc:195:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  size_t depth = access.depth();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1595:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    a.Store(access, index, value);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1620:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    a.Store(access, index, values[i]);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1652:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.machine_type = MachineType::Float64();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1653:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.type = Type::Number();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1662:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access.const_field_info = ConstFieldInfo::None();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1672:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access.const_field_info = ConstFieldInfo::None();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1697:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    inobject_fields.push_back(std::make_pair(access, value));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1707:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    inobject_fields.push_back(std::make_pair(access, value));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-create-lowering.cc:1783:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    builder.Store(access, jsgraph()->Constant(i), elements_values[i]);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-heap-copy-reducer.cc:140:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access.map.ToHandle(&map_handle)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-heap-copy-reducer.cc:144:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access.name.ToHandle(&name_handle)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-native-context-specialization.cc:761:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:139:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
size_t hash_value(ContextAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:140:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.depth(), access.index(), access.immutable());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:140:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.depth(), access.index(), access.immutable());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:140:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.depth(), access.index(), access.immutable());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:144:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
std::ostream& operator<<(std::ostream& os, ContextAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:145:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return os << access.depth() << ", " << access.index() << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:145:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return os << access.depth() << ", " << access.index() << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:146:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            << access.immutable();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:997:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  NamedAccess access(LanguageMode::kSloppy, name, feedback);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1002:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                          // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1007:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  PropertyAccess access(LanguageMode::kSloppy, feedback);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1012:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                             // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1017:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GetIteratorParameters access(load_feedback, call_feedback);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1022:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                            // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1026:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  PropertyAccess access(LanguageMode::kSloppy, feedback);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1031:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                            // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1094:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  NamedAccess access(language_mode, name, feedback);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1099:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                           // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1104:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  PropertyAccess access(language_mode, feedback);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1109:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                              // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1169:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ContextAccess access(depth, index, immutable);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1175:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                   // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1180:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ContextAccess access(depth, index, false);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-operator.cc:1186:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access);                                   // parameter
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-typed-lowering.cc:1353:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  for (size_t i = 0; i < access.depth(); ++i) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-typed-lowering.cc:1364:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      simplified()->LoadField(AccessBuilder::ForContextSlot(access.index())));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-typed-lowering.cc:1375:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  for (size_t i = 0; i < access.depth(); ++i) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/js-typed-lowering.cc:1386:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      simplified()->StoreField(AccessBuilder::ForContextSlot(access.index())));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:906:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                           FieldAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:912:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.offset == HeapObject::kMapOffset &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:913:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.base_is_tagged == kTaggedBase) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:914:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DCHECK(IsAnyTagged(access.machine_type.representation()));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:923:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    IndexRange field_index = FieldIndexOf(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:926:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          access.machine_type.representation();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:928:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          state->LookupField(object, field_index, access.const_field_info);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:929:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (!lookup_result && access.const_field_info.IsConst()) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:957:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      FieldInfo info(node, representation, access.name,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:958:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     access.const_field_info);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:963:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.map.ToHandle(&field_map)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:970:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                            FieldAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:976:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.offset == HeapObject::kMapOffset &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:977:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.base_is_tagged == kTaggedBase) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:978:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DCHECK(IsAnyTagged(access.machine_type.representation()));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:989:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    IndexRange field_index = FieldIndexOf(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:991:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      bool is_const_store = access.const_field_info.IsConst();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:993:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          access.machine_type.representation();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:995:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          state->LookupField(object, field_index, access.const_field_info);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1014:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            is_const_store && !access.is_store_in_literal;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1028:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      FieldInfo new_info(new_value, representation, access.name,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1029:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                         access.const_field_info);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1030:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (is_const_store && access.is_store_in_literal) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1036:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      state = state->KillField(object, field_index, access.name, zone());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1047:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      state = state->KillFields(object, access.name, zone());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1062:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.machine_type.representation()) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1080:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              object, index, access.machine_type.representation())) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1093:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                access.machine_type.representation(), zone());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1108:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      state->LookupElement(object, index, access.machine_type.representation());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1116:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.machine_type.representation()) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1134:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                access.machine_type.representation(), zone());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1253:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    FieldAccess const& access) const {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1255:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.offset == HeapObject::kMapOffset) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1259:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    IndexRange field_index = FieldIndexOf(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1261:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      state = state->KillFields(object, access.name, zone());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1263:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      state = state->KillField(object, field_index, access.name, zone());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1330:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            state = ComputeLoopStateForStoreField(current, state, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1408:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    FieldAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1409:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MachineRepresentation rep = access.machine_type.representation();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1435:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.base_is_tagged != kTaggedBase) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.cc:1439:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return FieldIndexOf(access.offset, representation_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.h:304:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Reduction ReduceLoadField(Node* node, FieldAccess const& access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.h:305:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Reduction ReduceStoreField(Node* node, FieldAccess const& access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.h:320:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      FieldAccess const& access) const;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/load-elimination.h:325:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  static IndexRange FieldIndexOf(FieldAccess const& access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:291:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  NodeProperties::ChangeOp(node, machine()->Load(access.machine_type));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:299:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  node->ReplaceInput(1, ComputeIndex(access, index));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:300:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MachineType type = access.machine_type;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:301:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (NeedsPoisoning(access.load_sensitivity)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:335:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* offset = __ IntPtrConstant(access.offset - access.tag());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:335:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* offset = __ IntPtrConstant(access.offset - access.tag());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:337:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MachineType type = access.machine_type;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:338:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (NeedsPoisoning(access.load_sensitivity)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:344:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.type.Is(Type::SandboxedExternalPointer())) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:348:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DCHECK(!access.type.Is(Type::SandboxedExternalPointer()));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:360:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      node, object, value, state, access.write_barrier_kind);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:363:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                access.machine_type.representation(), write_barrier_kind)));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:374:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  node->ReplaceInput(1, ComputeIndex(access, index));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:376:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      node, object, value, state, access.write_barrier_kind);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:379:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                access.machine_type.representation(), write_barrier_kind)));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:389:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                 !access.type.Is(Type::ExternalPointer()) &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:390:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                     !access.type.Is(Type::SandboxedExternalPointer()));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:394:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      node, object, value, state, access.write_barrier_kind);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:395:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* offset = __ IntPtrConstant(access.offset - access.tag());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:395:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* offset = __ IntPtrConstant(access.offset - access.tag());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:399:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                access.machine_type.representation(), write_barrier_kind)));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:420:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* MemoryLowering::ComputeIndex(ElementAccess const& access, Node* index) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:422:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      ElementSizeLog2Of(access.machine_type.representation());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:426:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int const fixed_offset = access.header_size - access.tag();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.cc:426:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int const fixed_offset = access.header_size - access.tag();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/memory-lowering.h:111:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* ComputeIndex(ElementAccess const& access, Node* node);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-properties.cc:421:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access.base_is_tagged == kTaggedBase &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/node-properties.cc:422:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.offset == HeapObject::kMapOffset) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/raw-machine-assembler.h:152:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* load = AddNode(simplified()->LoadFromObject(access), base, offset);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/raw-machine-assembler.h:169:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    AddNode(simplified()->StoreToObject(access), object, offset, value);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/representation-change.h:333:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MachineType TypeForBasePointer(const FieldAccess& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/representation-change.h:334:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return access.tag() != 0 ? MachineType::AnyTagged()
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/representation-change.h:338:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MachineType TypeForBasePointer(const ElementAccess& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/representation-change.h:339:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return access.tag() != 0 ? MachineType::AnyTagged()
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:159:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
UseInfo UseInfoForBasePointer(const FieldAccess& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:160:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.tag() != 0 ? UseInfo::AnyTagged() : UseInfo::Word();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:163:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
UseInfo UseInfoForBasePointer(const ElementAccess& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:164:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access.tag() != 0 ? UseInfo::AnyTagged() : UseInfo::Word();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3043:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.machine_type.representation();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3044:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        VisitUnop<T>(node, UseInfoForBasePointer(access), representation);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3052:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.machine_type.representation();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3060:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.base_is_tagged, field_representation, access.offset,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3060:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.base_is_tagged, field_representation, access.offset,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3061:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.type, input_info->representation(), value_node);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3063:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ProcessInput<T>(node, 0, UseInfoForBasePointer(access));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3069:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (write_barrier_kind < access.write_barrier_kind) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3070:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.write_barrier_kind = write_barrier_kind;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3072:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                node, jsgraph_->simplified()->StoreField(access));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3080:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        VisitBinop<T>(node, UseInfoForBasePointer(access), UseInfo::Word(),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3081:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      access.machine_type.representation());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3094:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.machine_type.representation();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3102:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.base_is_tagged, element_representation, access.type,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3102:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.base_is_tagged, element_representation, access.type,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3104:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ProcessInput<T>(node, 0, UseInfoForBasePointer(access));  // base
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3112:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          if (write_barrier_kind < access.write_barrier_kind) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3113:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access.write_barrier_kind = write_barrier_kind;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-lowering.cc:3115:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                node, jsgraph_->simplified()->StoreElement(access));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:66:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
size_t hash_value(FieldAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:70:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.base_is_tagged, access.offset,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:70:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.base_is_tagged, access.offset,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:71:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            access.machine_type, access.const_field_info,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:71:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            access.machine_type, access.const_field_info,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:72:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            access.is_store_in_literal);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:91:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
std::ostream& operator<<(std::ostream& os, FieldAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:92:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << "[" << access.base_is_tagged << ", " << access.offset << ", ";
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:92:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << "[" << access.base_is_tagged << ", " << access.offset << ", ";
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:95:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.name.ToHandle(&name)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:100:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.map.ToHandle(&map)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:104:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << access.type << ", " << access.machine_type << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:104:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << access.type << ", " << access.machine_type << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:105:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     << access.write_barrier_kind << ", " << access.const_field_info;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:105:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     << access.write_barrier_kind << ", " << access.const_field_info;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:106:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_store_in_literal) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:110:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    os << ", " << access.load_sensitivity;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:135:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
size_t hash_value(ElementAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:139:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.base_is_tagged, access.header_size,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:139:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.base_is_tagged, access.header_size,
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:140:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            access.machine_type);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:143:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
std::ostream& operator<<(std::ostream& os, ElementAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:144:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << access.base_is_tagged << ", " << access.header_size << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:144:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << access.base_is_tagged << ", " << access.header_size << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:145:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     << access.type << ", " << access.machine_type << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:145:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     << access.type << ", " << access.machine_type << ", "
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:146:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     << access.write_barrier_kind;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:148:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    os << ", " << access.load_sensitivity;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:158:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
size_t hash_value(ObjectAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:159:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.machine_type, access.write_barrier_kind);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:159:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return base::hash_combine(access.machine_type, access.write_barrier_kind);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:162:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
std::ostream& operator<<(std::ostream& os, ObjectAccess const& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:163:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << access.machine_type << ", " << access.write_barrier_kind;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:163:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  os << access.machine_type << ", " << access.write_barrier_kind;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:1804:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const Operator* SimplifiedOperatorBuilder::Name(const Type& access) {        \
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/simplified-operator.cc:1809:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                        output_count, 1, 0, access);                           \
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/state-values-utils.cc:240:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto it = access.begin();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/state-values-utils.cc:241:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  auto itend = access.end();
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:211:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  StoreOffset ToOffset(const FieldAccess& access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:212:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DCHECK_GE(access.offset, 0);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:213:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return static_cast<StoreOffset>(access.offset);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:280:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      StoreOffset offset = ToOffset(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:287:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              offset, MachineReprToString(access.machine_type.representation()),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:294:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              MachineReprToString(access.machine_type.representation()),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:302:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      StoreOffset offset = ToOffset(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/store-store-elimination.cc:308:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
          MachineReprToString(access.machine_type.representation()),
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typed-optimization.cc:291:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.base_is_tagged == kTaggedBase &&
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typed-optimization.cc:292:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.offset == HeapObject::kMapOffset) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typer.cc:1493:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access.index()) {
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:249:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  execvp(exec_args.arg0(), exec_args.arg_array());
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:494:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(address_string, sizeof(address_string), "%" PRIu64,
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3558:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(re_form, sizeof(re_form), form, (reg_num + 1) % kNumberOfVRegisters,
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4298:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  buffer_pos_ += vsnprintf(&buffer_[buffer_pos_], buffer_size_, format, args);
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/code-tracer.h:26:7:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      StrNCpy(filename_, FLAG_redirect_code_traces_to, filename_.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:40:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define SScanF sscanf  // NOLINT
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:32:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define SScanF sscanf  // NOLINT
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:5887:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          part_result = fprintf(stream_, chunks[i], wreg(pcs_r++));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:5890:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          part_result = fprintf(stream_, chunks[i], xreg(pcs_r++));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:5893:25:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          part_result = fprintf(stream_, chunks[i], dreg(pcs_f++));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate.cc:1376:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(this);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate.cc:1388:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      ExecutionAccess access(this);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:47:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define SScanF sscanf  // NOLINT
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:64:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define SScanF sscanf  // NOLINT
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:38:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define SScanF sscanf  // NOLINT
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:34:16:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define SScanF sscanf  // NOLINT
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:34:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:49:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:60:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:61:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (has_pending_interrupts(access)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:62:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    set_interrupt_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:67:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:68:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:72:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:91:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (has_pending_interrupts(access)) set_interrupt_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:91:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (has_pending_interrupts(access)) set_interrupt_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:93:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!has_pending_interrupts(access)) reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:93:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!has_pending_interrupts(access)) reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:100:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:121:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (has_pending_interrupts(access)) set_interrupt_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:121:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (has_pending_interrupts(access)) set_interrupt_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:127:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:132:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:141:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  set_interrupt_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:148:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:157:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!has_pending_interrupts(access)) reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:157:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!has_pending_interrupts(access)) reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:161:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:171:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!has_pending_interrupts(access)) reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:171:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (!has_pending_interrupts(access)) reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:175:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    reset_limits(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:182:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/stack-guard.cc:189:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/v8threads.cc:112:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate_);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/v8threads.cc:123:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    InitThread(access);
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:3905:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      ExecutionAccess access(isolate());
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4480:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ExecutionAccess access(isolate());
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-spaces.cc:82:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                           PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-spaces.cc:88:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    CHECK(SetPermissions(page_allocator, p->address(), p->size(), access));
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-spaces.h:100:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                              PageAllocator::Permission access);
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-runtime-agent-impl.cc:644:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  std::snprintf(buf, sizeof(buf), "%" PRIx64, m_inspector->isolateId());
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/strings-storage.cc:34:5:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    StrNCpy(dst, src, len);
data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/lsan-page-allocator.cc:25:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/lsan-page-allocator.cc:26:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void* result = page_allocator_->AllocatePages(hint, size, alignment, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/lsan-page-allocator.h:35:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      PageAllocator::Permission access) override;
data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/lsan-page-allocator.h:42:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                      PageAllocator::Permission access) override {
data/nodejs-14.13.0~dfsg/deps/v8/src/sanitizer/lsan-page-allocator.h:43:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return page_allocator_->SetPermissions(address, size, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc:28:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return fprintf(fp_, "0x%" PRIx64, value);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc:74:12:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return fprintf(fp(), "0x%" PRIx64 "%016" PRIx64, high, low);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc:76:12:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return fprintf(fp(), "0x%" PRIx64, low);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-win.cc:524:12:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return fprintf(fp_, "0x%" PRIx64, value);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-win.cc:671:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  return fprintf(fp_, "0x%" PRIx64, value);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:166:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                    size_t alignment, PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:175:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    result = page_allocator->AllocatePages(hint, size, alignment, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:199:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                    size_t size, PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:201:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return page_allocator->SetPermissions(address, size, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:243:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                   PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:246:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      v8::internal::SetPermissions(page_allocator_, address, size, access);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.h:113:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          PageAllocator::Permission access);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.h:138:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          PageAllocator::Permission access);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.h:140:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                           size_t size, PageAllocator::Permission access) {
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.h:142:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                        access);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.h:222:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                        PageAllocator::Permission access);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:15:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf sprintf_s
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:127:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(buf, sizeof(buf), format, c);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:136:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(buf, sizeof(buf), format, c);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:177:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  snprintf(buf, kMaxHexLength, "%s%.*" PRIx64, hex.with_prefix ? "0x" : "",
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:197:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:132:6:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
void StrNCpy(Vector<char> dest, const char* src, size_t n) {
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:133:13:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  base::OS::StrNCpy(dest.begin(), dest.length(), src, n);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.h:575:6:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
void StrNCpy(Vector<char> dest, const char* src, size_t n);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/callback.c:14:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf("%" PRIu32, val.of.i32);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/callback.c:17:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf("%" PRIu64, val.of.i64);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:154:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buffer,newdir);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzguts.h:86:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#    if !defined(vsnprintf) && !defined(NO_vsnprintf)
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzguts.h:88:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#         define vsnprintf _vsnprintf
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzguts.h:110:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzguts.h:110:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:216:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(state->path, path);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:614:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state->msg, state->path);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:616:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(state->msg, msg);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:417:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(next, format, va);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:421:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = vsprintf(next, format, va);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:425:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(next, state->size, format, va);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:428:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(next, state->size, format, va);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:511:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11, a12,
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:517:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11,
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:522:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8, a9,
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:526:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:257:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Trace(x) {if (z_verbose>=0) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:258:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracev(x) {if (z_verbose>0) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:259:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracevv(x) {if (z_verbose>1) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:260:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:261:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/zlib/gzguts.h:86:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#    if !defined(vsnprintf) && !defined(NO_vsnprintf)
data/nodejs-14.13.0~dfsg/deps/zlib/gzguts.h:88:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#         define vsnprintf _vsnprintf
data/nodejs-14.13.0~dfsg/deps/zlib/gzguts.h:110:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/nodejs-14.13.0~dfsg/deps/zlib/gzguts.h:110:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:216:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(state->path, path);
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:614:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(state->msg, state->path);
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:616:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(state->msg, msg);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:417:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(next, format, va);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:421:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = vsprintf(next, format, va);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:425:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(next, state->size, format, va);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:428:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = vsnprintf(next, state->size, format, va);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:511:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11, a12,
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:517:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11,
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:522:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8, a9,
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:526:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:257:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Trace(x) {if (z_verbose>=0) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:258:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracev(x) {if (z_verbose>0) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:259:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracevv(x) {if (z_verbose>1) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:260:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;}
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:261:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;}
data/nodejs-14.13.0~dfsg/src/inspector_socket_server.cc:106:20:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int header_len = snprintf(header,
data/nodejs-14.13.0~dfsg/src/node_file.cc:853:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    FS_SYNC_TRACE_BEGIN(access);
data/nodejs-14.13.0~dfsg/src/node_file.cc:855:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    FS_SYNC_TRACE_END(access);
data/nodejs-14.13.0~dfsg/src/node_process_events.cc:93:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(warning, sizeof(warning), fmt, ap);
data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider-inl.h:221:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(symbuf, s);  \
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:1601:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define vsnprintf _vsnprintf
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:4522:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(fmt, args);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:4543:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(fmt, args);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:4550:3:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vprintf(fmt, args);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2321:20:  [4] (buffer) StrNCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
inline const char* StrNCpy(char* dest, const char* src, size_t n) {
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2391:26:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define GTEST_SNPRINTF_ _snprintf
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2393:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# define GTEST_SNPRINTF_ snprintf
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:9796:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(\
data/nodejs-14.13.0~dfsg/test/wasi/c/stat.c:49:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ret = access(PATH, R_OK);
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2058:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(codepage,UCNV_SWAP_LFNL_OPTION_STRING);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:441:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      path_hosts = getenv("CARES_HOSTS");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:119:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *env = getenv("CARES_MEMDEBUG");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:123:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = getenv("CARES_MEMLIMIT");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:564:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  localdomain = getenv("LOCALDOMAIN");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:572:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  res_options = getenv("RES_OPTIONS");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1495:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  line = getenv("Inet$Resolvers");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_private.h:105:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#  define getenv(ptr) ares_getenv(ptr)
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:256:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      hostaliases = getenv("HOSTALIASES");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:388:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        tmp = getenv(arg + 4);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2507:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (istext(format) && (prefix = getenv("HARNESS_OSSL_PREFIX")) != NULL) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:104:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((t = getenv("OPENSSL_CONF")) != NULL)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:148:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    p = getenv("OPENSSL_DEBUG_MEMORY");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:153:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("OPENSSL_FIPS")) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:515:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    } else if ((env = getenv(X509_get_default_cert_dir_env())) != NULL) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_time.c:190:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        cipher = getenv("SSL_CIPHER");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_decc_init.c:116:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    openssl_debug_decc_init = getenv("OPENSSL_DEBUG_DECC_INIT");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/armcap.c:112:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((e = getenv("OPENSSL_armcap"))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:49:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#   define ossl_getenv getenv
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:523:11:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    dll = LoadLibrary(TEXT(DLLNAME));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:622:11:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    dll = LoadLibrary(TEXT(DLLNAME));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/getenv.c:29:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    return getenv(name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:140:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#  define random() rand()
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:147:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    int roll = (int)(random() % 100);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:183:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *cp = getenv("OPENSSL_MALLOC_FAILURES");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:187:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((cp = getenv("OPENSSL_MALLOC_FD")) != NULL)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:243:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((e = getenv("OPENSSL_ppccap"))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c:177:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            ts.tv_nsec = random();
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sparcv9cap.c:160:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((e = getenv("OPENSSL_sparcv9cap"))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/threads_win.c:34:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(lock);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/threads_win.c:42:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(lock);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/threads_win.c:48:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(lock);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:465:27:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        HMODULE cryptui = LoadLibrary(TEXT("CRYPTUI.DLL"));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:5091:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        *out = s->clienthello->random;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:676:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    unsigned char random[SSL3_RANDOM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:1508:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        memset(clienthello->random, 0, SSL3_RANDOM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:1522:50:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        if (!PACKET_copy_bytes(pkt, clienthello->random, SSL3_RANDOM_SIZE)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:1647:47:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    memcpy(s->s3->client_random, clienthello->random, SSL3_RANDOM_SIZE);
data/nodejs-14.13.0~dfsg/deps/uv/include/uv.h:180:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  XX(RANDOM, random)                                                          \
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/darwin.h:47:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char* realpath;                                                             \
data/nodejs-14.13.0~dfsg/deps/uv/src/threadpool.c:194:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  val = getenv("UV_THREADPOOL_SIZE");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1104:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    buf = getenv(name);                                                       \
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1318:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  var = getenv(name);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1561:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(prog, abspath) != abspath)
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1579:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  path_env = getenv("PATH");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1591:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(trypath, abspath) == abspath) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin.c:91:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  if (realpath(exepath, abspath) != abspath)
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:751:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  buf = realpath(req->path, NULL);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:765:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  if (realpath(req->path, buf) == NULL) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:273:32:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
      if (memcmp(path, handle->realpath, handle->realpath_len) != 0)
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:276:50:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
      if (!(handle->realpath_len == 1 && handle->realpath[0] == '/')) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:462:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
      assert(curr->realpath != NULL);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:464:67:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          pCFStringCreateWithFileSystemRepresentation(NULL, curr->realpath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:822:22:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  handle->realpath = realpath(handle->path, NULL);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:825:41:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  handle->realpath_len = strlen(handle->realpath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:874:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  uv__free(handle->realpath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:916:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  uv__free(handle->realpath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:525:7:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  if (realpath(tmpbuf, realpathstr) == NULL) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/qnx.c:63:3:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  realpath(_cmdname(NULL), path);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/tcp.c:339:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* val = getenv("UV_TCP_SINGLE_ACCEPT");
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2820:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    XX(REALPATH, realpath)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:130:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&handle->pipe.conn.readfile_thread_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:748:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&handle->pipe.conn.readfile_thread_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:1002:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:1028:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/signal.c:43:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&uv__signal_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/signal.c:87:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&uv__signal_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/signal.c:167:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&uv__signal_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/signal.c:217:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&uv__signal_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/thread.c:208:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(mutex);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/thread.c:224:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(mutex);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/thread.c:249:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&rwlock->state_.num_readers_lock_);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/thread.c:266:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&rwlock->state_.num_readers_lock_);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/thread.c:315:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&rwlock->state_.num_readers_lock_);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:83:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&process_title_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:430:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&process_title_lock);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:465:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&process_title_lock);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/mutex.cc:233:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&native_handle_);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/mutex.cc:247:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&native_handle_);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:1129:12:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  module = LoadLibrary(TEXT("dbghelp.dll"));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:1144:12:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  module = LoadLibrary(TEXT("kernel32.dll"));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/region-allocator.cc:146:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      rng->NextBytes(&random, sizeof(random));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/region-allocator.cc:146:38:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      rng->NextBytes(&random, sizeof(random));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/region-allocator.cc:147:44:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      size_t random_offset = page_size_ * (random % region_size_in_pages_);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/utils/random-number-generator.h:115:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return bit_cast<double>(random) - 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/unwinding-info-win64.cc:501:9:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        LoadLibraryEx(L"ntdll.dll", nullptr, LOAD_LIBRARY_SEARCH_SYSTEM32);
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger-script.cc:27:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  static uint64_t random[] = {0x67452301, 0xEFCDAB89, 0x98BADCFE, 0x10325476,
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger-script.cc:56:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    zi[current] = (zi[current] * random[current]) % prime[current];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-debugger-script.cc:76:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    zi[current] = (zi[current] * random[current]) % prime[current];
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/sampling-heap-profiler.h:134:43:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
             base::RandomNumberGenerator* random)
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/sampling-heap-profiler.h:138:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          random_(random),
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/crypt.h:112:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand((unsigned)(time(NULL) ^ ZCR_SEED2));
data/nodejs-14.13.0~dfsg/src/node_file.cc:1584:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    FS_SYNC_TRACE_BEGIN(realpath);
data/nodejs-14.13.0~dfsg/src/node_file.cc:1587:23:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    FS_SYNC_TRACE_END(realpath);
data/nodejs-14.13.0~dfsg/test/addons/dlopen-ping-pong/binding.cc:27:6:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
void LoadLibrary(const FunctionCallbackInfo<Value>& args) {
data/nodejs-14.13.0~dfsg/test/addons/dlopen-ping-pong/binding.cc:44:36:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  NODE_SET_METHOD(exports, "load", LoadLibrary);
data/nodejs-14.13.0~dfsg/test/addons/worker-addon/binding.cc:44:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (getenv("addExtraItemToEventLoop") != nullptr) {
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:701:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void ShuffleRange(internal::Random* random, int begin, int end,
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:722:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
inline void Shuffle(internal::Random* random, std::vector<E>* v) {
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:723:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random, 0, static_cast<int>(v->size()), v);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:1204:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  internal::Random* random() { return &random_; }
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:4319:48:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void TestSuite::ShuffleTests(internal::Random* random) {
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:4320:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  Shuffle(random, &test_indices_);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:6716:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      random()->Reseed(random_seed_);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:7075:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random(), 0, last_death_test_suite_ + 1, &test_suite_indices_);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:7078:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  ShuffleRange(random(), last_death_test_suite_ + 1,
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:7083:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    test_suite->ShuffleTests(random());
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10031:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  ::InitializeCriticalSection(critical_section_);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10046:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  ::EnterCriticalSection(critical_section_);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10119:11:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        ::InitializeCriticalSection(critical_section_);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2360:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const env = getenv(name);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2363:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  return getenv(name);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:13427:39:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  void ShuffleTests(internal::Random* random);
data/nodejs-14.13.0~dfsg/test/wasi/c/poll.c:16:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  platform = getenv("NODE_PLATFORM");
data/nodejs-14.13.0~dfsg/test/wasi/c/readdir.c:15:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  platform = getenv("NODE_PLATFORM");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:256:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *fake_start = getenv("U_FAKETIME_START");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:857:68:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    fprintf(stderr, "TZ=%s std=%s dst=%s daylight=%d offset=%d\n", getenv("TZ"), stdID, dstID, daylightType, offset);
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1087:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    tzid = getenv("TZ");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1384:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        path=getenv("ICU_DATA");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1398:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *prefix = getenv(ICU_DATA_DIR_PREFIX_ENV_VAR);
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1471:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    dir = getenv("ICU_TIMEZONE_FILES_DIR");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1539:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            posixID = getenv("LC_ALL");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1545:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                posixID = getenv(category == LC_MESSAGES ? "LC_MESSAGES" : "LC_CTYPE");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1549:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                posixID = getenv(category == LC_MESSAGES ? "LC_MESSAGES" : "LC_CTYPE");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1552:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                    posixID = getenv("LANG");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1785:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const  char *localeID = getenv("LC_ALL");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1789:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        localeID = getenv("LANG");
data/nodejs-14.13.0~dfsg/deps/cares/include/ares.h:517:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char _S6_u8[16];
data/nodejs-14.13.0~dfsg/deps/cares/include/ares_rules.h:90:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char
data/nodejs-14.13.0~dfsg/deps/cares/include/ares_rules.h:100:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__get_hostent.c:188:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hostent->h_addr_list[0], &addr.addrV4, sizeof(addr.addrV4));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__get_hostent.c:190:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hostent->h_addr_list[0], &addr.addrV6, sizeof(addr.addrV6));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__parse_into_addrinfo.c:144:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&sin->sin_addr.s_addr, aptr, sizeof(struct in_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__parse_into_addrinfo.c:181:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&sin6->sin6_addr.s6_addr, aptr, sizeof(struct ares_in6_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__readaddrinfo.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *aliases[MAX_ALIASES];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__readaddrinfo.c:188:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(node->ai_addr, &addr.sa4, sizeof(addr.sa4));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__readaddrinfo.c:209:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(node->ai_addr, &addr.sa6, sizeof(addr.sa6));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:234:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[4096];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:365:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(node->ai_addr, &addr.sa4, sizeof(addr.sa4));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(node->ai_addr, &addr.sa6, sizeof(addr.sa6));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:447:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char PATH_HOSTS[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:456:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char tmp[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getaddrinfo.c:486:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path_hosts, "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[128];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char PATH_HOSTS[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:218:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(PATH_HOSTS, "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:274:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(name, "%lu.%lu.%lu.%lu.in-addr.arpa", a4, a3, a2, a1);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:281:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(name,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:287:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(name+strlen(name),
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *aliases[1] = { NULL };
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:256:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *addrs[2];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char PATH_HOSTS[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:365:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:398:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(PATH_HOSTS, "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:450:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&a1, host->h_addr_list[i1], sizeof(struct in_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:454:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&a2, host->h_addr_list[i2], sizeof(struct in_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:458:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(host->h_addr_list[i2 + 1], &a2, sizeof(struct in_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:460:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(host->h_addr_list[i2 + 1], &a1, sizeof(struct in_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:506:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&a1, host->h_addr_list[i1], sizeof(struct ares_in6_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:510:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&a2, host->h_addr_list[i2], sizeof(struct ares_in6_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:514:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(host->h_addr_list[i2 + 1], &a2, sizeof(struct ares_in6_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyname.c:516:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(host->h_addr_list[i2 + 1], &a1, sizeof(struct ares_in6_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:117:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[33], *service;
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:131:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ipbuf[IPBUFSIZ];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:132:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char srvbuf[33];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char srvbuf[33];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:223:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char buf[255];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:243:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ipbuf[IPBUFSIZ];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:283:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[4096];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:336:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(tmpbuf, "%u", (unsigned int)ntohs(port));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:342:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, name, name_len + 1);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:359:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpbuf[IF_NAMESIZE + 2];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:373:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(&tmpbuf[1], "%lu", (unsigned long)addr6->sin6_scope_id);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:377:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(&tmpbuf[1], "%u", (unsigned int)addr6->sin6_scope_id);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:386:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
              sprintf(&tmpbuf[1], "%lu", (unsigned long)addr6->sin6_scope_id);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:390:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
              sprintf(&tmpbuf[1], "%u", (unsigned int)addr6->sin6_scope_id);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:397:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&tmpbuf[1], "%lu", (unsigned long)addr6->sin6_scope_id);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:401:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&tmpbuf[1], "%u", (unsigned int)addr6->sin6_scope_id);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:303:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((*dest)->local_ip6, src->local_ip6, sizeof(src->local_ip6));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:390:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&options->servers[j++],
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:692:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  enumKeyName[256];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:997:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char text[sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1363:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  keyName[256];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1588:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char propname[PROP_NAME_MAX];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1589:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char propvalue[PROP_VALUE_MAX]="";
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1615:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1684:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(resolvconf_path, "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1726:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen("/etc/nsswitch.conf", "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1756:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen("/etc/host.conf", "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:1787:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen("/etc/svc.conf", "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2025:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lookups[3], *l;
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2064:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int ares_ipv6_subnet_matches(const unsigned char netbase[16],
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2065:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                    unsigned char netmask,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2066:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                    const unsigned char ipaddr[16])
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2068:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mask[16] = { 0 };
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2092:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int ares_ipv6_server_blacklisted(const unsigned char ipaddr[16])
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2096:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const unsigned char netbase[16];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2183:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&newserv[*nservers].addr.addrV4, &host.addrV4,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2186:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&newserv[*nservers].addr.addrV6, &host.addrV6,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2208:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ipbuf[16], ipbufpfx[32];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2213:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ipbuf, str, q-str);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2221:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(ipbufpfx, str, q-str);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2260:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(ipbuf, str, q-str);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2486:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen(RANDOM_FILE, "rb");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:182:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&channel->servers[i].addr.addrV4, &srvr->addrV4,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:185:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&channel->servers[i].addr.addrV6, &srvr->addrV6,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:234:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&channel->servers[i].addr.addrV4, &srvr->addrV4,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:237:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&channel->servers[i].addr.addrV6, &srvr->addrV6,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:348:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&s->addr, &in6, sizeof(struct ares_in6_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:358:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&s->addr, &in4, sizeof(struct in_addr));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_a_reply.c:165:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(hostent->h_addr_list[i],
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_a_reply.c:175:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(&addrttls[i].ipaddr,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_aaaa_reply.c:167:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(hostent->h_addr_list[i],
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_aaaa_reply.c:177:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&addrttls[i].ip6addr,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_ptr_reply.c:198:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                      memcpy(hostent->h_addr_list[0], addr, addrlen);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_txt_reply.c:165:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy ((char *) txt_curr->txt, strptr, substr_len);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_private.h:167:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tcp_lenbuf[2];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_private.h:261:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char state[256];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_private.h:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char local_dev_name[32];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_private.h:289:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char local_ip6[16];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c:466:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[MAXENDSSZ + 1];
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c:1032:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&local.sa6.sin6_addr, channel->local_ip6,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c:1065:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&saddr.sa4.sin_addr, &server->addr.addrV4,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c:1078:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&saddr.sa6.sin6_addr, &server->addr.addrV6,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c:1178:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&saddr.sa4.sin_addr, &server->addr.addrV4,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c:1191:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&saddr.sa6.sin6_addr, &server->addr.addrV6,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_process.c:1391:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                   memcpy(sendreq->data_storage, sendreq->data, sendreq->len);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:222:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*s, name, nlen);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:224:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*s + nlen + 1, domain, dlen);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:259:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          fp = fopen(hostaliases, "r");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:279:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                          memcpy(*s, p, q - p);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_send.c:89:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(query->tcpbuf + 2, qbuf, qlen);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strdup.c:41:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(s2, s1, sz * sizeof(char));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_writev.c:67:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (bp, iov[i].iov_base, iov[i].iov_len);
data/nodejs-14.13.0~dfsg/deps/cares/src/bitncmp.c:46:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  lb = ((const unsigned char *)l)[b];
data/nodejs-14.13.0~dfsg/deps/cares/src/bitncmp.c:47:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  rb = ((const unsigned char *)r)[b];
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_net_pton.c:274:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[NS_IN6ADDRSZ], *tp, *endp, *colonp;
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_net_pton.c:377:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, tmp, bytes);
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[sizeof("255.255.255.255")];
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")];
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c:180:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    tp += sprintf(tp, "%x", words[i]);
data/nodejs-14.13.0~dfsg/deps/histogram/src/hdr_histogram.c:995:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line_format[25];
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_frame.c:668:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(var_gift_payload, payload + 8, var_gift_payloadlen);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_frame.c:894:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(iv_copy, iv, len);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_frame.c:1000:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, nva[i].name, nva[i].namelen);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_frame.c:1014:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, nva[i].value, nva[i].valuelen);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_hd_huffman.c:66:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bufs->cur->buf.last, &x, 4);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_helper.c:34:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, &x, sizeof(uint16_t));
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_helper.c:39:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, &x, sizeof(uint32_t));
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_helper.c:44:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&n, data, sizeof(uint16_t));
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_helper.c:50:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&n, data, sizeof(uint32_t));
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_helper.c:593:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, len);
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_session.c:495:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((*session_ptr)->user_recv_ext_types, option->user_recv_ext_types,
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_session.c:6916:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(opaque_data_copy, opaque_data, opaque_data_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:381:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *tmp, tpass[APP_PASS_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:413:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            i = atoi(arg + 3);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:556:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tpass[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1][BSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1471:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2][BSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1628:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[3][BSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1675:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[5][BSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1871:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tbuf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2142:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if (!MultiByteToWideChar(CP_ACP, 0, from, flen, (WCHAR *)tfrom, flen))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2147:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if (!MultiByteToWideChar(CP_ACP, 0, to, tlen, (WCHAR *)tto, tlen))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2368:10:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (!MultiByteToWideChar(CP_ACP, 0, name, len_0, tempname, MAX_PATH))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2617:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(filename, mode, 0600, "ctx=bin");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2620:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(filename, mode, 0600);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char new_cert[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[10 + 1] = "\0";
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:317:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            days = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:376:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            crldays = atol(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:379:24:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            crlhours = atol(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:382:22:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            crlsec = atol(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:644:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        if (!check_time_format((char *)pp[DB_exp_date])) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:1407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[25];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:1861:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(row[DB_exp_date], tm->data, tm->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2055:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *row[DB_NUMBER], **rrow, **irow;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2094:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(row[DB_exp_date], tm->data, tm->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *row[DB_NUMBER], **rrow;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2177:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(row[DB_serial] + 1, serial, serial_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2181:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(row[DB_serial], serial, serial_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(a_tm_s, a_tm->data, a_tm->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2458:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[25], *pbuf;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ciphers.c:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/crl.c:297:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:94:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[128];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mbuf[sizeof(magic) - 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:111:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:342:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char prompt[200];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:468:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char tmpkeyiv[EVP_MAX_KEY_LENGTH + EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:479:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(key, tmpkeyiv, iklen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:480:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(iv, tmpkeyiv+iklen, ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:240:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:253:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, cmd, (int)(arg - cmd));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:280:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/errstr.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256], *prog;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c:290:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            req_timeout = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c:467:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            ndays = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c:512:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            multi = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c:842:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c:1270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *itmp, *row[DB_NUMBER], **rrow;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ocsp.c:1367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inbuf[2048], reqbuf[2048];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:483:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *new_argv[3];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char prog[40];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:508:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        i = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:513:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        i = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:835:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char start[80 + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:25:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned const char cov_2char[64] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:236:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            static char *passwds_static[2] = { NULL, NULL };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:276:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char trash[BUFSIZ];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:314:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char out_buf[6 + 9 + 24 + 2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:315:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[MD5_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ascii_magic[5];         /* "apr1" plus '\0' */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ascii_salt[9];          /* Max 8 chars plus '\0' */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:441:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf_perm[sizeof(buf)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:507:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char out_buf[3 + 17 + 17 + 86 + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:508:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[SHA512_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:509:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char temp_buf[SHA512_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ascii_magic[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ascii_salt[17];          /* Max 16 chars plus '\0' */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:588:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_buf[80]; /* "rounds=999999999" */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:589:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(tmp_buf, "rounds=%u", rounds);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:652:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cp, temp_buf, buf_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:653:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cp, temp_buf, n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:669:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cp, temp_buf, buf_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:670:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cp, temp_buf, n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkcs12.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pass[PASSWD_BUF_SIZE] = "", macpass[PASSWD_BUF_SIZE] = "";
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkcs8.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pass[APP_PASS_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkeyutl.c:182:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            kdflen = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/prime.c:61:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            bits = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/prime.c:67:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            checks = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rand.c:101:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[4096];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:79:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:184:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ep->digest, digest, evpmdsize);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linktarget[PATH_MAX], *endptr;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:239:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:334:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char idmask[MAX_COLLISIONS / 8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:516:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char lsc[2] = { LIST_SEPARATOR_CHAR, '\0' };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:372:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            days = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1076:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1448:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, name, name_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1449:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf + name_len, tail, tail_len + 1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1468:18:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        keylen = atol(gstr);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1500:26:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                keylen = atol(p + 1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_cb.c:30:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char cookie_secret[COOKIE_SECRET_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_cb.c:635:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            BIO_printf(bio, " %02x", ((const unsigned char *)buf)[i]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_cb.c:787:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, &port, sizeof(port));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_cb.c:803:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char result[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:164:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psk, key, key_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:411:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pem_name[100];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:412:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ext_buf[4 + 65536];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ext_buf + 4, in, inlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1098:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            verify_args.depth = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1263:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            srp_arg.strength = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1345:26:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            socket_mtu = atol(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1436:58:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    serverinfo_types[serverinfo_count] = atoi(p + start);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1462:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            keymatexportlen = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1468:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            len = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1490:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            max_send_fragment = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1493:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            split_send_fragment = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1496:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            max_pipelines = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1499:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            read_buf_len = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:168:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(psk, key, key_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1163:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            naccept = atol(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1167:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            verify_args.depth = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1175:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            verify_args.depth = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1341:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            tlscstatp.timeout = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1506:26:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            socket_mtu = atol(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1556:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            keymatexportlen = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1562:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            max_send_fragment = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1565:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            split_send_fragment = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1568:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            max_pipelines = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1571:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            read_buf_len = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1577:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            max_early_data = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1584:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            recv_max_early_data = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:2849:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFSIZ];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:3508:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(id, session_id_prefix,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_socket.c:324:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char sink[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_time.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024 * 8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:644:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md2[MD2_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:661:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mdc2[MDC2_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:678:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md4[MD4_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:695:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md5[MD5_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:707:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hmac[MD5_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:723:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:734:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha256[SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:745:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha512[SHA512_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:757:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char whirlpool[WHIRLPOOL_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:770:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rmd160[RIPEMD160_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:795:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char DES_iv[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:824:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char iv[2 * MAX_BLOCK_SIZE / 8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:963:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tag[12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1001:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aad[13] = { 0xcc };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1002:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char faketag[16] = { 0xcc };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1031:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1433:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char key16[16] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1437:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char key24[24] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1442:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char key32[32] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1449:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char ckey24[24] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1454:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char ckey32[32] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1477:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char *rsa_data[RSA_NUM] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1592:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            multi = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1597:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            async_jobs = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1641:58:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                        = seconds.ecdh = seconds.eddsa = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:1644:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            lengths_single = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3439:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char isdelim[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3502:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3522:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                alg = atoi(sstrsep(&p, sep));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3531:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                k = atoi(sstrsep(&p, sep));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3546:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                k = atoi(sstrsep(&p, sep));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3562:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                k = atoi(sstrsep(&p, sep));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3575:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                k = atoi(sstrsep(&p, sep));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3585:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                k = atoi(sstrsep(&p, sep));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3619:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *inp, *out, *key, no_key[32], no_iv[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:3646:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char aad[EVP_AEAD_TLS1_AAD_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/srp.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char password[1025];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/srp.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char password[1025];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/srp.c:424:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char *row[DB_NUMBER];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ts.c:490:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buffer[4096];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ts.c:525:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ts.c:543:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nonce->data, buf + i, nonce->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ts.c:766:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:100:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char TerminalDeviceBuff[255 + 2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char TermBuff[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char AscTimeBuff[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:356:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (AscTimeBuff, "0 0:0:%02d.00", SOCKET_PAIR_TIMEOUT_VALUE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char MsgBuff[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/x509.c:247:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            days = atoi(opt_arg());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/x509.c:774:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/x509.c:923:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, CAfile, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/x509.c:924:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf + len, POSTFIX, sizeof(POSTFIX));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_unix.c:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char entry_name[LP_ENTRY_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_unix.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char previous_entry_name[LP_ENTRY_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:63:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filespec[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ctx_filespec_32[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:127:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat((*ctx)->filespec, "*.*;");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char entry_name[NAME_MAX + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:107:27:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
                if ((sz = MultiByteToWideChar((cp = CP_UTF8), 0,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:113:22:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
                sz = MultiByteToWideChar((cp = CP_ACP), 0,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:124:22:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
                if (!MultiByteToWideChar(cp, 0, directory, len_0,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:159:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                    strcpy(buf + dirlen, "/*");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:48:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char b[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:411:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char s[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:430:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char s[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:523:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(state, in, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:540:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, state, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:550:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(state, in, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:567:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, state, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:591:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(w, key, nk*4);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:592:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&rcon, "\1\0\0\0", 4);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:971:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bs->cipher + 0, &key->rd_key[4 * i], 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:972:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bs->cipher + 16, bs->cipher, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:973:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bs->cipher + 32, bs->cipher, 32);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:977:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bs->cipher, ivec, 12);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:980:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bs->cipher + 16, ivec, 12);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:983:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bs->cipher + 32, ivec, 12);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:986:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(bs->cipher + 48, ivec, 12);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:1011:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char cipher[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_core.c:1014:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cipher, ivec, 12);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:31:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define load_block(d, s)        memcpy((d).data, (s), AES_BLOCK_SIZE)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:32:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define store_block(d, s)       memcpy((d), (s).data, AES_BLOCK_SIZE)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:77:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, ivp->data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:78:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2p->data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:102:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, iv.data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:103:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2.data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:130:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, ivp->data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:131:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2p->data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:156:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec, iv.data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:157:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ivec + AES_BLOCK_SIZE, iv2.data, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[AES_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:177:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp2[AES_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:178:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp3[AES_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char prev[AES_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:203:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prev, in, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:219:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, out, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:238:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(prev, tmp, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:251:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, in, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:252:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp2, in, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:258:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp3, tmp2, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:269:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, out, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:270:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp2, out, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aes/aes_ige.c:276:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp3, tmp2, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:693:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rk_head, rk_tail, ARIA_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:756:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char sb1[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:791:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char sb2[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:826:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char sb3[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:861:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char sb4[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:1130:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(w0.c, userKey, sizeof(w0));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:1147:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kr.c, userKey + ARIA_BLOCK_SIZE, sizeof(kr) / 2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/aria/aria.c:1156:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kr.c, userKey + ARIA_BLOCK_SIZE, sizeof(kr));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_bitstr.c:71:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, d, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_bitstr.c:122:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s, p, (int)len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_int.c:231:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static size_t asn1_put_uint64(unsigned char b[sizeof(uint64_t)], uint64_t r)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_int.c:334:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tbuf[sizeof(r)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_int.c:373:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tbuf[sizeof(r)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_int.c:431:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s, p, (int)len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_int.c:608:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[sizeof(uint64_t)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_int.c:624:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[sizeof(uint64_t)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_mbstr.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strbuf[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_object.c:43:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, a->data, a->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_object.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ftmp[24], *tmp = ftmp;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_object.c:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80], *p = buf;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_object.c:315:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, p, length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_print.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strex.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmphex[HEX_SIZE(long) + 3];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strex.c:205:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char utfbuf[6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strex.c:239:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hextmp[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strex.c:430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objtmp[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_time.c:423:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(t.data, str + 2, t.length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_time.c:464:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char _asn1_mon[12][4] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_gen.c:225:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, cpy_start, cpy_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_gen.c:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char erch[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_lib.c:304:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(str->data, data, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_par.c:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[128];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:234:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bound[33], c;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linebuf[MAX_SMLEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iobuf[4096];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:571:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linebuf[MAX_SMLEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:636:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char linebuf[MAX_SMLEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_moid.c:90:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(lntmp, ln, p - ln);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/evp_asn1.c:45:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, p, num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/evp_asn1.c:108:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, ASN1_STRING_get0_data(atmp->oct), n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/f_int.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/f_string.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_pbe.c:54:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sstr, salt, saltlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_pbev2.c:47:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_pbev2.c:69:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_pbev2.c:172:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(osalt->data, salt, saltlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_scrypt.c:48:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_scrypt.c:84:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/p5_scrypt.c:216:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *salt, key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_dec.c:1050:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf->data + len, *p, plen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_enc.c:417:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, tder->data, tder->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_enc.c:607:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cout, cont, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_prn.c:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objbuf[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_utl.c:151:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(enc->enc, in, inlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/tasn_utl.c:166:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*out, enc->enc, enc->len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_int64.c:110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cp, &utmp, sizeof(utmp));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_int64.c:219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cp, &utmp2, sizeof(utmp2));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_long.c:55:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pval, &it->size, COPY_SIZE(*pval, it->size));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_long.c:61:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pval, &it->size, COPY_SIZE(*pval, it->size));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_long.c:96:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ltmp, pval, COPY_SIZE(*pval, ltmp));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_long.c:189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pval, &ltmp, COPY_SIZE(*pval, ltmp));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/x_long.c:198:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&l, pval, COPY_SIZE(*pval, l));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/async/async.c:234:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->currjob->funcargs, args, size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_ofb64.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char d[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bf/bf_skey.c:22:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(key, &bf_init, sizeof(BF_KEY));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:69:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ap->s_in), sa, sizeof(struct sockaddr_in));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:74:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ap->s_in6), sa, sizeof(struct sockaddr_in6));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:80:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ap->s_un), sa, sizeof(struct sockaddr_un));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:157:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, addrptr, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:198:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char host[NI_MAXHOST] = "", serv[NI_MAXSERV] = "";
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:241:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char serv[6];        /* port is 16 bits => max 5 decimal digits */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_dump.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[288 + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_dump.c:52:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                    strcpy(buf + n, "   ");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_dump.c:62:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(buf + n, "  ");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char convert[DECIMAL_SIZE(value) + 3];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c:552:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iconvert[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c:553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fconvert[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c:554:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char econvert[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c:829:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(*buffer, *sbuffer, *currlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c:870:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hugebuf[1024 * 2];     /* Was previously 10k, which is unreasonable
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c:109:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, &(ctx->ibuf[ctx->ibuf_off]), i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c:176:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->obuf[ctx->obuf_off + ctx->obuf_len]), in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c:184:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ctx->obuf[ctx->obuf_off + ctx->obuf_len]), in, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c:300:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->ibuf, ptr, (int)num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c:391:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fake_buf[1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c:396:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &(ctx->ibuf[ctx->ibuf_off]), num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_lbuf.c:145:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&(ctx->obuf[ctx->obuf_len]), in, p - in);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_lbuf.c:151:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(&(ctx->obuf[ctx->obuf_len]), in, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_lbuf.c:198:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->obuf[ctx->obuf_len]), in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_lbuf.c:246:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, ctx->obuf, ctx->obuf_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_cb.c:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_local.h:168:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
# define UP_fopen        fopen
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_local.h:182:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define UP_open         open
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_bio.c:170:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, peer_b->buf + peer_b->offset, chunk);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_bio.c:326:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(b->buf + write_offset, buf, chunk);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:232:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&timeleft, &(data->next_timeout), sizeof(struct timeval));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:578:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &data->peer, (ret = num));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:584:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->next_timeout), ptr, sizeof(struct timeval));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmsgbuf[512];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndinfo)) +
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmsgbuf[CMSG_SPACE(sizeof(struct sctp_sndrcvinfo))];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1422:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&authkey->sca_key[0], ptr, 64 * sizeof(uint8_t));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1517:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &(data->sndinfo), num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1525:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->sndinfo), ptr, num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1532:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &data->rcvinfo, num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1541:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->rcvinfo), ptr, num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1548:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, &(data->prinfo), num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1556:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(data->prinfo), ptr, num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_file.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char p[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:133:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:203:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pidbuf[DECIMAL_SIZE(DWORD) + 4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:283:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(pidbuf, "[%lu] ", GetCurrentProcessId());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:327:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[10240];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:370:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(opcdef_p->opc$z_ms_target_classes, &VMS_OPC_target, 3);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:372:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&opcdef_p->opc$l_ms_text, buf, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_mem.c:205:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, bm->data, ret);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_mem.c:238:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(bbm->buf->data + blen, in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2_impl.h:71:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, &w, sizeof(w));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2_impl.h:89:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, &w, sizeof(w));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2b.c:221:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(c->buf + c->buflen, in, fill); /* Fill buffer */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2b.c:243:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(c->buf + c->buflen, in, datalen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2s.c:215:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(c->buf + c->buflen, in, fill); /* Fill buffer */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/blake2/blake2s.c:237:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(c->buf + c->buflen, in, datalen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_ctx.c:269:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(newitems, st->indexes, sizeof(*newitems) * st->depth);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_intern.c:166:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, in->d, sizeof(*out) * in->top);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_intern.c:195:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(a->d, words, sizeof(BN_ULONG) * num_words);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_lib.c:276:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(a, b->d, sizeof(*a) * b->top);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_lib.c:333:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(a->d, b->d, sizeof(b->d[0]) * b->top);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_print.c:332:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char data[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_rand.c:214:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char random_bytes[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_rand.c:215:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[SHA512_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_rand.c:219:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char private_bytes[96];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/bn_rand.c:251:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(k_bytes + done, digest, todo);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/rsaz_exp.c:62:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[320 * 3 + 32 * 9 * 16 + 64]; /* 5.5KB */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bn/rsaz_exp.c:262:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[16 * 8 * 8 + 64 * 2 + 64]; /* 1.2KB */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/buffer/buffer.c:65:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ret, str->data, str->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_ctr.c:13:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_ctr.c:13:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_ctr.c:15:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[CAMELLIA_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/camellia/cmll_ctr.c:16:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ecount_buf[CAMELLIA_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cast/c_ofb64.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char d[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/chacha/chacha_enc.c:73:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/chacha/chacha_enc.c:73:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:21:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k1[EVP_MAX_BLOCK_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:22:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char k2[EVP_MAX_BLOCK_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:24:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tbl[EVP_MAX_BLOCK_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:26:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char last_block[EVP_MAX_BLOCK_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:95:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->k1, in->k1, bl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:96:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->k2, in->k2, bl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:97:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->tbl, in->tbl, bl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:98:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out->last_block, in->last_block, bl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:106:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char zero_iv[EVP_MAX_BLOCK_LENGTH] = { 0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->last_block + ctx->nlast_block, data, nleft);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cmac/cmac.c:180:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->last_block, data, dlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_asn1.c:386:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char kl[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_dd.c:58:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_enc.c:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH], *piv = NULL;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_enc.c:175:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ec->key, key, keylen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_ess.c:155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dig[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_ess.c:180:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dig[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_kari.c:191:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char kek[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_pwri.c:50:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_pwri.c:223:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, tmp + 4, *outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_pwri.c:258:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out + 4, in, inlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_sd.c:584:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_sd.c:600:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_sd.c:809:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mval[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_smime.c:34:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4096];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_api.c:203:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v->section, section, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.c:189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char btmp[DECIMAL_SIZE(eline) + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_mod.c:175:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char rcode[DECIMAL_SIZE(ret) + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:264:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR buf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:302:18:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            if (!MultiByteToWideChar(CP_ACP, 0, fmta, len_0, fmtw, len_0))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_log.c:74:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                  unsigned char log_id[CT_V1_HASHLEN])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_oct.c:191:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sct->sig, sct->sig_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_oct.c:237:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sct->log_id, CT_V1_HASHLEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_oct.c:242:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, sct->ext, sct->ext_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_oct.c:248:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sct->sct, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_prn.c:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char genstr[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_vfy.c:31:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmpbuf[12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/cfb64ede.c:95:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ovec[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/cfb_enc.c:35:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ovec[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/ecb_enc.c:18:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c:28:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned const char con_salt[128] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c:47:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned const char cov_2char[64] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c:60:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buff[14];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char e_salt[2 + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char e_buf[32 + 1];         /* replace 32 by 8 ? */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c:98:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char bb[9];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/set_key.c:24:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char odd_parity[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/str2key.c:67:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(key2, key1, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_kdf.c:57:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char ctr[4] = { 0xF3, 0x17, 0x22, 0x53 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_kdf.c:119:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mtmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_kdf.c:139:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, mtmp, outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_meth.c:45:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, dhm, sizeof(*dhm));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_pmeth.c:227:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_pmeth.c:233:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_pmeth.c:252:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_pmeth.c:257:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        len = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_pmeth.c:262:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        typ = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dh/dh_pmeth.c:267:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pad = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:50:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seed[SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:52:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[SHA256_DIGEST_LENGTH], buf2[SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:92:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(seed, seed_in, seed_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:133:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, seed, qsize);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:134:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf2, seed, qsize);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:293:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(seed_out, seed, qsize);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:314:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:361:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(seed, seed_in, seed_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:386:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(seed_tmp, seed, seed_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:445:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(seed_out, seed, seed_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_gen.c:551:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static const unsigned char ggen[4] = { 0x67, 0x67, 0x65, 0x6e };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_lib.c:150:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* 4 bytes looks really small. However,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_meth.c:53:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, dsam, sizeof(*dsam));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_pmeth.c:176:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nbits = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dsa/dsa_pmeth.c:180:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int qbits = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:71:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errbuf[160];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:137:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errbuf[160];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:263:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(path, inf.filename, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:432:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(path, dli.dli_fname, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:76:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char imagename[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char symname_32[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:322:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errstring[257];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:370:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char esa[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filespec1_32[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filespec2_32[NAMX_MAXRSS + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:424:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errstring[257];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:49:10:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (!MultiByteToWideChar(CP_ACP, 0, lpLibFileName, len_0, fnamw, len_0))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:343:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(&result[offset], "\\\\");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:596:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(path, me32.szExePath, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ebcdic.c:24:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toascii[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ebcdic.c:60:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toebcdic[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ebcdic.c:111:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toascii[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ebcdic.c:179:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toebcdic[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ebcdic.c:255:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toascii[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ebcdic.c:294:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char os_toebcdic[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:209:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e, scalar, 32);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:701:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e, scalar, 32);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4230:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    signed char e[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4375:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e, scalar, 32);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4536:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    signed char aslide[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4537:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    signed char bslide[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:5474:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char allzeroes[15];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:5578:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(e, private_key, 32);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/eddsa.c:221:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(signature, nonce_point, sizeof(nonce_point));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/point_448.h:96:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                    const unsigned char ser[C448_SCALAR_BYTES]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/point_448.h:114:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void curve448_scalar_encode(unsigned char ser[C448_SCALAR_BYTES],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/scalar.c:153:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ser[C448_SCALAR_BYTES])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/scalar.c:210:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void curve448_scalar_encode(unsigned char ser[C448_SCALAR_BYTES],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_asn1.c:745:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret->seed, params->curve->seed->data,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_asn1.c:1279:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:28:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:60:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 28 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:98:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 48 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:142:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 66 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:199:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:231:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:263:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:301:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:339:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:377:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 32 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:416:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 14 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:448:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 14 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:480:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 16 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:512:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 16 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:544:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:574:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:606:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:638:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:668:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 29 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:704:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 32 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:741:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 15 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:771:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:801:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 28 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:840:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 15 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:872:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 15 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:904:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 17 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:936:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 17 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:968:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:998:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1027:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1056:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 25 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1094:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 25 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1132:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1167:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1205:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1240:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 36 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1275:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 36 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1313:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 52 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1361:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 52 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1411:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 72 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1465:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 72 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1521:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1553:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1585:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 21 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1617:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 23 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1647:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1679:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1711:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1743:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 27 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1779:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1817:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1855:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 30 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1893:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 35 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1929:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 39 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:1971:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[20 + 45 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2015:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 47 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2057:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 54 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2105:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 15 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2141:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 20 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2216:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 20 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2246:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 20 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2276:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2306:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 24 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2336:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 28 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2372:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 28 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2408:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 32 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2444:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 32 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2480:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 40 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2522:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 40 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2564:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 48 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2606:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 48 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2648:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 64 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2702:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 64 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_curve.c:2757:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[0 + 32 * 6];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_kmeth.c:149:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, sec, outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_lib.c:221:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        if (!memcpy(dest->seed, src->seed, src->seed_len))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_lib.c:491:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(group->seed, p, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_mult.c:632:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(wNAF[i], pp, wNAF_len[i]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ec_pmeth.c:387:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        co_mode = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdh_kdf.c:28:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ctr[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdh_kdf.c:37:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mtmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecdh_kdf.c:60:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, mtmp, outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/eck_prn.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[128 + 1 + 4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp224.c:1177:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(nq, tmp, 3 * sizeof(felem));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp224.c:1216:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(nq, tmp, 3 * sizeof(felem));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp521.c:1571:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(nq, tmp, 3 * sizeof(felem));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp521.c:1601:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(nq, tmp, 3 * sizeof(felem));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp521.c:1988:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pre_comp[i][1][0], x_out, sizeof(felem));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp521.c:1989:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pre_comp[i][1][1], y_out, sizeof(felem));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp521.c:1990:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pre_comp[i][1][2], z_out, sizeof(felem));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistputil.c:77:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
# define tmp_felem(I) (&((char *)tmp_felems)[(I) * felem_size])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistputil.c:78:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
# define X(I) (&((char *)point_array)[3*(I) * felem_size])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistputil.c:79:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
# define Y(I) (&((char *)point_array)[(3*(I) + 1) * felem_size])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistputil.c:80:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
# define Z(I) (&((char *)point_array)[(3*(I) + 2) * felem_size])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:430:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->X, res_x, sizeof(res_x));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:431:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->Y, res_y, sizeof(res_y));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:432:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->Z, res_z, sizeof(res_z));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:516:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->X, res_x, sizeof(res_x));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:517:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->Y, res_y, sizeof(res_y));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:518:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->Z, res_z, sizeof(res_z));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:596:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r, res, sizeof(res));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:619:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char (*p_str)[33] = NULL;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:733:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r, &temp[0], sizeof(temp[0]));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:982:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                    unsigned char p_str[33],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:1123:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->Z, ONE, sizeof(ONE));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:1156:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char p_str[33] = { 0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:1339:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_scalars, scalars, num * sizeof(BIGNUM *));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:1341:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_points, points, num * sizeof(EC_POINT *));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistz256.c:1586:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static const unsigned char expLo[32]  = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecx_meth.c:78:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pubkey, p, plen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecx_meth.c:100:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(privkey, p, KEYLENID(id));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecx_meth.c:384:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(priv, key->privkey, *len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecx_meth.c:404:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pub, key->pubkey, *len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_devcrypto.c:65:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char partial[EVP_MAX_BLOCK_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_devcrypto.c:184:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char saved_iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_devcrypto.c:206:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(saved_iv, ivptr, ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_devcrypto.c:235:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(iv, ivptr, ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_devcrypto.c:762:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((cfd = open("/dev/crypto", O_RDWR, 0)) < 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_dyn.c:462:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&cpy, e, sizeof(ENGINE));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_dyn.c:487:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(e, &cpy, sizeof(ENGINE));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_openssl.c:187:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[TEST_RC4_KEY_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_openssl.c:197:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&test(ctx)->key[0], key, EVP_CIPHER_CTX_key_length(ctx));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c:205:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char strerror_pool[SPACE_SYS_STR_REASONS];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c:587:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lsbuf[64], fsbuf[64], rsbuf[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c:628:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err_prn.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err_prn.c:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[4096];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[EVP_ENCODE_LENGTH(B64_BLOCK_SIZE) + 10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[B64_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c:142:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, &(ctx->buf[ctx->buf_off]), i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c:313:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, ctx->buf, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c:386:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(ctx->tmp[ctx->tmp_len]), in, n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c:403:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(ctx->tmp, in, n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_enc.c:39:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[BUF_OFFSET + ENC_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_enc.c:125:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, &(ctx->buf[ctx->buf_off]), i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_enc.c:222:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, ctx->buf, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:107:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[IOBS];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:193:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, &(ctx->buf[ctx->buf_off]), i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:304:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ctx->buf[ctx->buf_len], in, n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:471:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(ctx->buf[ctx->buf_len]), md_data, md_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:492:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:509:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(md_data, &(ctx->buf[ctx->buf_off]), md_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:572:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/cmeth_lib.c:34:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, cipher, sizeof(*to));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/digest.c:233:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, in, sizeof(*out));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/digest.c:255:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out->md_data, in->md_data, out->digest->ctx_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:56:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    void (*stream) (const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:57:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    unsigned char *out, size_t length,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:59:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:91:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tag[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:92:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data_buf[16]; /* Store partial data blocks */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:93:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aad_buf[16];  /* Store partial AAD blocks */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:120:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:120:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_cbc_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:122:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char ivec[16], int enc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:123:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:123:67:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:125:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:126:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:126:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:128:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:129:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:129:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void bsaes_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:131:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:139:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:139:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_ctr32_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:141:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const unsigned char ivec[AES_BLOCK_SIZE]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:144:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_encrypt(const unsigned char *inp, unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:144:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_encrypt(const unsigned char *inp, unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:146:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:147:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_decrypt(const unsigned char *inp, unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:147:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void AES_xts_decrypt(const unsigned char *inp, unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:149:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:226:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_xts_encrypt(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:227:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:230:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:232:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_xts_decrypt(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:233:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:236:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:238:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ccm64_encrypt_blocks(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:239:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:242:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:243:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char cmac[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:245:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ccm64_decrypt_blocks(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:246:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:249:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:250:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                unsigned char cmac[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:253:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t aesni_gcm_encrypt(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:254:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:256:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         const void *key, unsigned char ivec[16], u64 *Xi);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:258:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t aesni_gcm_decrypt(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:259:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:261:52:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         const void *key, unsigned char ivec[16], u64 *Xi);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:376:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:433:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:459:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 15 - cctx->L);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:470:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:470:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:473:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:475:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:476:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:476:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void aesni_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:479:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:481:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:527:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(octx->iv, iv, octx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:795:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:871:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:896:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 15 - cctx->L);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:950:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(octx->iv, iv, octx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1018:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char k[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1033:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char cv[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1034:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char k[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1051:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char cv[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1052:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char k[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1069:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char reserved[12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1072:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char b[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1076:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char b[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1078:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char h[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1085:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char k[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1099:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ares[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1100:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mres[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1101:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char kres[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1119:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char pad[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1131:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    unsigned char b[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1133:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char k[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1139:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char b[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1143:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char b[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1155:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char pad[140];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1202:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cctx->km.param.k, key, keylen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1234:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cctx->kmo.param.cv, iv, ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1235:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cctx->kmo.param.k, key, keylen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1305:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cctx->kmf.param.cv, iv, ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1306:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cctx->kmf.param.k, key, keylen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1377:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cctx->kmf.param.cv, iv, ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1378:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cctx->kmf.param.k, key, keylen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1490:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char b[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1583:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ctx->kma.param.j0, iv, ctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1588:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->iv, iv, ctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1662:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1671:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, gctx->kma.param.t.b, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1677:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1689:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1707:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, gctx->iv + gctx->ivlen - arg, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1721:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(gctx->iv + gctx->ivlen - arg, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1732:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1768:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx_out->iv, gctx->iv, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1792:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&gctx->kma.param.k, key, keylen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1810:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1848:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out + len, gctx->kma.param.t.b, EVP_GCM_TLS_TAG_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1874:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *buf, tmp[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:1972:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2152:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, buf, EVP_CCM_TLS_EXPLICIT_IV_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2160:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ivec + EVP_CCM_TLS_FIXED_IV_LEN, in, EVP_CCM_TLS_EXPLICIT_IV_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2173:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out + len, cctx->aes.ccm.kmac_param.icv.b, cctx->aes.ccm.m);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2205:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cctx->aes.ccm.kmac_param.k, key, keylen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2219:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ivec, iv, 15 - cctx->aes.ccm.l);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2351:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2382:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(iv, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2407:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2421:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, cctx->aes.ccm.kmac_param.icv.b, cctx->aes.ccm.m);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2588:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2588:67:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ctr32_encrypt_blocks(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2590:48:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                const unsigned char ivec[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2591:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2591:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_encrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2593:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2594:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2594:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_xts_decrypt(const unsigned char *inp, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2596:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       const AES_KEY *key2, const unsigned char iv[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2892:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(c->buf, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2900:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, c->buf, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2906:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2917:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2929:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, gctx->iv + gctx->ivlen - arg, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2941:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(gctx->iv + gctx->ivlen - arg, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2950:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(c->buf, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:2986:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(gctx_out->iv, gctx->iv, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3063:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3478:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3532:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3559:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3578:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3650:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 15 - cctx->L);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3666:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, EVP_CIPHER_CTX_buf_noconst(ctx),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3669:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx) + EVP_CCM_TLS_FIXED_IV_LEN, in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3693:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tag[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3761:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tag[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:3812:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, EVP_CIPHER_CTX_iv_length(ctx));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4006:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(octx->tag, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4013:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, octx->tag, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4031:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4031:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4034:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4036:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4041:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4041:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void HWAES_ocb_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4044:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char offset_i[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4046:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                       unsigned char checksum[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4126:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(octx->iv, iv, octx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4179:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf + (*buf_len), in, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4183:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf + (*buf_len), in, remaining);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes.c:4233:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, in, trailing_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:30:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char tls_aad[16]; /* 13 used */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:54:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        const AES_KEY *key, unsigned char iv[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:58:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const AES_KEY *key, unsigned char iv[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:161:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[sizeof(SHA1_MB_CTX) + 32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:196:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].out - 16, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:197:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].iv, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:203:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out - 16, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:204:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].iv, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:209:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(blocks[0].c, key->md.data, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:240:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c + 13, hash_d[i].ptr, 64 - 13);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:277:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:294:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c, ptr, off);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:359:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out, ciph_d[i].inp, len - processed);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:455:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out + aes_off, in + aes_off, plen - aes_off);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:477:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char c[32 + SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:489:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char c[SHA_CBLOCK];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:492:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tail_iv[AES_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:502:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), in, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:513:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(tail_iv, in + len - 2 * AES_BLOCK_SIZE,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:569:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ctx->iv, tail_iv, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:777:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char hmac_key[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:786:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(hmac_key, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha1.c:830:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(key->aux.tls_aad, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:31:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char tls_aad[16]; /* 13 used */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:55:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         const AES_KEY *key, unsigned char iv[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char storage[sizeof(SHA256_MB_CTX) + 32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:193:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].out - 16, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:194:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ciph_d[0].iv, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:200:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out - 16, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:201:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].iv, IVs, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:206:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(blocks[0].c, key->md.data, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:240:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c + 13, hash_d[i].ptr, 64 - 13);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:277:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:294:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(blocks[i].c, ptr, off);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:371:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ciph_d[i].out, ciph_d[i].inp, len - processed);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:485:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out + aes_off, in + aes_off, plen - aes_off);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:507:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char c[64 + SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:523:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char c[SHA256_CBLOCK];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:755:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char hmac_key[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:767:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(hmac_key, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c:811:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(key->aux.tls_aad, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:240:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, iv, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:284:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:292:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, EVP_CIPHER_CTX_buf_noconst(c), arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:298:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:309:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(gctx->iv, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:322:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, gctx->iv + gctx->ivlen - arg, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:335:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(gctx->iv + gctx->ivlen - arg, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:344:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:382:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(gctx_out->iv, gctx->iv, gctx->ivlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:525:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), iv, 15 - cctx->L);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:550:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:577:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:599:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(EVP_CIPHER_CTX_buf_noconst(c), ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:642:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, EVP_CIPHER_CTX_buf_noconst(ctx),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:645:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx) + EVP_CCM_TLS_FIXED_IV_LEN, in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:667:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tag[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_aria.c:735:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char tag[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[CHACHA_BLK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:36:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const unsigned char user_key[CHACHA_KEY_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:37:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const unsigned char iv[CHACHA_CTR_SIZE], int enc)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:154:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tag[POLY1305_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tls_aad[POLY1305_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:181:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char temp[CHACHA_CTR_SIZE] = { 0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:185:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(temp + CHACHA_CTR_SIZE - actx->nonce_len, iv,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:207:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char zero[4 * CHACHA_BLK_SIZE] = { 0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:209:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char zero[2 * CHACHA_BLK_SIZE] = { 0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:217:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *buf, *tohash, *ctr, storage[sizeof(zero) + 32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:234:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tohash, actx->tls_aad, POLY1305_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:259:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tohash, actx->tls_aad, POLY1305_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:319:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctr, (unsigned char *)&actx->len, POLY1305_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:350:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, actx->tag, POLY1305_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:362:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char zero[CHACHA_BLK_SIZE] = { 0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:433:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char temp[POLY1305_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:476:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out, actx->tag, POLY1305_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:562:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(actx->tag, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:570:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, actx->tag, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_chacha20_poly1305.c:580:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(actx->tls_aad, ptr, EVP_AEAD_TLS1_AAD_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des.c:41:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        const DES_key_schedule *ks, unsigned char iv[8]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des.c:43:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        const DES_key_schedule *ks, unsigned char iv[8]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des.c:148:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[1], d[1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:45:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             const DES_key_schedule ks[3], unsigned char iv[8]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:47:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             const DES_key_schedule ks[3], unsigned char iv[8]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[1], d[1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:239:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&dat->ks3, &dat->ks1, sizeof(dat->ks1));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:248:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&dat->ks3, &dat->ks1, sizeof(dat->ks1));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:313:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char wrap_iv[8] =
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:319:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:325:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), wrap_iv, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:365:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1tmp[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:372:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out + inl + 8, sha1tmp, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:377:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, EVP_CIPHER_CTX_iv_noconst(ctx), 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_des3.c:381:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), wrap_iv, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_null.c:48:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc2.c:127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc4_hmac_md5.c:112:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(out + rc4_off, in + rc4_off, plen - rc4_off);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc4_hmac_md5.c:125:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mac[MD5_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc4_hmac_md5.c:185:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char hmac_key[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_rc4_hmac_md5.c:194:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(hmac_key, ptr, arg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_xcbc_d.c:58:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data(ctx)->inw[0], &key[8], 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/e_xcbc_d.c:59:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data(ctx)->outw[0], &key[16], 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:48:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char data_bin2ascii[65] =
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:52:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char srpdata_bin2ascii[65] =
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:72:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char data_ascii2bin[128] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:91:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char srpdata_ascii2bin[128] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:139:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dctx, sctx, sizeof(EVP_ENCODE_CTX));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:173:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->enc_data[ctx->num]), in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:179:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->enc_data[ctx->num]), in, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/encode.c:210:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ctx->enc_data[0]), in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:183:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ctx->oiv, iv, EVP_CIPHER_CTX_iv_length(ctx));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:184:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->iv, ctx->oiv, EVP_CIPHER_CTX_iv_length(ctx));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:191:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:352:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ctx->buf[i]), in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:358:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ctx->buf[i]), in, j);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:377:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->buf, &(in[inl]), i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:505:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, ctx->final, b);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:521:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->final, &out[*outl], b);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:671:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, in, sizeof(*out));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_enc.c:680:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out->cipher_data, in->cipher_data, in->cipher->ctx_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_key.c:18:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char prompt_string[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_key.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[BUFSIZ];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_key.c:80:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md_buf[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_lib.c:99:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(c->iv, c->oiv, l);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_lib.c:349:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, md, sizeof(*to));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_local.h:30:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_local.h:31:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_local.h:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[EVP_MAX_BLOCK_LENGTH]; /* saved partial block */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_local.h:41:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char final[EVP_MAX_BLOCK_LENGTH]; /* possible final block */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_local.h:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char enc_data[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_pbe.c:94:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char obj_tmp[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_pkey.c:25:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_md5_sha1.c:52:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char padtmp[48];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_md5_sha1.c:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md5tmp[MD5_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_md5_sha1.c:54:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1tmp[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha1.c:37:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char padtmp[40];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha1.c:38:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1tmp[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[KECCAK1600_WIDTH / 8 - 32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:76:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->buf + num, inp, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:85:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->buf + num, inp, rem);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:98:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->buf, inp + len - rem, rem);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:253:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->buf + num, inp, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:257:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->buf + num, inp, rem);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:268:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->buf, inp + len - rem, rem);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sha3.c:279:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(md, ctx->A, ctx->md_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sigver.c:124:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/m_sigver.c:176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt.c:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md_tmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt.c:30:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt.c:103:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(key, md_tmp, kl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt.c:104:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, md_tmp + (16 - ivl), ivl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt2.c:36:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digtmp[EVP_MAX_MD_SIZE], *p, itmp[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt2.c:90:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, digtmp, cplen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt2.c:190:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *salt, key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_seal.c:22:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_sign.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char m[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p_verify.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char m[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/pbe_scrypt.c:75:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(B_ + (i / 2 + (i & 1) * r) * 16, X, sizeof(X));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hm_ameth.c:89:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(priv, ASN1_STRING_get0_data(os), *len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac.c:23:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pad[HMAC_MAX_MD_CBLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char keytmp[HMAC_MAX_MD_CBLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac.c:61:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(keytmp, key, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac.c:110:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac.c:216:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/hmac/hmac.c:217:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char dummy_key[1] = {'\0'};
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/idea/i_ofb64.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char d[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/hkdf.c:43:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char info[HKDF_MAXBUF];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/hkdf.c:124:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kctx->info + kctx->info_len, p2, p1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/hkdf.c:263:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char prk[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/hkdf.c:300:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char prev[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/hkdf.c:342:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(okm + done_len, prev, copy_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/tls1_prf.c:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seed[TLS1_PRF_MAXBUF];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/tls1_prf.c:83:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(kctx->seed + kctx->seedlen, p2, p1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/tls1_prf.c:183:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char A1[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/kdf/tls1_prf.c:233:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, A1, olen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_dgst.c:90:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(p[c->num]), data, MD2_BLOCK - c->num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_dgst.c:97:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(p[c->num]), data, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_dgst.c:112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, data, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_dgst.c:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sp1, state, 16 * sizeof(MD2_INT));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_one.c:22:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[MD2_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md2/md2_one.c:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char temp[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md4/md4_one.c:22:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[MD4_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md4/md4_one.c:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char temp[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md5/md5_one.c:22:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[MD5_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/md5/md5_one.c:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char temp[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2_one.c:17:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[MDC2_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2dgst.c:47:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(c->data[i]), in, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2dgst.c:53:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(c->data[i]), in, j);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2dgst.c:65:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(c->data[0]), &(in[i]), j);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2dgst.c:123:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(md, (char *)c->h, MDC2_BLOCK);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mdc2/mdc2dgst.c:124:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(md[MDC2_BLOCK]), (char *)c->hh, MDC2_BLOCK);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:126:16:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    md_count = atol(md_failstring);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:128:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    md_fail_percent = atsign == NULL ? 0 : atoi(atsign + 1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:188:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        md_tracefd = atoi(cp);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:289:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, str, old_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_dbg.c:457:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_dbg.c:535:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf + buf_len, amip->info, 128 - buf_len - 3);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_dbg.c:590:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_sec.c:451:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fd = open("/dev/zero", O_RDWR)) >= 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:18:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:18:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:20:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:66:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ivec, iv, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:69:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:69:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:71:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:76:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cbc128.c:110:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ivec, iv, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ccm128.c:54:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->nonce.c[1], nonce, 14 - L);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ccm128.c:169:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(temp.c, inp, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ccm128.c:182:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, temp.c, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ccm128.c:252:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(temp.c, inp, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ccm128.c:255:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, scratch.c, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ccm128.c:430:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tag, ctx->cmac.c, M);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:19:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:19:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:21:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:137:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void cfbr_encrypt_block(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:137:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void cfbr_encrypt_block(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:139:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                               unsigned char ivec[16], int enc,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:143:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ovec[16 * 2 + 1]; /* +1 because we dereference (but don't
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:150:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ovec, ivec, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:164:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ivec, ovec + num, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:173:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:173:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:175:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[1], d[1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:189:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:189:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cfb128.c:191:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:71:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:71:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:73:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:74:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ecount_buf[16], unsigned int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:147:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:147:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:149:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ctr128.c:150:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ecount_buf[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:27:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:28:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:29:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:50:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, out - 16, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:51:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out - 16, ivec, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:56:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:57:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:59:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:82:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out - 16 + residue, ivec, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:87:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:87:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:89:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:94:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, out - 16, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, tmp.c, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:117:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, out - 16, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:123:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:123:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:125:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:130:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:152:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:158:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:159:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:160:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:166:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:185:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, tmp.c + 16, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:186:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in + 16, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:200:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:201:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:203:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:209:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:232:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, tmp.c + 16, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:233:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:248:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:248:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:250:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:255:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:278:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in + 16, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:283:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, tmp.c, 16 + residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:288:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:288:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:290:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:295:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:322:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp.c, in, residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/cts128.c:327:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, tmp.c, 16 + residue);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c:845:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->Yi.c, iv, 12);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c:1017:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->Xn, ctx->Xi.c, sizeof(ctx->Xi));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c:1252:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->Xn, ctx->Xi.c, sizeof(ctx->Xi));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c:1497:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->Xn, ctx->Xi.c, sizeof(ctx->Xi));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c:1661:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->Xn, ctx->Xi.c, sizeof(ctx->Xi));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c:1850:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->Xn + mres, &bitlen, sizeof(bitlen));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/gcm128.c:1871:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tag, ctx->Xi.c,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/modes_local.h:132:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char Xn[48];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/modes_local.h:155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:199:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, sizeof(OCB128_CONTEXT));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:209:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest->l, src->l, (src->l_index + 1) * 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:220:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ktop[16], tmp[16], mask;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:221:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char stretch[24], nonce[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:238:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nonce + 16 - len, iv, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, nonce, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:247:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(stretch, ktop, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:289:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp.c, aad, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:311:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp.c, aad, last_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:358:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    (const unsigned char (*)[16])ctx->l, ctx->sess.checksum.c);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:371:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp.c, in, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:382:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, tmp.c, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:407:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pad.c, in, last_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:450:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    (const unsigned char (*)[16])ctx->l, ctx->sess.checksum.c);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:463:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp.c, in, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:474:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, tmp.c, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:499:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pad.c, out, last_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ocb128.c:527:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tag, &tmp, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ofb128.c:19:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ofb128.c:19:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/ofb128.c:21:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num, block128_f block)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *A, B[16], *R;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:63:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(A, iv, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:68:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(B + 8, R, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:76:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(R, B + 8, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, A, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char *A, B[16], *R;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(A, in, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:122:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(B + 8, R, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:124:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(R, B + 8, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:127:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, A, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char got_iv[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:198:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aiv[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:207:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aiv, default_aiv, 4);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:209:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aiv, icv, 4);    /* Standard doesn't mention this. */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:223:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, aiv, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:262:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char aiv[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:263:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char zeros[8] = { 0x0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:277:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buff[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:280:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aiv, buff, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/wrap128.c:282:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, buff + 8, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c:15:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char iv[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c:35:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tweak.c, iv, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c:44:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(scratch.c, inp, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c:55:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, scratch.c, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c:99:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out - 16, scratch.c, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c:127:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(scratch.c, inp, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/modes/xts128.c:149:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, scratch.c, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:57:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if ((sz = MultiByteToWideChar(CP_UTF8, (flags = MB_ERR_INVALID_CHARS),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:60:16:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
         (sz = MultiByteToWideChar(CP_UTF8, (flags = 0),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:66:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if (MultiByteToWideChar(CP_UTF8, flags,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:68:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            MultiByteToWideChar(CP_UTF8, 0, mode, strlen(mode) + 1,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:77:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            file = fopen(filename, mode);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:80:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:109:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:114:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(filename, mode);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_str.c:51:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, str, maxlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_str.c:69:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    return memcpy(ret, data, siz);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_time.c:37:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result, ts2, sizeof(struct tm));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_time.c:53:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result, ts, sizeof(struct tm));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.c:402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tbuf[DECIMAL_SIZE(i) + DECIMAL_SIZE(l) + 2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.c:643:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.h:13:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char so[7762] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_ext.c:268:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpval, val, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_lib.c:50:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_srv.c:265:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_srv.c:289:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_vfy.c:173:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmphash[SHA_DIGEST_LENGTH], *keyhash;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_vfy.c:284:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/v3_ocsp.c:177:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*pp, os->data, os->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_info.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:40:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, userdata, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:317:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:318:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:416:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:763:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*name, linebuf + BEGINLEN, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_pk8.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_pk8.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char psbuf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_pkey.c:55:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char psbuf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_pkey.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pem_str[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_pkey.c:156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pem_str[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c:206:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hdr_buf[16], *buf = NULL;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c:682:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char keybuf[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c:686:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char psbuf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c:706:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(enctmp, p, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c:751:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pvk_hdr[24], *buf = NULL;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c:827:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char psbuf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pvkfmt.c:828:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char keybuf[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_crpt.c:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH], iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_crt.c:40:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char keyid[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_decr.c:102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fname[30];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_decr.c:104:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(fname, "DER%d", fnm++);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_decr.c:105:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        op = fopen(fname, "wb");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_key.c:137:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, Ai, min(n, u));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_mutl.c:54:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[96];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_mutl.c:64:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(key, out + sizeof(out) - TK26_MAC_KEY_LEN, TK26_MAC_KEY_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_mutl.c:81:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_MD_SIZE], *salt;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_mutl.c:152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_mutl.c:179:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_mutl.c:237:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p12->mac->salt->data, salt, saltlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_npas.c:66:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c:273:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c:274:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c:617:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md_data[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c:777:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md_data[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs7/pk7_doit.c:996:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char md_dat[EVP_MAX_MD_SIZE], *abuf = NULL;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:135:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void poly1305_init(void *ctx, const unsigned char key[16])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:215:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void poly1305_emit(void *ctx, unsigned char mac[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:273:53:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void poly1305_init(void *ctx, const unsigned char key[16])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:381:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void poly1305_emit(void *ctx, unsigned char mac[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:428:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int poly1305_init(void *ctx, const unsigned char key[16], void *func);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:431:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void poly1305_emit(void *ctx, unsigned char mac[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:435:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Poly1305_Init(POLY1305 *ctx, const unsigned char key[32])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:486:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->data + num, inp, rem);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:492:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctx->data + num, inp, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:507:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->data, inp, rem);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305.c:512:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Poly1305_Final(POLY1305 *ctx, unsigned char mac[16])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_ameth.c:83:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(priv, ASN1_STRING_get0_data(os), ASN1_STRING_length(os));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_base2_44.c:57:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int poly1305_init(void *ctx, const unsigned char key[16])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_base2_44.c:135:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_ieee754.c:110:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int poly1305_init(void *ctx, const unsigned char key[16])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_ieee754.c:430:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_local.h:12:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*poly1305_emit_f) (void *ctx, unsigned char mac[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_local.h:21:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[POLY1305_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/poly1305/poly1305_pmeth.c:68:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&dctx->ctx, &sctx->ctx, sizeof(POLY1305));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:87:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32_int(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:87:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32_int(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:90:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32_vmx(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:90:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32_vmx(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:93:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32_vsx(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:93:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32_vsx(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:96:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:96:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:109:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void poly1305_init_int(void *ctx, const unsigned char key[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:112:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void poly1305_emit(void *ctx, unsigned char mac[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:114:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void poly1305_init_fpu(void *ctx, const unsigned char key[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:117:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void poly1305_emit_fpu(void *ctx, unsigned char mac[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:119:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int poly1305_init(void *ctx, const unsigned char key[16], void *func[2]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:120:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int poly1305_init(void *ctx, const unsigned char key[16], void *func[2])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ppccap.c:259:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (uname(&uts) != 0 || atoi(uts.version) < 6)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_ctr.c:129:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ctr->bltmp + ctr->bltmp_pos, in, left);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_ctr.c:146:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctr->bltmp + ctr->bltmp_pos, in, inlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_ctr.c:254:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctr->V + 8, ctr->V, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_ctr.c:255:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctr->V, ctr->K + 24, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_ctr.c:334:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(out, ctr->K, outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_ctr.c:401:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static const unsigned char df_key[32] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/drbg_lib.c:1040:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char dummy[1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_egd.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sun_path[108];         /* path name (gag) */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_egd.c:65:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tempbuf[255];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_lib.c:642:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, pool->buffer, pool->len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_lib.c:753:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pool->buffer + pool->len, buffer, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_local.h:145:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char K[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_local.h:146:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char V[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_local.h:148:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char bltmp[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_local.h:150:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char KX[48];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c:449:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                kernel[0] = atoi(un.release);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c:451:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                kernel[1] = p == NULL ? 0 : atoi(p + 1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c:459:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if ((fd = open(DEVRANDOM_WAIT, O_RDONLY)) != -1) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c:529:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((rd->fd = open(random_device_paths[n], O_RDONLY)) == -1)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_vms.c:461:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];           /* That should be enough */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_vms.c:536:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buffer[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:34:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open    _open
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:65:60:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        (__FILE_ptr32 (*)(const char *, const char *, ...))fopen;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:86:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[RAND_LOAD_BUF_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:176:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[RAND_BUF_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:203:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int fd = open(file, O_WRONLY | O_CREAT | O_BINARY, 0600);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2_skey.c:13:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char key_table[256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc2/rc2ofb64.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char d[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rc5/rc5ofb64.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char d[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ripemd/rmd_one.c:18:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[RIPEMD160_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_meth.c:45:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, meth, sizeof(*meth));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_none.c:27:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, from, (unsigned int)flen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_none.c:41:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to + tlen - flen, from, flen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_oaep.c:50:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seedmask[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_oaep.c:80:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(db + emlen - flen - mdlen, from, (unsigned int)flen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_oaep.c:277:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cnt[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_oaep.c:279:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_oaep.c:304:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(mask + outlen, md, len - outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_ossl.c:485:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, buf, (r = j));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_ossl.c:581:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, buf, (r = i));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pk1.c:40:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pk1.c:112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, p, (unsigned int)j);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pk1.c:150:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pmeth.c:157:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rctx->tbuf, tbs, tbslen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pmeth.c:219:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(rout, rctx->tbuf, ret);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pmeth.c:630:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            saltlen = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pmeth.c:635:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nbits = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pmeth.c:653:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int nprimes = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pmeth.c:674:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            int saltlen = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_pss.c:42:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char H_[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_sign.c:160:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rm, decrypt_buf, SSL_SIG_LENGTH);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_sign.c:180:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rm, decrypt_buf + 2, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_sign.c:226:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rm, m, m_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_ssl.c:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_x931.c:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, from, (unsigned int)flen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rsa/rsa_x931.c:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, p, (unsigned int)j);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed.c:326:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char SEED_Sbox[2][256] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed.c:440:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_set_key(const unsigned char rawkey[SEED_KEY_LENGTH],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed.c:499:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_encrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed.c:500:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed.c:544:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_decrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed.c:545:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cbc.c:13:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cbc.c:13:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cbc.c:15:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      unsigned char ivec[SEED_BLOCK_SIZE], int enc)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cfb.c:13:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cfb.c:13:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_cfb.c:15:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_ofb.c:13:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_ofb.c:13:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/seed/seed_ofb.c:15:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/keccak1600.c:72:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char rhotates[5][5] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/keccak1600.c:1154:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char test[168] = { '\xf3', '\x3' };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/keccak1600.c:1155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char out[512];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/keccak1600.c:1157:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char result[512] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha1_one.c:18:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha256.c:52:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA224_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha256.c:66:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha512.c:284:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + c->num, data, len), c->num += (unsigned int)len;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha512.c:287:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + c->num, data, n), c->num = 0;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha512.c:297:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(p, data, sizeof(c->u)),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha512.c:307:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, data, len), c->num = (int)len;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha512.c:329:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA384_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sha/sha512.c:343:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[SHA512_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash.c:163:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&ctx->leavings[ctx->len], in, inlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash.c:169:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ctx->leavings[ctx->len], in, available);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash.c:193:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->leavings, end, left);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash_ameth.c:84:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(priv, ASN1_STRING_get0_data(os), ASN1_STRING_length(os));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash_local.h:22:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char leavings[SIPHASH_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash_pmeth.c:68:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&dctx->ctx, &sctx->ctx, sizeof(SIPHASH));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/siphash/siphash_pmeth.c:162:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        size_t hash_size = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm2/sm2_pmeth.c:79:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dctx->id, sctx->id, sctx->id_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm2/sm2_pmeth.c:203:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp_id, p2, p1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/sm2/sm2_pmeth.c:216:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p2, smctx->id, smctx->id_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_lib.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_lib.c:122:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dig[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:134:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pad[2] = {0, 0};
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:222:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[MAX_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:306:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[MAX_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:532:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digv[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:533:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digs[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:588:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[MAX_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:589:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp2[MAX_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:686:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp2[MAX_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/stack/stack.c:66:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret->data, sk->data, sizeof(void *) * sk->num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:217:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tpass[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kbuf[PEM_BUFSIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:725:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char search_name[9];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:862:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char errbuf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:873:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char peekbuf[4096] = { 0, };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:1261:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char errbuf[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_lib.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char scheme_copy[256], *p, *schemes[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_lib.c:78:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            loader_ctx = loader->open(loader, uri, ui_method, ui_data);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_lib.c:527:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf1[20], buf2[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_local.h:104:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    OSSL_STORE_open_fn open;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_conf.c:391:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                secs = atoi(val->value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_conf.c:394:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                millis = atoi(val->value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_conf.c:397:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                micros = atoi(val->value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_lib.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_txt[128];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_sign.c:768:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cert_sha1[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_sign.c:901:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hash[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_sign.c:992:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char genTime_str[17 + TS_MAX_CLOCK_PRECISION_DIGITS];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4096];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:287:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cert_sha1[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:317:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cert_digest[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char failure_text[TS_STATUS_BUF_SIZE] = "";
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:509:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(failure_text, "unspecified");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:575:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buffer[4096];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_verify_ctx.c:131:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret->imprint, ASN1_STRING_get0_data(msg), ret->imprint_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_lib.c:895:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char number1[DECIMAL_SIZE(uis->_.string_data.result_minsize) + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_lib.c:896:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char number2[DECIMAL_SIZE(uis->_.string_data.result_maxsize) + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_lib.c:924:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(uis->result_buf, result, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[BUFSIZ];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:386:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tty_out = fopen("conout$", "w")) == NULL)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:393:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((tty_in = fopen("conin$", "r")) == NULL)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:402:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tty_in = fopen(DEV_TTY, "r")) == NULL)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:404:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tty_out = fopen(DEV_TTY, "w")) == NULL)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:452:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char tmp_num[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:466:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_num[12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:487:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(tty_new), &(tty_orig), sizeof(tty_orig));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:503:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp_num[2][12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:529:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(tty_new), &(tty_orig), sizeof(tty_orig));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:541:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp_num[2][12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:572:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_num[12];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_util.c:22:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[BUFSIZ];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_util.c:108:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char result[PEM_BUFSIZE + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_block.c:506:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(K.q, L, 64);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_block.c:513:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(S.q, L, 64);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_block.c:522:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(S.c, p, 64);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_dgst.c:121:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(c->data + byteoff, inp, bitrem);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_dgst.c:126:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(c->data + byteoff, inp, bits / 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_dgst.c:240:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(md, c->H.c, WHIRLPOOL_DIGEST_LENGTH);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/whrlpool/wp_dgst.c:250:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static unsigned char m[WHIRLPOOL_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/t_x509.c:227:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char SHA1md[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/t_x509.c:329:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oidstr[80], first;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_cmp.c:36:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_cmp.c:189:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_cmp.c:213:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_obj.c:33:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char hex[17] = "0123456789ABCDEF";
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_obj.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_buf[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_obj.c:37:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ebcdic_buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_obj.c:135:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, s, (unsigned int)l1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_vfy.c:2572:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mdbuf[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_vpm.c:442:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509name.c:44:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, data->data, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_all.c:370:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(md, data->sha1_hash, sizeof(data->sha1_hash));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_all.c:385:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(md, data->sha1_hash, sizeof(data->sha1_hash));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_name.c:178:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nm.x->bytes->data, q, p - q);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x_name.c:225:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(*out, a->bytes->data, ret);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:106:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addr, bs->data, bs->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:131:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char addr[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:279:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char addr_a[ADDR_RAW_BUF_LEN], addr_b[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:486:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[3];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:684:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char a_min[ADDR_RAW_BUF_LEN], a_max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:685:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char b_min[ADDR_RAW_BUF_LEN], b_max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:807:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char a_min[ADDR_RAW_BUF_LEN], a_max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:808:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char b_min[ADDR_RAW_BUF_LEN], b_max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:852:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char a_min[ADDR_RAW_BUF_LEN], a_max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:904:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char min[ADDR_RAW_BUF_LEN], max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:1095:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char p_min[ADDR_RAW_BUF_LEN], p_max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_addr.c:1096:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c_min[ADDR_RAW_BUF_LEN], c_max[ADDR_RAW_BUF_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_admis.c:89:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char objbuf[128];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_admis.c:189:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char objbuf[128];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_alt.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char oline[256], htmp[5];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_extku.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_ia5.c:38:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, ia5->data, ia5->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_info.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objtmp[80], *ntmp;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pci.c:142:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(*policy)->data[(*policy)->length],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pci.c:161:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2048];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pci.c:189:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(*policy)->data[(*policy)->length], buf, n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pci.c:206:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(*policy)->data[(*policy)->length],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pmaps.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp1[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pmaps.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obj_tmp2[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_skey.c:62:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pkey_dig[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:947:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:965:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:989:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ipout[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:1060:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:1119:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v6, v6stat.tmp, v6stat.zero_pos);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:1124:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(v6 + v6stat.zero_pos + 16 - v6stat.total,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:1128:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v6, v6stat.tmp, 16);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/e_os.h:312:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#   define open _open
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:332:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(CMSG_DATA(cmsg), &op, ALG_OP_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:345:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aiv->iv, iv, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cbuf[CMSG_SPACE(ALG_IV_LEN(ALG_AES_IV_LEN)) + CMSG_SPACE(ALG_OP_LEN)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:570:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nxtiv[ALG_AES_IV_LEN] = { 0 };
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:590:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(nxtiv, in + (inl - ALG_AES_IV_LEN), ALG_AES_IV_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:607:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), out + (inl - ALG_AES_IV_LEN),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:610:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), nxtiv, ALG_AES_IV_LEN);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:782:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        kver[i] = atoi(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:665:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char magstr[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:711:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char magstr[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:758:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char algstr[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:865:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char algstr[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:947:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char errstr[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:972:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(to, tmpbuf, (flen = (int)dlen));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1000:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char csigbuf[40];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errstr[10];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1204:21:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if ((clen = MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1207:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1, (WCHAR *)cspname,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1569:24:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            if ((len = MultiByteToWideChar(CP_ACP, 0, id, -1, NULL, 0)) &&
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1571:18:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
                 MultiByteToWideChar(CP_ACP, 0, id, -1, contname, len)) &&
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1572:24:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
                (len = MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1575:18:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
                 MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1640:20:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if ((len = MultiByteToWideChar(CP_ACP, 0, pname, -1, NULL, 0))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1642:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            MultiByteToWideChar(CP_ACP, 0, pname, -1, (WCHAR *)name, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_dasync.c:141:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tlsaad[SSL_MAX_PIPELINES][EVP_AEAD_TLS1_AAD_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_dasync.c:607:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pipe_ctx->tlsaad[pipe_ctx->aadctr], ptr,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest.c:603:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpbuf, in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest.c:610:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, tmpbuf, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest.c:634:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpbuf, in, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_ossltest.c:641:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(out, tmpbuf, inl);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:83:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char padlock_name[100];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:184:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[AES_BLOCK_SIZE]; /* Initialization vector */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:312:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:314:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:348:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:384:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:416:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:439:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:449:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->iv, ivec, AES_BLOCK_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_padlock.c:623:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cdata->ks.rd_key, key, AES_KEY_SIZE_128);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/server.c:623:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char early_buf[16384];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/test-corpus.c:48:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(pathname, "rb");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/aria.h:29:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[ARIA_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/aria.h:33:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char ARIA_c128[ARIA_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/chacha.h:26:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/chacha.h:26:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void ChaCha20_ctr32(unsigned char *out, const unsigned char *inp,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/evp.h:385:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pubkey[MAX_KEYLEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/md32_common.h:150:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + n, data, HASH_CBLOCK - n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/md32_common.h:164:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + n, data, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/md32_common.h:181:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, data, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/poly1305.h:19:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Poly1305_Init(POLY1305 *ctx, const unsigned char key[32]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/poly1305.h:21:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Poly1305_Final(POLY1305 *ctx, unsigned char mac[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/x509.h:107:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1_hash[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/crypto/x509.h:182:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sha1_hash[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/camellia.h:72:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/camellia.h:72:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Camellia_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/camellia.h:74:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[CAMELLIA_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/camellia.h:75:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ecount_buf[CAMELLIA_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/des.h:28:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char DES_cblock[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/des.h:29:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef /* const */ unsigned char const_DES_cblock[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ebcdic.h:25:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char os_toascii[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/ebcdic.h:26:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char os_toebcdic[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/err.h:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *err_data[ERR_NUM_ERRORS];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/err.h:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *err_file[ERR_NUM_ERRORS];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/evp.h:398:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/md2.h:28:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MD2_BLOCK];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/mdc2.h:27:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MDC2_BLOCK];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:18:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*block128_f) (const unsigned char in[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:19:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            unsigned char out[16], const void *key);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:21:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*cbc128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:21:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*cbc128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:23:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char ivec[16], int enc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:25:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ctr128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:25:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ctr128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:27:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char ivec[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:29:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ccm128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:29:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ccm128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:31:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:32:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char cmac[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:34:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:34:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:36:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:37:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:37:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:39:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], block128_f block);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:41:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:41:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:43:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:44:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ecount_buf[16], unsigned int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:47:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:47:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ctr128_encrypt_ctr32(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:49:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:50:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ecount_buf[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:53:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:53:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:55:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:58:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:58:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:60:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char ivec[16], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:62:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:62:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_8_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:64:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:66:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:66:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void CRYPTO_cfb128_1_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:68:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:71:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:72:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:73:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:75:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:75:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:77:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:78:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:79:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:80:62:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   const void *key, unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:82:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:82:64:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_cts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:84:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                             unsigned char ivec[16], cbc128_f cbc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:86:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:87:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:89:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:91:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:91:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:93:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:94:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt_block(const unsigned char *in,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:95:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:97:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       unsigned char ivec[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:99:49:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:99:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
size_t CRYPTO_nistcts128_decrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:101:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                 unsigned char ivec[16], cbc128_f cbc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:152:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          const unsigned char iv[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:175:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ocb128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:175:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef void (*ocb128_f) (const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:178:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char offset_i[16],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/modes.h:180:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          unsigned char checksum[16]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:68:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_set_key(const unsigned char rawkey[SEED_KEY_LENGTH],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:71:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_encrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:72:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:74:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_decrypt(const unsigned char s[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:75:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                  unsigned char d[SEED_BLOCK_SIZE],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:80:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:80:57:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cbc_encrypt(const unsigned char *in, unsigned char *out, size_t len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:82:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      unsigned char ivec[SEED_BLOCK_SIZE], int enc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:83:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:83:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_cfb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:85:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:87:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:87:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SEED_ofb128_encrypt(const unsigned char *in, unsigned char *out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/seed.h:89:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                         unsigned char ivec[SEED_BLOCK_SIZE], int *num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/sha.h:100:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char p[SHA512_CBLOCK];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/whrlpool.h:28:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[WHIRLPOOL_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/whrlpool.h:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[WHIRLPOOL_BBLOCK / 8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/applink.c:115:47:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        OPENSSL_ApplinkTable[APPLINK_FOPEN] = fopen;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.c:26:8:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static TCHAR msg[128];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.c:60:9:  [2] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
        _tcscpy(msg + len, _T("unimplemented function"));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.c:65:17:  [2] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
                _tcscpy(msg + len, _T("no host application"));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.c:79:17:  [2] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
                _tcscpy(msg + len, _T("no OPENSSL_Applink"));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.c:85:17:  [2] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
                _tcscpy(msg + len, _T("no ApplinkTable"));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.h:19:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define UP_fgets  (*(char *(*)(char *,int,void *))OPENSSL_UplinkTable[APPLINK_FGETS])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.h:19:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define UP_fgets  (*(char *(*)(char *,int,void *))OPENSSL_UplinkTable[APPLINK_FGETS])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.h:26:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define UP_fopen  (*(void *(*)(const char *,const char *))OPENSSL_UplinkTable[APPLINK_FOPEN])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ms/uplink.h:26:51:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define UP_fopen  (*(void *(*)(const char *,const char *))OPENSSL_UplinkTable[APPLINK_FOPEN])
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_lib.c:307:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(timeleft, &(s->d1->next_timeout), sizeof(struct timeval));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_lib.c:449:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cookie[DTLS1_COOKIE_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_lib.c:450:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seq[SEQ_NUM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_lib.c:776:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&wbuf[DTLS1_RT_HEADER_LENGTH + 1],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_msg.c:40:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[DTLS1_AL_HEADER_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/packet.c:372:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/packet_local.h:366:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, pkt->curr, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/packet_local.h:402:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, pkt->curr, pkt->remaining);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/dtls1_bitmap.c:72:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bitmap->max_seq_num, seq, SEQ_NUM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:101:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(rl->d->curr_write_sequence,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:106:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(rl->d->last_write_sequence,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rl->write_sequence, seq, SEQ_NUM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:130:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&s->rlayer.rbuf, &(rdata->rbuf), sizeof(SSL3_BUFFER));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:131:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&s->rlayer.rrec, &(rdata->rrec), sizeof(SSL3_RECORD));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:134:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(s->rlayer.read_sequence[2]), &(rdata->packet[5]), 6);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:160:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(rdata->rbuf), &s->rlayer.rbuf, sizeof(SSL3_BUFFER));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:161:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(rdata->rrec), &s->rlayer.rrec, sizeof(SSL3_RECORD));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:512:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, &(SSL3_RECORD_get_data(rr)[SSL3_RECORD_get_off(rr)]), n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:607:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:913:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(SSL3_RECORD_get_data(&wr), SSL3_RECORD_get_input(&wr),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:966:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pseq, &(s->rlayer.write_sequence[2]), 6);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_d1.c:1053:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->rlayer.d->last_write_sequence, seq,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_s3.c:427:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char aad[13];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_s3.c:481:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(aad, s->rlayer.write_sequence, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_s3.c:1411:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, &(rr->data[rr->off]), n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_s3.c:1539:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp[16];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/rec_layer_s3.c:1629:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest + *dest_len,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:68:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seq_num[SEQ_NUM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:75:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char max_seq_num[SEQ_NUM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char last_write_sequence[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:116:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char curr_write_sequence[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char handshake_fragment[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:163:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char read_sequence[SEQ_NUM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:164:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char write_sequence[SEQ_NUM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_buffer.c:16:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(b->buf, d, n);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:16:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char ssl3_pad_1[48] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:25:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char ssl3_pad_2[48] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:62:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r->seq_num, seq_num, SEQ_NUM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:182:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:582:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mac_tmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:941:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[SSL_MAX_PIPELINES][EVP_AEAD_TLS1_AAD_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1042:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    unsigned char dtlsseq[9], *p = dtlsseq;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1046:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(p, &seq[2], 6);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1047:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(buf[ctr], dtlsseq, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1049:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(buf[ctr], seq, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1099:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char *data[SSL_MAX_PIPELINES];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1226:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char header[75];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1228:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header + j, mac_sec, md_size);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1230:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header + j, ssl3_pad_1, npad);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1232:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header + j, seq, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1287:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char header[13];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1318:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char dtlsseq[8], *p = dtlsseq;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1322:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, &seq[2], 6);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1324:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header, dtlsseq, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1326:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header, seq, 8);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1533:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rotated_mac_buf[64 + EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1536:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rotated_mac[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1585:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        ((volatile unsigned char *)rotated_mac)[rotate_offset ^ 32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1612:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1702:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char mac_tmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record.c:1897:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(RECORD_LAYER_get_read_sequence(&s->rlayer)[2]), p, 6);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record_tls13.c:28:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH], recheader[SSL3_RT_HEADER_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/ssl3_record_tls13.c:134:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv, staticiv, offset);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:129:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           unsigned char *md_out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:131:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           const unsigned char header[13],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:140:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char c[sizeof(LARGEST_DIGEST_CTX)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:149:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char length_bytes[MAX_HASH_BIT_COUNT_BYTES];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hmac_pad[MAX_HASH_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char first_block[MAX_HASH_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:153:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac_out[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:339:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hmac_pad, mac_secret, mac_secret_length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:379:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(first_block, header + md_block_size, overhang);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:380:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(first_block + overhang, data, md_block_size - overhang);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:386:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(first_block, header, 13);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:387:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(first_block + 13, data, md_block_size - 13);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_cbc.c:404:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char block[MAX_HASH_BLOCK_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c:21:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[16], smd[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c:71:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(km, smd, (num - i));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c:231:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mac_secret, ms, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c:470:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const unsigned char *salt[3] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c:481:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c:495:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                strlen((const char *)salt[i])) <= 0
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:3849:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(keys, ctx->ext.tick_key_name,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:3851:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(keys + sizeof(ctx->ext.tick_key_name),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:3854:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(keys + sizeof(ctx->ext.tick_key_name) +
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:4597:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(result + len - sizeof(tls12downgrade), tls12downgrade,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:4600:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(result + len - sizeof(tls11downgrade), tls11downgrade,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:4634:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(t, pms, pmslen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:4637:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(t, s->s3->tmp.psk, psklen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_asn1.c:110:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cipher_data[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_asn1.c:234:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, src->data, src->length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert.c:130:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ret->pkeys[i].serverinfo,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert.c:141:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret->conf_sigalgs, cert->conf_sigalgs,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert.c:152:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret->client_sigalgs, cert->client_sigalgs,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert.c:721:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_ciph.c:1282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[80];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_ciph.c:1289:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(name, elem, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_conf.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *cert_filename[SSL_PKEY_NUM];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_conf.c:559:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int block_size = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_conf.c:578:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int num_tickets = atoi(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:352:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(t->data, data, dlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:805:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->ext.alpn, s->ctx->ext.alpn, s->ctx->ext.alpn_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:881:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->sid_ctx, sid_ctx, sid_ctx_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:895:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ssl->sid_ctx, sid_ctx, sid_ctx_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:933:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(r.session_id, id, id_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:1414:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, s->s3->tmp.finish_md, count);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:1428:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, s->s3->tmp.peer_finish_md, count);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:2922:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp_storage[4];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:2926:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmp_storage, a->session_id, a->session_id_length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:4174:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, ssl->s3->client_random, outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:4184:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, ssl->s3->server_random, outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:4195:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, session->master_key, outlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:4205:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sess->master_key, in, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:5245:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cursor, "%02x", parameter_1[i]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:5251:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(cursor, "%02x", parameter_2[i]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:5389:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cipher[SSLV2_CIPHER_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:512:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char early_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:517:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char master_key[TLS13_MAX_RESUMPTION_PSK_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:520:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:527:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:676:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char random[SSL3_RANDOM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:678:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:680:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dtls_cookie[DTLS1_COOKIE_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:683:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char compressions[MAX_COMPRESSIONS_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:732:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tick_hmac_key[TLSEXT_TICK_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:733:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tick_aes_key[TLSEXT_TICK_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:876:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:931:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char tick_key_name[TLSEXT_KEYNAME_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1001:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char cookie_hmac_key[SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1146:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char early_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1147:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char handshake_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1148:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char master_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1149:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char resumption_master_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1150:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char client_finished_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1151:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char server_finished_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char server_finished_hash[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1153:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char handshake_traffic_hash[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1154:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char client_app_traffic_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1155:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char server_app_traffic_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1156:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char exporter_master_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char early_exporter_master_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1159:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char read_iv[EVP_MAX_IV_LENGTH]; /* TLSv1.3 static read IV */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1164:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char write_iv[EVP_MAX_IV_LENGTH]; /* TLSv1.3 static write IV */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1175:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cert_verify_hash[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1187:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1200:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tmp_session_id[SSL_MAX_SSL_SESSION_ID_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1534:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char read_mac_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1536:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char write_mac_secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1537:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char server_random[SSL3_RANDOM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1538:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char client_random[SSL3_RANDOM_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1562:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char send_alert[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1573:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char finish_md[EVP_MAX_MD_SIZE * 2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1575:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char peer_finish_md[EVP_MAX_MD_SIZE * 2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1654:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char previous_client_finished[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1656:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char previous_server_finished[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1755:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char priority[8];  /* 64-bit value in big-endian encoding */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:1775:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cookie[DTLS1_COOKIE_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:2071:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char tls11downgrade[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:2072:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const unsigned char tls12downgrade[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:2624:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                  unsigned char *md_out,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_local.h:2626:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                  const unsigned char header[13],
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:886:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->cert->key->serverinfo, serverinfo, serverinfo_length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:1015:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(serverinfo + serverinfo_length + contextoff,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_sess.c:114:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, sizeof(*dest));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_sess.c:406:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ss->sid_ctx, s->sid_ctx, s->sid_ctx_length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_sess.c:432:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data.session_id, sess_id, sess_id_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_sess.c:820:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->session_id, sid, sid_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_sess.c:965:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->sid_ctx, sid_ctx, sid_ctx_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_sess.c:1033:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(s->ext.session_ticket->data, ext_data, ext_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions.c:1448:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hash[EVP_MAX_MD_SIZE], binderkey[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions.c:1449:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char finishedkey[EVP_MAX_MD_SIZE], tmpbinder[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:243:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->session->ext.tick,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:738:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char identity[PSK_MAX_IDENTITY_LEN + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:761:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char psk[PSK_MAX_PSK_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:1600:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s->ext.npn, selected, selected_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:1989:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->early_secret, s->psksession->early_secret, EVP_MAX_MD_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_srvr.c:741:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hmac[SHA256_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_srvr.c:742:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hrr[MAX_HRR_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_srvr.c:1099:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char pskdata[PSK_MAX_PSK_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_srvr.c:1163:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(sess->sid_ctx, s->sid_ctx, s->sid_ctx_length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_srvr.c:1901:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const unsigned char cryptopro_ext[36] = {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:1217:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(s->tmp_session_id, s->session->session_id, sess_id_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:1629:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(s->session->session_id, PACKET_data(&session_id),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:1699:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char sctpauthkey[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:1700:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:1707:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:2885:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char identity[PSK_MAX_IDENTITY_LEN + 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:2887:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char psk[PSK_MAX_PSK_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:3174:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char shared_ukm[32], tmp[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:3395:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char sctpauthkey[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:3396:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:3403:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:510:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&p[frag->msg_header.frag_off], frag->fragment,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:536:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seq64be[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:558:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:576:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char devnull[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:645:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seq64be[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:673:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char devnull[256];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:697:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:739:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char wire[DTLS1_HM_HEADER_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:776:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->init_buf->data, wire, readbytes);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:1034:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seq64be[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:1047:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(frag->fragment, s->init_buf->data, s->init_num);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:1104:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char seq64be[8];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_dtls.c:1128:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s->init_buf->data, frag->fragment,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:203:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tls13tbs + TLS13_TBS_PREAMBLE_SIZE, s->cert_verify_hash,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:239:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tls13tbs[TLS13_TBS_PREAMBLE_SIZE + EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:359:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tls13tbs[TLS13_TBS_PREAMBLE_SIZE + EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:599:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->s3->previous_client_finished, s->s3->tmp.finish_md,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:603:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->s3->previous_server_finished, s->s3->tmp.finish_md,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:825:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->s3->previous_client_finished, s->s3->tmp.peer_finish_md,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:829:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->s3->previous_server_finished, s->s3->tmp.peer_finish_md,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:2185:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hashvaltmp[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:2186:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char msghdr[SSL3_HM_HEADER_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:2365:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tbs, s->s3->client_random, SSL3_RANDOM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:2366:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tbs + SSL3_RANDOM_SIZE, s->s3->server_random, SSL3_RANDOM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_lib.c:2368:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tbs + SSL3_RANDOM_SIZE * 2, param, paramlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:852:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char sctpauthkey[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:853:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:860:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:1647:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s->s3->client_random, clienthello->random, SSL3_RANDOM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:1848:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->tmp_session_id, s->clienthello->session_id,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:2924:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char psk[PSK_MAX_PSK_LEN];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:2991:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rand_premaster_secret[SSL_MAX_MASTER_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:3344:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char premaster_secret[32];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:3520:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char sctpauthkey[64];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:3521:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:3527:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(labelbuffer, DTLS1_SCTP_AUTH_LABEL,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:3858:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:3859:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key_name[TLSEXT_KEYNAME_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:3968:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(key_name, tctx->ext.tick_key_name,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:4043:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tick_nonce[TICKET_NONCE_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:4045:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char age_add_c[sizeof(uint32_t)];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c:252:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mac_secret, ms, i);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c:440:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hash[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c:466:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[EVP_MAX_MD_SIZE * 2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c:546:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(val + currentvalpos, (unsigned char *)label, llen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c:548:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(val + currentvalpos, s->s3->client_random, SSL3_RANDOM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c:550:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(val + currentvalpos, s->s3->server_random, SSL3_RANDOM_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_enc.c:559:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(val + currentvalpos, context, contextlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:253:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ctmp[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:388:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char etmp[20];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:395:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(etmp, elem, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:1028:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sigalgstr[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:1366:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char tick_hmac[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:1506:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(sess->session_id, sess_id, sesslen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:1595:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sigalgstr[2];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:1961:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char etmp[TLS_MAX_SIGSTRING_LEN], *p;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:1969:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(etmp, elem, len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/t1_lib.c:2045:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sigalgs, psigs, salglen * sizeof(*sigalgs));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:19:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char default_zeros[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:47:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hkdflabel[sizeof(uint16_t) + sizeof(uint8_t)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:180:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char preextractsec[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:206:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char hash[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:292:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hash[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:309:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char finsecret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:368:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:452:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:453:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hashval[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:647:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->server_finished_hash, hashval, hashlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:650:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->handshake_traffic_hash, hashval, hashlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:675:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->server_app_traffic_secret, secret, hashlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:692:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(s->client_app_traffic_secret, secret, hashlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:726:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char secret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:755:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(insecret, secret, hashlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:778:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char exportsecret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:784:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:825:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char exportsecret[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls13_enc.c:826:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hash[EVP_MAX_MD_SIZE], data[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls_srp.c:143:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char b[SSL_MAX_MASTER_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls_srp.c:370:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv.h:1098:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char phys_addr[6];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv.h:1119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sysname[256];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv.h:1120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char release[256];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv.h:1121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version[256];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv.h:1122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char machine[256];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/os390.h:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rfis_rftok[8];                                                         \
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/unix.h:160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pad[sizeof(pthread_barrier_t) - sizeof(struct _uv_barrier*)];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/unix.h:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[NI_MAXHOST];                                                      \
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/unix.h:354:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char service[NI_MAXSERV];                                                   \
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/win.h:301:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char d_name[1];
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/win.h:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char accept_buffer[sizeof(struct sockaddr_storage) * 2 + 32];             \
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/win.h:506:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char last_key[8];                                                       \
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/win.h:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[NI_MAXHOST];                                                      \
data/nodejs-14.13.0~dfsg/deps/uv/include/uv/win.h:595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char service[NI_MAXSERV];                                                   \
data/nodejs-14.13.0~dfsg/deps/uv/src/fs-poll.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[1]; /* variable length */
data/nodejs-14.13.0~dfsg/deps/uv/src/fs-poll.c:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ctx->path, path, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/fs-poll.c:156:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, ctx->path, required_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[UV__INET_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[UV__INET6_ADDRSTRLEN], *tp;
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:138:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    tp += sprintf(tp, "%x", words[i]);
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[UV__INET6_ADDRSTRLEN], *s, *p;
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:167:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(s, src, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:182:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[sizeof(struct in_addr)], *tp;
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:213:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, tmp, sizeof(struct in_addr));
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:221:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[sizeof(struct in6_addr)], *tp, *endp, *colonp;
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:300:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, tmp, sizeof tmp);
data/nodejs-14.13.0~dfsg/deps/uv/src/threadpool.c:196:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    nthreads = atoi(val);
data/nodejs-14.13.0~dfsg/deps/uv/src/threadpool.c:238:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&once, &child_once, sizeof(child_once));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix-common.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char args[UV__PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix-common.c:76:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, original_exepath, *size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:406:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char* uv__rawname(const char* cp, char (*dst)[FILENAME_MAX+1]) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:443:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rawbuf[FILENAME_MAX+1];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:493:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[256];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[2048];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:532:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(cmd, "/aha/fs/modDir.monFactory");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:534:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(cmd, "/aha/fs/modFile.monFactory");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:555:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mon_file_write_string[RDWR_BUF_SIZE];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:556:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mon_file[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:563:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mon_file, "/aha/fs/modDir.monFactory");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:565:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mon_file, "/aha/fs/modFile.monFactory");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:576:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(mon_file, ".mon");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:581:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  *fd = open(mon_file, O_CREAT|O_RDWR);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:598:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mon_file_write_string, "CHANGED=YES;WAIT_TYPE=WAIT_IN_SELECT;INFO_LVL=2");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:600:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(mon_file_write_string, "CHANGED=YES;WAIT_TYPE=WAIT_IN_SELECT;INFO_LVL=1");
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:641:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   filename[PATH_MAX]; /* To be used when handling directories */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:704:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   result_data[RDWR_BUF_SIZE];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:708:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:773:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:774:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char absolute_path[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:775:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char readlink_cwd[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:873:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exepath[UV__PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:915:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s, argv[i], size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:978:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, process_argv[0], len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:994:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pp[64];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:1001:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(pp, O_RDONLY);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char l_buffer[NLMSG_ALIGN(sizeof(struct nlmsghdr)) + NLMSG_ALIGN(sizeof(struct rtgenmsg))];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:291:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&((struct sockaddr_in*)p_dest)->sin_addr, p_data, p_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:294:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&((struct sockaddr_in6*)p_dest)->sin6_addr, p_data, p_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:297:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(((struct sockaddr_ll*)p_dest)->sll_addr, p_data, p_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:301:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p_dest->sa_data, p_data, p_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:377:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(l_index, &l_info->ifi_index, sizeof(int));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:412:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(l_data, l_rtaData, l_rtaDataSize);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:432:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&l_index, l_indexPtr, sizeof(int));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:573:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char l_mask[16] = {0};
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/async.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/bsd-proctitle.c:90:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, process_title, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:709:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char scratch[1 + UV__PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1007:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(path, flags | O_CLOEXEC);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1016:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(path, flags);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1087:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, pwd.homedir, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1138:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, buf, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1208:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pwd->username, pw.pw_name, name_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1212:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pwd->homedir, pw.pw_dir, homedir_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1216:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pwd->shell, pw.pw_shell, shell_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1330:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, var, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1366:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[UV_MAXHOSTNAMESIZE];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1383:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, buf, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char abspath[UV__PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char trypath[UV__PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1570:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, abspath, *buflen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1600:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, abspath, *buflen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin-proctitle.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char namebuf[64];  /* MAXTHREADNAMESIZE */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char abspath[PATH_MAX * 2 + 1];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exepath[PATH_MAX + 1];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin.c:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, abspath, *size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin.c:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char model[512];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/freebsd.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char abspath[PATH_MAX * 2 + 1];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/freebsd.c:83:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, abspath, *size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/freebsd.c:180:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char model[512];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:139:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void*) req->path, path, path_len);                              \
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:140:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void*) req->new_path, new_path, new_path_len);                  \
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:340:7:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
  r = mkstemp(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:364:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return open(req->path, req->flags | O_CLOEXEC, req->mode);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:371:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  r = open(req->path, req->flags, req->mode);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8192];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:1893:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(req->bufs, bufs, nbufs * sizeof(*bufs));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:2063:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(req->bufs, bufs, nbufs * sizeof(*bufs));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[1];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:314:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(event->path, path, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname_ascii[256];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:196:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    req->hints = memcpy(buf + len, hints, sizeof(*hints));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:201:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    req->service = memcpy(buf + len, service, service_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:206:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    req->hostname = memcpy(buf + len, hostname, hostname_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ifname_buf[UV_IF_NAMESIZE];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:246:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, ifname_buf, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getnameinfo.c:90:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&req->storage,
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getnameinfo.c:94:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&req->storage,
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/haiku.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char abspath[B_PATH_NAME_LENGTH];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char current_date_and_time[8];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char system_name[8];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char elapsed_time[6];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char reserved2[3];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[208];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:107:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char loca_adapter_address[12];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msgid[7];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:118:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char e2a[256] = {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:137:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char a2e[256] = {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:184:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char format[8], reset_status[10];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:314:56:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int get_ibmi_physical_address(const char* line, char (*phys_addr)[6]) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:318:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char format[8], line_name[10];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:319:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char mac_addr[sizeof(rcvr.loca_adapter_address)];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:470:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exepath[UV__PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/kqueue.c:451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pathbuf[MAXPATHLEN];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/kqueue.c:510:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(handle->path, O_RDONLY);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:550:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:558:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open("/proc/self/stat", O_RDONLY);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:633:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:723:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:781:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        ci[speed_idx++].speed = atoi(buf + sizeof(speed_marker) - 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:824:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:886:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:1057:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];  /* Large enough to hold all of /proc/meminfo. */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:1109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:1110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];  /* Large enough to hold an encoded uint64_t. */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:1134:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];  /* Large enough to hold all of /proc/loadavg. */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-inotify.c:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4096];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-inotify.c:289:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  w->path = memcpy(w + 1, path, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/netbsd.c:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char int_buf[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/netbsd.c:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char model[512];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/openbsd.c:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, argsbuf[0], *size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/openbsd.c:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char model[512];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:67:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(copy, dirent, sizeof(*copy));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:186:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&once, &child_once, sizeof(child_once));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:444:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open("/dev/urandom", O_RDONLY);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:491:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char realpathstr[PATH_MAX + 1];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:507:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, tmpbuf, rlen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:543:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, realpathstr, vlen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:544:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf + vlen, delimiter, plen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char asid[2];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loginname[8];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:165:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char gthb[4];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:169:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char accessthid[3];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:178:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char gthe[4];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:256:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char args[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:357:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cpu_info->model, info.siv1v2si11v1.si11v1cpcmodel, CPCMODEL_LENGTH);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:531:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(address, addresses_v6, count_v6 * sizeof(uv_interface_address_t));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:658:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reg_struct.__rfis_utok, &handle, sizeof(handle));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390.c:692:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reg_struct.__rfis_rftok, handle->rfis_rftok,
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/pipe.c:273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, sa.sun_path, addrlen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/process.c:307:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        use_fd = open("/dev/null", fd == 0 ? O_RDONLY : O_RDWR);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c:81:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s, argv[i], size);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pt->str, title, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, process_title.str, process_title.len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/qnx.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/random-sysctl-linux.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uuid[16];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/random-sysctl-linux.c:94:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, uuid, n);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/signal.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[sizeof(uv__signal_msg_t) * 32];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/stream.c:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/stream.c:846:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char data[64];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/stream.c:1120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmsg_space[CMSG_SPACE(UV__CMSG_FD_SIZE)];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/stream.c:1456:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(req->bufs, bufs, nbufs * sizeof(bufs[0]));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sunos.c:384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sunos.c:600:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open("/proc/self/psinfo", O_RDONLY);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sunos.c:764:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(sin->sin6_addr.s6_addr,
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/tcp.c:340:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    single_accept = (val != NULL && atoi(val) != 0);  /* Off by default. */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/thread.c:502:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      atoi(version + 2) < 21;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/tty.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy[256];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/tty.c:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[256];
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/udp.c:679:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&req->addr, addr, addrlen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/udp.c:693:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(req->bufs, bufs, nbufs * sizeof(bufs[0]));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/udp.c:931:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mreq.gsr_group, multicast_addr, sizeof(*multicast_addr));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/udp.c:932:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mreq.gsr_source, source_addr, sizeof(*source_addr));
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:60:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(m, s, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:72:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(m, s, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char address_part[40];
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:250:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(address_part, ip, address_part_size);
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:257:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    addr->sin6_scope_id = atoi(zone_index);
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:606:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, handle->path, required_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/dl.c:34:8:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  if (!MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:181:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  name_size = MultiByteToWideChar(CP_UTF8, 0, path, -1, NULL, 0) *
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:188:8:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  if (!MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:161:17:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    pathw_len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:180:21:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    new_pathw_len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:209:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    DWORD r = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:223:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    DWORD r = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:238:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pos, path, path_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:317:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[MAXIMUM_REPARSE_DATA_BUFFER_SIZE];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:822:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(req->fs.info.bufs[index].base,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:1017:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((char*)view + view_offset + done_write,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:1376:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  __declspec(align(8)) char buffer[8192];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:1378:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  __attribute__ ((aligned (8))) char buffer[8192];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2789:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    XX(OPEN, open)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2811:17:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    XX(MKSTEMP, mkstemp)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2928:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(req->fs.info.bufs, bufs, nbufs * sizeof(*bufs));
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2961:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(req->fs.info.bufs, bufs, nbufs * sizeof(*bufs));
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:178:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(cur_ptr, addrinfow_ptr->ai_addr, addrinfo_ptr->ai_addrlen);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:263:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostname_ascii[256];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:289:29:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    nodesize = ALIGNED_SIZE(MultiByteToWideChar(CP_UTF8, 0, hostname_ascii,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:299:32:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    servicesize = ALIGNED_SIZE(MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:329:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:347:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:401:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t wname[NDIS_IF_MAX_STRING_SIZE + 1]; /* Add one for the NUL. */
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getnameinfo.c:126:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&req->storage,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getnameinfo.c:130:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&req->storage,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:555:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  nameSize = MultiByteToWideChar(CP_UTF8, 0, name, -1, NULL, 0) * sizeof(WCHAR);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:561:8:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  if (!MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:655:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  nameSize = MultiByteToWideChar(CP_UTF8, 0, name, -1, NULL, 0) * sizeof(WCHAR);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:661:8:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  if (!MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:1298:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&heap_buffer[heap_buffer_offset],
data/nodejs-14.13.0~dfsg/deps/uv/src/win/pipe.c:2247:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, pipe_prefix, pipe_prefix_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process-stdio.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pipe_name[64];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:112:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  ws_len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:127:7:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  r = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:540:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    arg_len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:581:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    arg_len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:700:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:725:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/tty.c:898:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&handle->tty.rd.last_key[prefix_len], vt100, vt100_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/udp.c:785:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mreq.gsr_group, multicast_addr, sizeof(*multicast_addr));
data/nodejs-14.13.0~dfsg/deps/uv/src/win/udp.c:786:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mreq.gsr_source, source_addr, sizeof(*source_addr));
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:236:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  utf16_len = MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:250:7:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  if (MultiByteToWideChar(CP_UTF8,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:402:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  length = MultiByteToWideChar(CP_UTF8, 0, title, -1, NULL, 0);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:414:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  length = MultiByteToWideChar(CP_UTF8, 0, title, -1, title_w, length);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:483:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, process_title, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1189:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, pwd.homedir, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1342:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  bufsize = MultiByteToWideChar(CP_UTF8, 0, utf8, utf8len, NULL, 0);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1356:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  bufsize = MultiByteToWideChar(CP_UTF8, 0, utf8, utf8len, *utf16, bufsize);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1371:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t username[UNLEN + 1];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1519:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t fastvar[512];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1667:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[UV_MAXHOSTNAMESIZE];
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1686:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, buf, len + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/winsock.c:558:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest4, addr, sizeof(*dest4));
data/nodejs-14.13.0~dfsg/deps/uv/src/win/winsock.c:564:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest6, addr, sizeof(*dest6));
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/fd_table.c:92:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mp_copy, mapped_path, mp_len);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/fd_table.c:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(rp_copy, real_path, rp_len);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:103:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ptr, cur, cur_len);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:336:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(res_path, fd->real_path, real_path_len);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:346:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(res_path, stripped_path, stripped_len);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:470:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(link_target, req.ptr, input_len + 1);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:280:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(uvwasi->argv_buf + offset, options->argv[i], size);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:314:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(uvwasi->env_buf + offset, options->envp[i], size);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:439:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(argv_buf, uvwasi->argv_buf, uvwasi->argv_buf_size);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:535:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(environ_buf, uvwasi->env_buf, uvwasi->env_buf_size);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:1162:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(path, wrap->path, size);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:1393:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((char*)buf + *bufused, dirents[i].name, size_to_cp);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:2069:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, req.ptr, len);
data/nodejs-14.13.0~dfsg/deps/v8/include/v8-internal.h:323:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&r, reinterpret_cast<void*>(addr), sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:385:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char last_few_messages[Heap::kTraceRingBufferSize + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:386:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char js_stacktrace[Heap::kStacktraceBufferSize + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:5213:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(current_write, read_start + read_index, copy_length);
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:5253:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char temp_buffer[unibrow::Utf8::kMaxEncodedSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:7235:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_data, data, bytes_to_copy);
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:7542:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, source + byte_offset, bytes_to_copy);
data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-value-factory.cc:381:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_literal_bytes, literal_bytes.begin(), length);
data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast.cc:276:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(result.get(), result_vec.data(), result_vec.size());
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:117:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/self/auxv", "r");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:180:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* fp = fopen(PATHNAME, "r");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:183:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[256];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:195:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(PATHNAME, "r");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:253:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(result, p, len);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:332:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vendor_, "Unknown", 8);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:346:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vendor_, cpu_info + 1, 12);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:609:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/self/auxv", "r");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.h:119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char vendor_[13];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace.cc:20:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (count) memcpy(trace_, trace, count * sizeof(trace_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_posix.cc:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[17] = {'\0'};
data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_posix.cc:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_win.cc:83:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t exe_path[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/file-utils.cc:24:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (basename_start > 0) memcpy(buffer.get(), exec_path, basename_start);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/file-utils.cc:25:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer.get() + basename_start, name, name_length);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/hashmap.h:149:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(map_, original->map_, capacity_ * sizeof(Entry));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/logging.cc:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message_[kMessageBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/memory.h:34:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&r, reinterpret_cast<void*>(p), sizeof(V));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/memory.h:41:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reinterpret_cast<void*>(p), &value, sizeof(V));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:91:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open("/proc/self/maps", O_RDONLY);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addr_buffer[11];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:107:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[MAP_LENGTH];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char regbuf[1];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:212:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/self/maps", "r");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:51:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/self/maps", "r");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:133:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* f = fopen(OS::GetGCFakeMMapFile(), "w+");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc:46:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/self/maps", "r");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc:111:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* f = fopen(OS::GetGCFakeMMapFile(), "w+");
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:504:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
OS::MemoryMappedFile* OS::MemoryMappedFile::open(const char* name,
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:507:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (FILE* file = fopen(name, fopen_mode)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:533:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (FILE* file = fopen(name, "w+")) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:625:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(path, mode);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:651:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  return tmpfile();
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:882:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-qnx.cc:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-qnx.cc:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-qnx.cc:105:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((proc_fd = open(buf, O_RDONLY)) == -1) {
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:62:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  *pFile = fopen(filename, mode);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char std_tz_name_[kTzNameSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:201:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dst_tz_name_[kTzNameSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4096];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:589:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempPathBuffer[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempNameBuffer[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:971:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
OS::MemoryMappedFile* OS::MemoryMappedFile::open(const char* name,
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:1201:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[OS::kStackWalkMaxNameLen] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform.h:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text[kStackWalkMaxTextLen];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform.h:201:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    static MemoryMappedFile* open(const char* name,
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform.h:407:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_[kMaxThreadNameLength];
data/nodejs-14.13.0~dfsg/deps/v8/src/base/small-vector.h:36:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(begin_, init.begin(), sizeof(T) * init.size());
data/nodejs-14.13.0~dfsg/deps/v8/src/base/small-vector.h:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(begin_, other.begin_, sizeof(T) * other_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/small-vector.h:68:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(begin_, other.begin_, sizeof(T) * other_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/small-vector.h:155:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_storage, begin_, sizeof(T) * in_use);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/utils/random-number-generator.cc:63:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/dev/urandom", "rb");
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-date.cc:816:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-date.cc:920:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-trace.cc:43:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf_, Handle<SeqOneByteString>::cast(string)->GetChars(no_gc),
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/builtins-typed-array-gen.cc:285:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  CallCFunction(memcpy, MachineType::AnyTagged(),
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/assembler-arm64.h:2589:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pc_, &instruction, sizeof(instruction));
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/assembler-arm64.h:2601:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pc_, data, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/instructions-arm64.h:743:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char form_buffer_[64];
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/instructions-arm64.h:744:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mne_buffer_[16];
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/macro-assembler-arm64.cc:375:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(bytes, &imm, sizeof(imm));
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-stub-assembler.cc:4551:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  CallCFunction(memcpy, MachineType::Pointer(),
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/external-reference.cc:566:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(dest, src, n);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/assembler-ia32.cc:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/optimized-compilation-info.cc:153:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(name.get(), name_vec.begin(), name_vec.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/register-configuration.cc:189:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  std::unique_ptr<char const* []> names { new char const*[num] };
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/assembler-s390.cc:114:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open("/proc/self/auxv", O_RDONLY);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/assembler-x64.cc:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/assembler-x64.cc:2115:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pc_, sequence, nop_bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/instruction-selector.cc:3160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(shuffle, S8x16ShuffleParameterOf(node->op()).data(), kSimd128Size);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/register-allocator.cc:1274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[kMaxPrefixLength];
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/register-allocator.cc:1322:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[kMaxPrefixLength];
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/bytecode-graph-builder.cc:4033:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, value_inputs, kSystemPointerSize * value_input_count);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-visualizer.cc:257:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, full_filename.begin(), full_filename.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.cc:1116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf.data() + 1, vals.begin(), sizeof(void*) * count);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.cc:2642:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if (params > 0) memcpy(&inputs[2], &args[1], params * sizeof(Node*));
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.cc:6304:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(name_buffer.get(), "js-to-wasm:", kNamePrefixLen);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.cc:6665:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(name_buffer.get(), "js-to-js:", kNamePrefixLen);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.cc:6721:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(name_buffer.get(), "c-wasm-entry:", kNamePrefixLen);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/wasm-compiler.cc:6792:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(index_name, name_vector.begin(), name_len);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kStdoutReadBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:319:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, buffer + length, fullness);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:366:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[999];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[999];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:388:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[999];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:396:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[999];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cache, entry->second->data, length);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:483:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cache, cache_data->data, length);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:627:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char system_buffer[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:633:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char curdir[PATH_MAX];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:1468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:2239:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(path, mode);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:2309:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      base::OS::MemoryMappedFile::open(
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:2958:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      options.read_from_tcp_port = atoi(argv[i] + 21);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:2968:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      options.thread_pool_size = atoi(argv[i] + 19);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:3508:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    trace_file.open(options.trace_path ? options.trace_path : "v8_trace.json");
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-remote-util.cc:16:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void UInt8ToHex(uint8_t byte, char chars[2]) {
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-remote-util.cc:22:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool HexToUInt8(const char chars[2], uint8_t* byte) {
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-remote-util.h:24:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void UInt8ToHex(uint8_t byte, char chars[2]);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/gdb-remote-util.h:28:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool HexToUInt8(const char chars[2], uint8_t* byte);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/packet.cc:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seq[2];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/packet.cc:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out[sizeof(val) * 2];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/packet.cc:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[2];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/packet.cc:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char seq[2];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/packet.cc:322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chars[2];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/session.cc:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chars[2];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/session.cc:125:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char out[3] = {'+', 0, 0};
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[16];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:493:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char address_string[32];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:635:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[64];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/transport.cc:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*dst, buf_.get() + pos_, copy_bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/transport.cc:427:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[16];
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/wasm-module-debug.cc:296:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, mem_start + offset, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/wasm-module-debug.cc:300:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, mem_start + offset, bytes_read);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/wasm-module-debug.cc:320:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, wire_bytes.start() + offset, bytes_read);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/wasm-module-debug.cc:353:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &value, *size);
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3556:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char re_form[sizeof(form_4v)];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/compilation-statistics.cc:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/eh-frame.cc:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy_data[EhFrameConstants::kEhFrameHdrSize - 4] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sectname[16];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char segname[16];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:477:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char segname[16];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:630:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(header->ident, ident, 16);
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:1959:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_name[64];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/perf-jit.cc:129:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open(perf_dump_name.begin(), O_CREAT | O_TRUNC | O_RDWR, 0666);
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/perf-jit.cc:392:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char padding_bytes[8] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/perf-jit.cc:459:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char padding_bytes[8] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/ppc/disasm-ppc.cc:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/s390/disasm-s390.cc:497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/unwinding-info-win64.cc:204:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&record->exception_thunk[0], masm.buffer_start(),
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/unwinding-info-win64.cc:482:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&record->exception_thunk[0], masm.buffer_start(),
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:634:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:738:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2 * sizeof(vfp_registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:739:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &registers_[reg], 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:740:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&dm_val, buffer, 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:746:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(registers_ + reg, value, sizeof(*value));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:757:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, vfp_registers_ + dreg * 2, sizeof(*value));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:762:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vfp_registers_ + dreg * 2, value, sizeof(*value));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:767:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, vfp_registers_ + dreg * 2, sizeof(*value) * 2);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:772:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vfp_registers_ + dreg * 2, value, sizeof(*value) * 2);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:780:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, vfp_registers_ + reg * (SIZE / 4), SIZE);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:788:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(vfp_registers_ + reg * (SIZE / 4), value, SIZE);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:823:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&vfp_registers_[reg_index * register_size], &value, bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:835:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&value, &vfp_registers_[register_size * reg_index], bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:888:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2 * sizeof(vfp_registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:891:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(vfp_registers_, buffer, sizeof(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:893:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2 * sizeof(registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:896:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(registers_, buffer, sizeof(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.cc:6053:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reinterpret_cast<intptr_t*>(entry_stack), arguments + reg_arg_count,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.h:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm/simulator-arm.h:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(stack, &(*it), sizeof(*it));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:266:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(alignment_slot, &kSlotsZapValue, kSystemPointerSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:268:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(stack_slot, &address, kSystemPointerSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:3286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:3287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:3288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:262:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<char*>(address), &value, sizeof(value));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:328:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&value_, &new_value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:341:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&value_[lane * sizeof(new_value)], &new_value, sizeof(new_value));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:675:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&bits_, &argument, sizeof(argument));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:681:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&bits_, &argument, sizeof(argument));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:692:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&bits_, &kFP64SignallingNaN, sizeof(kFP64SignallingNaN));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:695:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&bits_, &argument, sizeof(argument));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:758:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pc_, &new_pc, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.h:1515:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<void*>(address), &value, sizeof(value));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/frames.cc:1826:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char func_name[kMaxPrintedFunctionName + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/frames.cc:1828:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(func_name, raw_func_name.begin(), func_name_len);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate-data.h:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char padding_[kPaddingOffsetEnd + 1 - kPaddingOffset];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/isolate.h:2016:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char js_stack_trace_[kStacktraceBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:850:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:988:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2 * sizeof(registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:989:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &registers_[reg], 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:990:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&dm_val, buffer, 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1043:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, FPUregisters_ + wreg * 2, kSimd128Size);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1049:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(FPUregisters_ + wreg * 2, value, kSimd128Size);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1064:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(*x)];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1070:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(x, buffer, sizeof(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1074:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(y, buffer, sizeof(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1077:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(z, buffer, sizeof(*z));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1086:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2 * sizeof(registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1655:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v.b, value, kSimd128Size);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:1708:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v.b, value, kMSALanesByte);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:7030:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(stack_argument + kCArgSlotCount, arguments + reg_arg_count,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:7050:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, &d0, sizeof(d0));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.cc:7052:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, &d1, sizeof(d1));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.h:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips/simulator-mips.h:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:298:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:300:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:791:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:932:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &registers_[reg], sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:933:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&dm_val, buffer, sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:970:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(value, FPUregisters_ + wreg * 2, kSimd128Size);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:976:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(FPUregisters_ + wreg * 2, value, kSimd128Size);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:992:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(*x)];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:998:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(x, buffer, sizeof(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:1002:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(y, buffer, sizeof(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:1005:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(z, buffer, sizeof(*z));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:1014:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2 * sizeof(registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:1593:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v.b, value, kSimd128Size);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:1646:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v.b, value, kMSALanesByte);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:7450:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(stack_argument + kCArgSlotCount, arguments + reg_arg_count,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:7471:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, &d0, sizeof(d0));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.cc:7473:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, &d1, sizeof(d1));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.h:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/mips64/simulator-mips64.h:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:715:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(fp_registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:801:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &registers_[reg], 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:802:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&dm_val, buffer, 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:1194:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(reinterpret_cast<void*>(result_buffer), &result,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.cc:3874:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(stack_argument, arguments + reg_arg_count,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.h:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.h:256:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(value, reinterpret_cast<const char*>(address), sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.h:265:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(value, reinterpret_cast<const char*>(address), sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.h:274:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<char*>(address), &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/ppc/simulator-ppc.h:283:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(reinterpret_cast<char*>(address), &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[COMMAND_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg1[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arg2[ARG_SIZE + 1];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:251:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char mnemonic[256];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:735:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cached_line, line, CachePage::kLineLength);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:1671:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[sizeof(fp_registers_[0])];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:1672:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, &registers_[reg], 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:1673:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&dm_val, buffer, 2 * sizeof(registers_[0]));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:2140:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(reinterpret_cast<void*>(result_buffer), &result,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:2570:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(stack_argument, arguments + reg_arg_count,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3031:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&get_register(r1), src, size_by_byte);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3042:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, &get_register(r3), size_by_byte);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3062:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst + i, src + i2 * size_by_byte, size_by_byte);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3076:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst + i, src, size_by_byte);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3089:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst + i, &immediate, size_by_byte);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3133:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst_ptr + i, &dst_val, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3209:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(reinterpret_cast<D*>(dst) + i / (sizeof(D) / sizeof(S)), &value,
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3267:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&value, src + count, sizeof(S));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3274:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<D*>(dst) + i, &value, sizeof(D));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3358:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<D*>(dst) + i, &value, sizeof(D));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3415:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reinterpret_cast<D*>(dst) + i - 1, &value, sizeof(D));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3652:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst_ptr + i, &dst_val, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3730:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst_ptr + i, &dst_val, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:3992:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst_ptr + i, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4063:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst_ptr + i, &value, sizeof(D));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4132:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst_ptr, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4136:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(dst_ptr + i, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4143:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst_ptr, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4147:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(dst_ptr + i, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4154:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst_ptr, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4158:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(dst_ptr + i, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4195:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst_ptr + i, &value, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.cc:4930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char new_instr_buf[8];
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.h:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[kPageSize];  // The cached data.
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/s390/simulator-s390.h:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char validity_map_[kValidityMapSize];  // One byte per line.
data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/cputracemark-extension.h:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer_[50];
data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/gc-extension.h:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer_[50];
data/nodejs-14.13.0~dfsg/deps/v8/src/extensions/vtunedomain-support-extension.h:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer_[50];
data/nodejs-14.13.0~dfsg/deps/v8/src/flags/flags.cc:383:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1 * KB];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/concurrent-marking.h:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cache_line_padding[64];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/cppgc/worklist.h:286:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cache_line_padding[64];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory.cc:2953:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arr[kNumberToStringBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory.cc:2970:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arr[kNumberToStringBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory.cc:3002:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char arr[kNumberToStringBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/gc-tracer.cc:500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char raw_buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/gc-tracer.cc:513:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char incremental_buffer[kIncrementalStatsSize] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4842:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(trace_ring_buffer_ + ring_buffer_end_, string, first_part);
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4847:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(trace_ring_buffer_, string + first_part, second_part);
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4857:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, trace_ring_buffer_ + ring_buffer_end_, copied);
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4859:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer + copied, trace_ring_buffer_, ring_buffer_end_);
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.h:2189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char trace_ring_buffer_[kTraceRingBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-heap.cc:106:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(isolate_ro_roots, shared_ro_heap_->read_only_roots_,
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/read-only-heap.cc:148:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  std::memcpy(read_only_roots_, isolate_ro_roots,
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/worklist.h:275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cache_line_padding[64];
data/nodejs-14.13.0~dfsg/deps/v8/src/init/icu_util.cc:74:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* inf = fopen(icu_data_file, "rb");
data/nodejs-14.13.0~dfsg/deps/v8/src/init/startup-data-util.cc:45:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(blob_file, "rb");
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arr[50];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[50];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arr[50];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-runtime-agent-impl.cc:643:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[40];
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/v8-string-conversions.cc:39:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char firstByteMark[7] = {0x00, 0x00, 0xC0, 0xE0,
data/nodejs-14.13.0~dfsg/deps/v8/src/json/json-stringifier.cc:464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chars[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/json/json-stringifier.cc:622:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chars[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/json/json-stringifier.cc:634:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char chars[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-object.cc:28:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*buffer, *member, length);
data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/tracing-controller.cc:62:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char g_category_group_enabled[kMaxCategoryGroups] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log.cc:178:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char utf8_buffer_[kUtf8BufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:586:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:956:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char decimal_rep[kV8DtoaBufferCapacity];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1034:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char arr[kMaxFractionDigits];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1045:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kDecimalRepCapacity];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kV8DtoaBufferCapacity];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decimal_rep[kV8DtoaBufferCapacity];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1313:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(result, buffer + integer_cursor, fraction_cursor - integer_cursor);
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1382:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char reverse_buffer[kBufferSize + 1];  // Result will be /0 terminated.
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/strtod.cc:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char significant_buffer[kMaxSignificantDecimalDigits];
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/backing-store.cc:458:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_backing_store->buffer_start(), buffer_start_, byte_length_);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/bigint.cc:365:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reinterpret_cast<void*>(result->address() + BigIntBase::kHeaderSize),
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/bigint.cc:1997:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(storage, digits, bytelength);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/bigint.cc:2023:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digits, digits_storage.begin(), bytelength);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/elements.cc:3459:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        std::memcpy(cloned_source_elements.get(), source_data,
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/fixed-array-inl.h:506:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reinterpret_cast<void*>(dst_addr), buffer, length);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/fixed-array-inl.h:513:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, reinterpret_cast<void*>(src_addr), length);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/intl-objects.cc:1741:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[ULOC_FULLNAME_CAPACITY];
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-array-buffer.cc:189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(backing_store->buffer_start(), self->DataPtr(), byte_length);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-display-names.cc:360:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int32_t i = atoi(code);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-display-names.cc:376:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return atoi(code) - 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-display-names.cc:389:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    return atoi(code) - 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/layout-descriptor.cc:104:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_layout_descriptor->GetDataStartAddress(),
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/shared-function-info-inl.h:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reinterpret_cast<void*>(dst_addr), buffer, length);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/stack-frame-info.cc:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[16];
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/value-serializer.cc:326:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, source, length);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/value-serializer.cc:1175:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&value, position_, sizeof(double));
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/value-serializer.cc:1412:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(string->GetChars(no_gc), bytes.begin(), bytes.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/value-serializer.cc:1767:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(array_buffer->backing_store(), position_, byte_length);
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/keywords-gen.h:72:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const unsigned char asso_values[128] = {
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/keywords-gen.h:85:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char kPerfectKeywordLengthTable[64] = {
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parser.h:775:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char array[100];
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/preparse-data.cc:134:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(raw_zone_data, byte_data_->data(), index_);
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner-character-streams.cc:801:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char non_null_empty_string[1] = {0};
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner.cc:1037:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, vector.begin(), length);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-compiler.cc:944:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char templ[kSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-macro-assembler-tracer.cc:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer_[4];
data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-internal.cc:516:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      f = std::fopen(filename, "a");
data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-typedarray.cc:111:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(data_copy_ptr, static_cast<void*>(array->DataPtr()), bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime-typedarray.cc:150:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(static_cast<void*>(array->DataPtr()), data_copy_ptr, bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime.cc:259:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(redirected_functions, kIntrinsicFunctions,
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/code-serializer.cc:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reservations.data(), data_ + kHeaderSize,
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/deserializer.cc:45:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest.ToVoidPtr(), &value, kSystemPointerSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/deserializer.cc:54:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest.ToVoidPtr(), &value, kExternalPointerSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-data.cc:82:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  std::memcpy(allocated_bytes, d.data(), d.size());
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-data.cc:240:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(blob + IsolateHashOffset(), &hash, IsolateHashSize());
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-data.cc:245:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  std::memcpy(blob + MetadataOffset(), metadata.data(), MetadataSize());
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-data.cc:255:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(dst, reinterpret_cast<uint8_t*>(code.raw_instruction_start()),
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-data.cc:268:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(blob + EmbeddedBlobHashOffset(), &hash, EmbeddedBlobHashSize());
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc:62:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&high, data, kHalfSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc:63:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&low, data + kHalfSize, kHalfSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc:65:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&high, data + kHalfSize, kHalfSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/platform-embedded-file-writer-base.cc:66:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&low, data, kHalfSize);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-data.cc:63:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(reservations.data(), data_ + kHeaderSize,
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot-source-sink.h:45:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, data_ + position_, number_of_bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/snapshot.cc:603:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version[kVersionStringLength];
data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-builder-inl.h:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[kIntToCStringBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/strings/uri.cc:258:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[4] = {};
data/nodejs-14.13.0~dfsg/deps/v8/src/strings/uri.cc:268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[4] = {};
data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/siphash/halfsiphash.cc:52:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(k, &seed, sizeof(seed));
data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/vtune-jit.cc:223:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(temp_file_name.get(), filename, filename_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/vtuneapi.cc:15:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t buffer[255];
data/nodejs-14.13.0~dfsg/deps/v8/src/third_party/vtune/vtuneapi.cc:58:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t buffer[255];
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/globals.h:28:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    Get().logfile_.open(path);
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/message-handler.cc:46:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int content_length = std::atoi(line.substr(kContentLengthSize).c_str());
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/utils.cc:328:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    new_contents_stream.open(file_path.c_str());
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/utils.h:349:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer_[64];
data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/trace-event.h:437:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(value, &arg, sizeof(arg));                                       \
data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/trace-event.h:497:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char arg_types[2];
data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/trace-event.h:539:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char arg_types[2];
data/nodejs-14.13.0~dfsg/deps/v8/src/tracing/traced-value.cc:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char number_buffer[8];
data/nodejs-14.13.0~dfsg/deps/v8/src/trap-handler/handler-outside.cc:127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data->instructions, protected_instructions,
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/memcopy.h:46:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, chars);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/memcopy.h:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, chars);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/memcopy.h:88:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, N); \
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/memcopy.h:108:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, src, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[10];
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:134:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[10];
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[13];
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.cc:176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[kMaxHexLength];
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/ostreams.h:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data_[256];
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line_buf[256];
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/c-api.cc:110:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  std::memcpy(name.get(), wire_bytes.begin() + ref.offset(), ref.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/c-api.cc:1047:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  std::memcpy(ptr, wire_bytes.begin(), binary_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/c-api.cc:2205:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(v2.get(), data, size * sizeof(wasm_##name##_t));       \
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/function-body-decoder-impl.h:1894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer_[kMaxLen];
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/graph-builder-interface.cc:957:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(result->locals, from->locals, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/local-decl-encoder.cc:20:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer + pos, *start, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-instantiate.cc:725:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      std::memcpy(instance->memory_start() + dest_offset,
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-instantiate.cc:736:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dest, src, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/module-instantiate.cc:1442:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(raw_buffer_ptr(untagged_globals_, new_offset),
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.cc:58:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(remaining_buf.begin(), &bytes.first(), num_bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.cc:91:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cursor, module_header, arraysize(module_header));
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.cc:96:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cursor, buffer->bytes().begin(), buffer->length());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.cc:319:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(remaining_buf.begin(), &bytes.first(), new_bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.cc:430:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(payload_buf.begin(), buffer().begin(), bytes_consumed_);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.cc:461:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(fun_length_buffer.begin(), buffer().begin(), bytes_consumed_);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/streaming-decoder.h:118:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bytes_.start() + 1, &length_bytes.first(), length_bytes.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.cc:179:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, vec.begin(), vec.size());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.cc:807:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_table.get(), code_table_.get(),
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.cc:853:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reloc_info.start(), code->relocation_start(), relocation_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.cc:879:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst_code_bytes.begin(), instructions.begin(), instructions.size());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.cc:1001:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst_code_bytes.begin(), desc.buffer,
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-code-manager.cc:1127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst_code_bytes.begin(), instructions.begin(), instructions.size());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-debug-evaluate.cc:108:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(&evaluator_->memory_start()[result],
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-debug-evaluate.cc:142:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&evaluator_->memory_start()[result_offset], &val, sizeof(T));
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-engine.cc:562:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(copy.get(), bytes.start(), bytes.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-engine.cc:590:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(copy.get(), bytes.start(), bytes.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-engine.cc:684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[kBufferSize];
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-external-refs.cc:415:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  std::memcpy(EffectiveAddress(instance, dst),
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-interpreter.cc:3842:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_stack.get(), stack_.get(), old_size * sizeof(*sp_));
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-interpreter.cc:4355:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(code->start, code->orig_start, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-js.cc:622:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(copy.get(), bytes.start(), bytes.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-js.cc:665:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(copy.get(), bytes.start(), bytes.length());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module-builder.h:87:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pos_, data, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module-builder.h:133:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_buffer, buffer_, (pos_ - buffer_));
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module.cc:611:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(array_buffer->backing_store(),
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module.h:483:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer_, start, kMaxLen - 3);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-module.h:496:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer_[kMaxLen];
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-serialization.cc:59:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(current_location(), v.begin(), v.size());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-serialization.cc:369:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(code_start, code->instructions().begin(), code_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-serialization.cc:416:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(serialized_code_start, code_start, code_size);
data/nodejs-14.13.0~dfsg/deps/v8/src/zone/zone-list-inl.h:37:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data_ + length_, other.begin(), sizeof(*data_) * other.length());
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/callback.c:71:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("callback.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/finalize.c:23:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("finalize.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/global.c:56:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("global.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hello.c:28:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("hello.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hostref.c:133:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("hostref.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/memory.c:107:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("memory.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/multi.c:46:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("multi.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/reflect.c:93:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("reflect.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/serialize.c:26:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("serialize.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/start.c:29:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("start.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/table.c:85:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("table.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/threads.c:102:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("threads.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/trap.c:41:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("trap.wasm", "r");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/crypt.h:100:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char header[RAND_HEAD_LEN-2]; /* random header */
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/ioapi.c:19:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/ioapi.c:109:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode_fopen);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/ioapi.h:49:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen64 fopen
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/ioapi.h:54:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen64 fopen
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/ioapi.h:59:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 #define fopen64 fopen
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/iowin32.c:117:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/iowin32.c:142:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/iowin32.c:190:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:32:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char number[21];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:248:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char filename_inzip[256];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_inzip[256];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:386:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char answer[128];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_try[MAXFILENAME+16] = "";
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:621:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(filename_try,".zip");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:33:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAXFILENAME+1];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_try[MAXFILENAME+16];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:334:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(filename_try,".zip");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:349:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char answer[128];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:38:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpZip = fopen(file, "rb");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:39:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpOut = fopen(fileOut, "wb");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:40:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpOutCD = fopen(fileOutTmp, "wb");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[30];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[1024];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char extra[1024];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:149:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char header[46];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:224:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char header[22];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:257:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fpOutCD = fopen(fileOutTmp, "rb");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:260:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[8192];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/unzip.c:1262:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCurrentFileName[UNZ_MAXFILENAMEINZIP+1];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/unzip.c:1478:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char source[12];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:120:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[SIZEDATA_INDATABLOCK];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:289:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[8];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:1246:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char bufHead[RAND_HEAD_LEN];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:1980:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTmp, p, dataSize + 4);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:1994:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pData, pNewHeader, size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/chunkcopy.h:14:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define Z_STATIC_ASSERT(name, assert) typedef char name[(assert) ? 1 : -1]
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/inflate.c:652:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/optimizations/inflate.c:1427:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc32.c:149:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen("crc32.h", "w");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc_folding.c:395:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&parts, src, len);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/crc_folding.c:401:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&parts, src, len);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_internal.cc:181:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, &buffer->data[buffer->offset], size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_reader.cc:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char raw_file_name_in_zip[internal::kZipMaxPath] = {};
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_reader.cc:413:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[internal::kZipBufSize];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_reader_unittest.cc:667:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[kSomeDataLen] = {};
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/google/zip_writer.cc:23:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[zip::internal::kZipBufSize];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzguts.h:47:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open _open
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:36:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[1024];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:65:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "unknown win32 error (%ld)", error);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:245:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        open((const char *)path, oflag, 0666));
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:298:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(path, "<fd:%d>", fd);   /* for debugging */
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:615:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(state->msg, ": ");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzread.c:161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->x.next, strm->next_in, strm->avail_in);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzread.c:325:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, state->x.next, n);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzread.c:455:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzread.c:595:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, state->x.next, n);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:213:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(state->in + have, buf, copy);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:309:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:444:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inflate.c:641:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/inflate.c:1407:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/trees.c:328:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *header = fopen("trees.h", "w");
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.c:13:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
z_const char * const z_errmsg[10] = {
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:64:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:124:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512")
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:217:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define F_OPEN(name, mode) fopen((name), (mode))
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/zutil.h:241:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#    define zmemcpy memcpy
data/nodejs-14.13.0~dfsg/deps/v8/tools/shell-utils.h:44:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(name, "rb");
data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/base/utilities.h:22:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      ::MultiByteToWideChar(CP_UTF8, 0, utf8_string.c_str(), -1, nullptr, 0);
data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/base/utilities.h:30:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      ::MultiByteToWideChar(CP_UTF8, 0, utf8_string.c_str(), -1,
data/nodejs-14.13.0~dfsg/deps/v8/tools/v8windbg/test/v8windbg-test.cc:134:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t this_module_path[MAX_PATH];
data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/chunkcopy.h:14:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define Z_STATIC_ASSERT(name, assert) typedef char name[(assert) ? 1 : -1]
data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/inflate.c:652:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/nodejs-14.13.0~dfsg/deps/zlib/contrib/optimizations/inflate.c:1427:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/nodejs-14.13.0~dfsg/deps/zlib/crc32.c:152:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen("crc32.h", "w");
data/nodejs-14.13.0~dfsg/deps/zlib/crc_folding.c:404:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&parts, src, len);
data/nodejs-14.13.0~dfsg/deps/zlib/crc_folding.c:410:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&parts, src, len);
data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_internal.cc:180:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, &buffer->data[buffer->offset], size);
data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_reader.cc:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char raw_file_name_in_zip[internal::kZipMaxPath] = {};
data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_reader.cc:413:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[internal::kZipBufSize];
data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_reader_unittest.cc:667:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[kSomeDataLen] = {};
data/nodejs-14.13.0~dfsg/deps/zlib/google/zip_writer.cc:23:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[zip::internal::kZipBufSize];
data/nodejs-14.13.0~dfsg/deps/zlib/gzguts.h:47:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define open _open
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:36:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[1024];
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:65:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "unknown win32 error (%ld)", error);
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:245:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        open((const char *)path, oflag, 0666));
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:298:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(path, "<fd:%d>", fd);   /* for debugging */
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:615:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(state->msg, ": ");
data/nodejs-14.13.0~dfsg/deps/zlib/gzread.c:161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->x.next, strm->next_in, strm->avail_in);
data/nodejs-14.13.0~dfsg/deps/zlib/gzread.c:325:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, state->x.next, n);
data/nodejs-14.13.0~dfsg/deps/zlib/gzread.c:455:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/nodejs-14.13.0~dfsg/deps/zlib/gzread.c:595:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, state->x.next, n);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:213:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(state->in + have, buf, copy);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:309:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[1];
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:444:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(state->in, state->in + state->size, left);
data/nodejs-14.13.0~dfsg/deps/zlib/inflate.c:641:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char hbuf[4];      /* buffer for gzip header crc calculation */
data/nodejs-14.13.0~dfsg/deps/zlib/inflate.c:1407:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[4];       /* to restore bit buffer to byte string */
data/nodejs-14.13.0~dfsg/deps/zlib/trees.c:328:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *header = fopen("trees.h", "w");
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.c:13:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
z_const char * const z_errmsg[10] = {
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:64:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:124:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512")
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:217:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define F_OPEN(name, mode) fopen((name), (mode))
data/nodejs-14.13.0~dfsg/deps/zlib/zutil.h:241:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#    define zmemcpy memcpy
data/nodejs-14.13.0~dfsg/src/aliased_buffer.h:234:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_buffer, buffer_, old_size_in_bytes);
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:424:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest->h_name, src->h_name, name_size);
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:437:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->h_aliases[i], src->h_aliases[i], cur_alias_size);
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:451:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->h_addr_list[i], src->h_addr_list[i], src->h_length);
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:663:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf_copy, answer_buf, answer_len);
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:841:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ip[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:1749:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char address_buffer[sizeof(struct in6_addr)];
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:1850:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ip[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:1936:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char canonical_ip[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:2052:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ip[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/debug_utils-inl.h:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ret[3 * sizeof(T)];
data/nodejs-14.13.0~dfsg/src/debug_utils-inl.h:108:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char out[20];
data/nodejs-14.13.0~dfsg/src/debug_utils.cc:170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR)];
data/nodejs-14.13.0~dfsg/src/debug_utils.cc:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szUndName[MAX_SYM_NAME];
data/nodejs-14.13.0~dfsg/src/debug_utils.cc:496:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  int n = MultiByteToWideChar(CP_UTF8, 0, str.data(), str.size(), nullptr, 0);
data/nodejs-14.13.0~dfsg/src/debug_utils.cc:499:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  MultiByteToWideChar(CP_UTF8, 0, str.data(), str.size(), wbuf.data(), n);
data/nodejs-14.13.0~dfsg/src/env.cc:283:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char exec_path_buf[2 * PATH_MAX];
data/nodejs-14.13.0~dfsg/src/heap_utils.cc:263:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf.base, data, avail);
data/nodejs-14.13.0~dfsg/src/heap_utils.cc:317:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "w");
data/nodejs-14.13.0~dfsg/src/inspector_agent.cc:159:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t mapping_name[32];
data/nodejs-14.13.0~dfsg/src/inspector_io.cc:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char uuid[256];
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:144:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                   char (*buffer)[ACCEPT_KEY_LENGTH]) {
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hash[SHA_DIGEST_LENGTH];
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char extended_payload_length[8];
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:442:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char accept_string[ACCEPT_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:616:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/inspector_socket_server.cc:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char header[sizeof(HEADERS) + 20];
data/nodejs-14.13.0~dfsg/src/js_native_api_v8.h:265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(static_cast<void*>(&local), &v, sizeof(v));
data/nodejs-14.13.0~dfsg/src/js_stream.cc:180:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf.base, data, avail);
data/nodejs-14.13.0~dfsg/src/js_udp_wrap.cc:163:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf.base, data, avail);
data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char selfexe[PATH_MAX];
data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc:263:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  ifs.open("/sys/kernel/mm/transparent_hugepage/enabled");
data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc:347:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(nmem.mem(), r.from, size);
data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc:359:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(start, nmem.mem(), size);
data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc:366:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(start, nmem.mem(), size);
data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc:378:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(tmem.mem(), nmem.mem(), size);
data/nodejs-14.13.0~dfsg/src/large_pages/node_large_page.cc:381:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(start, tmem.mem(), size);
data/nodejs-14.13.0~dfsg/src/node.cc:587:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (fd != open("/dev/null", O_RDWR))
data/nodejs-14.13.0~dfsg/src/node.cc:900:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* f = fopen(full_path, "rb");
data/nodejs-14.13.0~dfsg/src/node_binding.cc:483:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char errmsg[1024];
data/nodejs-14.13.0~dfsg/src/node_binding.cc:503:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char errmsg[1024];
data/nodejs-14.13.0~dfsg/src/node_binding.cc:572:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[1024];
data/nodejs-14.13.0~dfsg/src/node_binding.cc:635:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errmsg[1024];
data/nodejs-14.13.0~dfsg/src/node_buffer.cc:382:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ret.data(), data, length);
data/nodejs-14.13.0~dfsg/src/node_buffer.cc:576:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(
data/nodejs-14.13.0~dfsg/src/node_buffer.cc:598:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ts_obj_data + start, *str, std::min(str_length, fill_length));
data/nodejs-14.13.0~dfsg/src/node_buffer.cc:606:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ts_obj_data + start, *str, std::min(str_length, fill_length));
data/nodejs-14.13.0~dfsg/src/node_buffer.cc:637:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, ts_obj_data + start, in_there);
data/nodejs-14.13.0~dfsg/src/node_buffer.cc:643:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, ts_obj_data + start, fill_length - in_there);
data/nodejs-14.13.0~dfsg/src/node_credentials.cc:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8192];
data/nodejs-14.13.0~dfsg/src/node_credentials.cc:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8192];
data/nodejs-14.13.0~dfsg/src/node_credentials.cc:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8192];
data/nodejs-14.13.0~dfsg/src/node_credentials.cc:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8192];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:176:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, passphrase, len);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:188:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static ENGINE* LoadEngineById(const char* engine_id, char (*errmsg)[1024]) {
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char code[128];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:342:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[256];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:388:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message_buffer[128] = {0};
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:782:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[1024];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1492:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[1024];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1515:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Buffer::Data(buff), wrap->ticket_key_name_, 16);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1516:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Buffer::Data(buff) + 16, wrap->ticket_key_hmac_, 16);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1517:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(Buffer::Data(buff) + 32, wrap->ticket_key_aes_, 16);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1543:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(wrap->ticket_key_name_, buf.data(), 16);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1544:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(wrap->ticket_key_hmac_, buf.data() + 16, 16);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1545:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(wrap->ticket_key_aes_, buf.data() + 32, 16);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1665:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(name, sc->ticket_key_name_, sizeof(sc->ticket_key_name_));
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1907:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy[1];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy[1];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:3625:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char key[EVP_MAX_KEY_LENGTH];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:3626:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char iv[EVP_MAX_IV_LENGTH];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:3696:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[128];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:3787:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[50];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:3799:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[128];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:3903:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[50];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:4238:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char md_value[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:4656:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char m[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:4899:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char m[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:5473:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[64];
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:6676:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf.data(), ptr->data, *size);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:6904:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[1024];
data/nodejs-14.13.0~dfsg/src/node_crypto.h:119:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ticket_key_name_[16];
data/nodejs-14.13.0~dfsg/src/node_crypto.h:120:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ticket_key_aes_[16];
data/nodejs-14.13.0~dfsg/src/node_crypto.h:121:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ticket_key_hmac_[16];
data/nodejs-14.13.0~dfsg/src/node_crypto.h:600:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char auth_tag_[EVP_GCM_TLS_TAG_LEN];
data/nodejs-14.13.0~dfsg/src/node_crypto_bio.cc:277:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(out + offset, read_head_->data_ + read_head_->read_pos_, avail);
data/nodejs-14.13.0~dfsg/src/node_crypto_bio.cc:376:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(write_head_->data_ + write_head_->write_pos_,
data/nodejs-14.13.0~dfsg/src/node_crypto_common.cc:64:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char crandom[32];
data/nodejs-14.13.0~dfsg/src/node_crypto_common.cc:517:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/nodejs-14.13.0~dfsg/src/node_crypto_common.cc:537:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char (*fingerprint)[3 * EVP_MAX_MD_SIZE + 1]) {
data/nodejs-14.13.0~dfsg/src/node_crypto_common.cc:593:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char md[EVP_MAX_MD_SIZE];
data/nodejs-14.13.0~dfsg/src/node_crypto_common.cc:595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fingerprint[EVP_MAX_MD_SIZE * 3 + 1];
data/nodejs-14.13.0~dfsg/src/node_env_var.cc:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char val[2];
data/nodejs-14.13.0~dfsg/src/node_errors.cc:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char underline_buf[kUnderlineBufsize + 4];
data/nodejs-14.13.0~dfsg/src/node_errors.h:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[128];
data/nodejs-14.13.0~dfsg/src/node_errors.h:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[128];
data/nodejs-14.13.0~dfsg/src/node_file-inl.h:62:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*buffer_, data, len);
data/nodejs-14.13.0~dfsg/src/node_file.cc:246:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[70];
data/nodejs-14.13.0~dfsg/src/node_file.cc:1719:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FS_SYNC_TRACE_BEGIN(open);
data/nodejs-14.13.0~dfsg/src/node_file.cc:1722:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FS_SYNC_TRACE_END(open);
data/nodejs-14.13.0~dfsg/src/node_file.cc:1752:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FS_SYNC_TRACE_BEGIN(open);
data/nodejs-14.13.0~dfsg/src/node_file.cc:1755:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FS_SYNC_TRACE_END(open);
data/nodejs-14.13.0~dfsg/src/node_http2.cc:47:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char zero_bytes_256[256] = {};
data/nodejs-14.13.0~dfsg/src/node_http2.cc:1071:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf.base, data, avail);
data/nodejs-14.13.0~dfsg/src/node_http2.cc:1558:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&outgoing_storage_[offset], src, src_length);
data/nodejs-14.13.0~dfsg/src/node_http2.cc:1769:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_buf.data(), stream_buf_.base + stream_buf_offset_, pending_len);
data/nodejs-14.13.0~dfsg/src/node_http2.cc:1770:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_buf.data() + pending_len, buf.data(), nread);
data/nodejs-14.13.0~dfsg/src/node_http2.cc:2876:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data, &startTime_, arraysize(data));
data/nodejs-14.13.0~dfsg/src/node_http_parser.cc:125:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(s, str_, size_);
data/nodejs-14.13.0~dfsg/src/node_http_parser.cc:150:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(s, str_, size_);
data/nodejs-14.13.0~dfsg/src/node_http_parser.cc:151:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(s + size_, str, size);
data/nodejs-14.13.0~dfsg/src/node_i18n.cc:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst, data, length);
data/nodejs-14.13.0~dfsg/src/node_main.cc:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[SKIP_CHECK_SIZE + 1];
data/nodejs-14.13.0~dfsg/src/node_metadata.cc:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/nodejs-14.13.0~dfsg/src/node_metadata.cc:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[U_MAX_VERSION_STRING_LENGTH];
data/nodejs-14.13.0~dfsg/src/node_native_module.cc:221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4096];
data/nodejs-14.13.0~dfsg/src/node_os.cc:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[UV_MAXHOSTNAMESIZE];
data/nodejs-14.13.0~dfsg/src/node_os.cc:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/node_os.cc:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char netmask[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/node_os.cc:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX];
data/nodejs-14.13.0~dfsg/src/node_process_events.cc:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char warning[1024];
data/nodejs-14.13.0~dfsg/src/node_process_methods.cc:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX_BYTES];
data/nodejs-14.13.0~dfsg/src/node_process_methods.cc:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX_BYTES];
data/nodejs-14.13.0~dfsg/src/node_process_methods.cc:355:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t mapping_name[32];
data/nodejs-14.13.0~dfsg/src/node_report.cc:129:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      outfile.open(pathname, std::ios::out | std::ios::binary);
data/nodejs-14.13.0~dfsg/src/node_report.cc:131:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      outfile.open(filename, std::ios::out | std::ios::binary);
data/nodejs-14.13.0~dfsg/src/node_report.cc:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timebuf[64];
data/nodejs-14.13.0~dfsg/src/node_report.cc:251:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX_BYTES];
data/nodejs-14.13.0~dfsg/src/node_report.cc:391:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[UV_MAXHOSTNAMESIZE];
data/nodejs-14.13.0~dfsg/src/node_report.cc:422:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/node_report.cc:423:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char netmask[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/node_report.cc:424:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mac[18];
data/nodejs-14.13.0~dfsg/src/node_report_utils.cc:25:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hostbuf[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/node_sockaddr-inl.h:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char host[INET6_ADDRSTRLEN];
data/nodejs-14.13.0~dfsg/src/node_sockaddr-inl.h:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&address_, addr, GetLength(addr));
data/nodejs-14.13.0~dfsg/src/node_sockaddr-inl.h:76:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&address_, &addr.address_, addr.length());
data/nodejs-14.13.0~dfsg/src/node_sockaddr-inl.h:80:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&address_, addr, GetLength(addr));
data/nodejs-14.13.0~dfsg/src/node_sockaddr-inl.h:85:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&address_, &addr.address_, addr.length());
data/nodejs-14.13.0~dfsg/src/node_sockaddr-inl.h:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&address_, data, len);
data/nodejs-14.13.0~dfsg/src/node_url.cc:1126:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[4];
data/nodejs-14.13.0~dfsg/src/node_url.cc:1153:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[5];
data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider-inl.h:229:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t symbuf[128];
data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider-inl.h:233:20:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      symbol_len = MultiByteToWideChar(CP_ACP,
data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider.cc:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix[32 - sizeof(size_t)];
data/nodejs-14.13.0~dfsg/src/node_worker.cc:132:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char err_buf[128];
data/nodejs-14.13.0~dfsg/src/node_worker.cc:648:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char err_buf[128];
data/nodejs-14.13.0~dfsg/src/node_worker.cc:693:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ab->GetBackingStore()->Data(),
data/nodejs-14.13.0~dfsg/src/spawn_sync.cc:70:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, data_, used());
data/nodejs-14.13.0~dfsg/src/spawn_sync.h:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  mutable char data_[kBufferSize];
data/nodejs-14.13.0~dfsg/src/stream_base.cc:242:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stack_storage[16384];  // 16kb
data/nodejs-14.13.0~dfsg/src/stream_base.cc:281:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data.data(), buf.base, buf.len);
data/nodejs-14.13.0~dfsg/src/string_bytes.cc:89:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_data, data, length * sizeof(*new_data));
data/nodejs-14.13.0~dfsg/src/string_bytes.cc:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf + nchars * sizeof(*dst), &last, sizeof(last));
data/nodejs-14.13.0~dfsg/src/string_bytes.cc:332:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, ext->data(), nbytes);
data/nodejs-14.13.0~dfsg/src/string_bytes.cc:730:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst, buf, buflen);
data/nodejs-14.13.0~dfsg/src/string_bytes.cc:764:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, buf, nbytes);
data/nodejs-14.13.0~dfsg/src/string_decoder.cc:85:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(IncompleteCharacterBuffer() + BufferedBytes(), data, i);
data/nodejs-14.13.0~dfsg/src/string_decoder.cc:96:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(IncompleteCharacterBuffer() + BufferedBytes(),
data/nodejs-14.13.0~dfsg/src/string_decoder.cc:204:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(IncompleteCharacterBuffer(), data + nread, BufferedBytes());
data/nodejs-14.13.0~dfsg/src/tcp_wrap.cc:340:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ip[INET6_ADDRSTRLEN + UV_IF_NAMESIZE];
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:211:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf.base, data, copy);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char out[kClearOutChunkSize];
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:530:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf.base, current, avail);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:779:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data.data() + offset, bufs[i].base, bufs[i].len);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:793:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data.data(), buf->base, buf->len);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:1175:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(psk, psk_buf, psk_buflen);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:1231:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(identity, *identity_buf, identity_len);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:1232:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(psk, psk_buf, psk_buflen);
data/nodejs-14.13.0~dfsg/src/tracing/trace_event.h:616:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char arg_types[2];
data/nodejs-14.13.0~dfsg/src/tracing/trace_event.h:658:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char arg_types[2];
data/nodejs-14.13.0~dfsg/src/tracing/traced_value.cc:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char number_buffer[10];
data/nodejs-14.13.0~dfsg/src/util-inl.h:226:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data[i], &temp, sizeof(temp));
data/nodejs-14.13.0~dfsg/src/util-inl.h:249:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data[i], &temp, sizeof(temp));
data/nodejs-14.13.0~dfsg/src/util-inl.h:272:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data[i], &temp, sizeof(temp));
data/nodejs-14.13.0~dfsg/src/util.h:388:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf_, buf_st_, length_ * sizeof(buf_[0]));
data/nodejs-14.13.0~dfsg/test/addons/buffer-free-callback/binding.cc:8:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buf[1024];
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:2363:7:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
      MultiByteToWideChar(CP_ACP, 0, ansi, length, nullptr, 0);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:2365:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  MultiByteToWideChar(CP_ACP, 0, ansi, length,
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:3165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_text[kBufSize] = { '\0' };
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:3249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[5];  // Big enough for the largest valid code point.
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:5885:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[1024];
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:5891:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[1024];
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:7932:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:8355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char executable_path[_MAX_PATH + 1];  // NOLINT
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:8891:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int cwd_fd = open(".", O_RDONLY);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:9320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[GTEST_PATH_MAX_ + 1] = { '\0' };
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:9323:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cwd[GTEST_PATH_MAX_ + 1] = { '\0' };
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:9908:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int fd = open("/proc/self/as", O_RDONLY);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10689:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, regex, len);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10763:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_dir_path[MAX_PATH + 1] = { '\0' };  // NOLINT
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10764:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_file_path[MAX_PATH + 1] = { '\0' };  // NOLINT
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10801:29:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    const int captured_fd = mkstemp(name_template);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:11142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char text[5] = "";
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2333:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return fopen(path, mode);
data/nodejs-14.13.0~dfsg/test/cctest/test_inspector_socket.cc:770:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char MASK[4] = {'W', 'h', 'O', 'a'};
data/nodejs-14.13.0~dfsg/test/cctest/test_json_utils.cc:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char symbols[1] = { static_cast<char>(i) };
data/nodejs-14.13.0~dfsg/test/cctest/test_url.cc:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[2] = { 'q', ':' };
data/nodejs-14.13.0~dfsg/test/cctest/test_url.cc:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[6] = { 'h', 't', 't', 'p', ':', '/' };
data/nodejs-14.13.0~dfsg/test/js-native-api/common.c:13:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char napi_message_string[100] = "";
data/nodejs-14.13.0~dfsg/test/js-native-api/test_conversions/test_conversions.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[100];
data/nodejs-14.13.0~dfsg/test/js-native-api/test_object/test_object.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[256] = "";
data/nodejs-14.13.0~dfsg/test/js-native-api/test_object/test_object.c:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[256] = "";
data/nodejs-14.13.0~dfsg/test/js-native-api/test_object/test_object.c:207:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[256] = "";
data/nodejs-14.13.0~dfsg/test/js-native-api/test_properties/test_properties.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/nodejs-14.13.0~dfsg/test/js-native-api/test_string/test_string.c:19:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/nodejs-14.13.0~dfsg/test/js-native-api/test_string/test_string.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/nodejs-14.13.0~dfsg/test/js-native-api/test_string/test_string.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4];
data/nodejs-14.13.0~dfsg/test/js-native-api/test_string/test_string.c:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4];
data/nodejs-14.13.0~dfsg/test/js-native-api/test_string/test_string.c:255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[10] = { 0 };
data/nodejs-14.13.0~dfsg/test/js-native-api/test_string/test_string.c:258:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zero[10] = { 0 };
data/nodejs-14.13.0~dfsg/test/node-api/test_buffer/test_buffer.c:35:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(theCopy, theText, kBufferSize);
data/nodejs-14.13.0~dfsg/test/node-api/test_exception/test_exception.c:9:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buffer_data[12];
data/nodejs-14.13.0~dfsg/test/wasi/c/cant_dotdot.c:6:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("/sandbox/../outside.txt", "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/create_symlink.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char readlink_result[128];
data/nodejs-14.13.0~dfsg/test/wasi/c/create_symlink.c:17:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(linkpath, "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/follow_symlink.c:5:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("/sandbox/subdir/input_link.txt", "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/freopen.c:5:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file_orig = fopen("/sandbox/input.txt", "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/ftruncate.c:17:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(PATH, O_CREAT | O_WRONLY, 0666);
data/nodejs-14.13.0~dfsg/test/wasi/c/getentropy.c:5:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256] = {0};
data/nodejs-14.13.0~dfsg/test/wasi/c/read_file.c:5:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("/sandbox/input.txt", "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/read_file_twice.c:6:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE* file = fopen("/sandbox/input.txt", "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/stat.c:24:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(PATH, O_CREAT | O_WRONLY, 0666);
data/nodejs-14.13.0~dfsg/test/wasi/c/stdin.c:4:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[32];
data/nodejs-14.13.0~dfsg/test/wasi/c/symlink_escape.c:6:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("/sandbox/subdir/outside.txt", "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/symlink_loop.c:6:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("/sandbox/subdir/loop1", "r");
data/nodejs-14.13.0~dfsg/test/wasi/c/write_file.c:8:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen("/tmp/output.txt", "w");
data/nodejs-14.13.0~dfsg/tools/code_cache/cache_builder.cc:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64] = {0};
data/nodejs-14.13.0~dfsg/tools/code_cache/cache_builder.cc:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64] = {0};
data/nodejs-14.13.0~dfsg/tools/code_cache/mkcodecache.cc:38:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out.open(argv[1], std::ios::out | std::ios::binary);
data/nodejs-14.13.0~dfsg/tools/icu/iculslocs.cc:250:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bf = fopen(toBundle, "wb");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:720:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gTimeZoneBuffer[PATH_MAX];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bufferFile[MAX_READ_SIZE];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:898:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        tzInfo->defaultTZFilePtr = fopen(defaultTZFileName, "r");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:900:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    file = fopen(TZFileName, "r");
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1323:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t windowsPath[MAX_PATH];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char windowsPathUtf8[MAX_PATH];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1365:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datadir_path_buffer[PATH_MAX];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1415:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datadir_path_buffer[MAX_PATH];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1466:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char datadir_path_buffer[MAX_PATH];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1729:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char modifiedWindowsLocale[LOCALE_NAME_MAX_LENGTH] = {};
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:1784:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char correctedLocale[64];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2011:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeBuf[100];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2035:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codepage[64];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2051:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(codepage,"ibm-%d", ccsid);
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2055:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codepage[64];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2064:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codepage[64];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2088:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(codepage, "windows-%ld", codepageNumber);
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2095:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char codesetName[100];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2198:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char versionChars[U_MAX_VERSION_STRING_LENGTH+1];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/i18n/dtptngen.cpp:791:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char localeWithCalendarKey[ULOC_LOCALE_IDENTIFIER_CAPACITY];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/i18n/dtptngen.cpp:805:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char calendarType[ULOC_KEYWORDS_CAPACITY];
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/i18n/dtptngen.cpp:1425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cldrFieldKey[UDATPG_FIELD_KEY_MAX + 1];
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding_test.cc:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result.get(), str.c_str(), str.size() + 1);
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding_test.cc:1431:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(response.get(), str.c_str(), str.size() + 1);
data/nodejs-14.13.0~dfsg/tools/msvs/msi/custom_actions.cc:35:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR upgrade_code[GUID_BUFFER_SIZE];
data/nodejs-14.13.0~dfsg/tools/msvs/msi/custom_actions.cc:42:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR product_code[GUID_BUFFER_SIZE];
data/nodejs-14.13.0~dfsg/tools/msvs/msi/custom_actions.cc:48:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR assignment_type[2];
data/nodejs-14.13.0~dfsg/tools/snapshot/node_mksnapshot.cc:30:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out.open(argv[1], std::ios::out | std::ios::binary);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares__read_line.c:51:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = offset + strlen(*buf + offset);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_android.c:333:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(dns_list[i], ch_server_address, 64);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_create_query.c:109:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(name) + 2 + HFIXEDSZ + QFIXEDSZ +
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_expand_string.c:61:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy((char *)q, (char *)encoded, elen.uns);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_gethostbyaddr.c:287:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       sprintf(name+strlen(name),
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:339:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_len = strlen(name);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:406:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bufl = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:408:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if(bufl + strlen(tmpbuf) < buflen)
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:419:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t s1_len = strlen(s1), s2_len = strlen(s2);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_getnameinfo.c:419:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t s1_len = strlen(s1), s2_len = strlen(s2);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:127:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if((endptr != env) && (endptr == env + strlen(env)) && (num > 0))
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:300:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy((*dest)->local_dev_name, src->local_dev_name,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:859:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  newsize = len + (*dst ? (strlen(*dst) + 2) : 1);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:866:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(*dst) != 0)
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:867:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(*dst, ",");
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:868:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(*dst, src, len);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:878:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  commanjoin(dst, src, strlen(src));
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2342:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(opt);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2386:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((len = strlen(opt)) == 0)
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_init.c:2550:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(channel->local_dev_name, local_dev_name,
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_options.c:267:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(_csv);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_ns_reply.c:126:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nameservers[nameservers_num] = ares_malloc(strlen(rr_data)+1);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_ptr_reply.c:128:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          rr_data_len = strlen(rr_data)+1;
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_parse_ptr_reply.c:136:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(aliases[aliascnt], rr_data, rr_data_len);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_platform.c:11003:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      switch (strlen(proto)) {
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:216:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nlen = strlen(name);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:217:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t dlen = strlen(domain);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_search.c:235:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strdup.c:35:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sz = strlen(s1);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strsplit.c:26:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strsplit.c:90:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  in_len = strlen(in);
data/nodejs-14.13.0~dfsg/deps/cares/src/ares_strsplit.c:91:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  num_delims = strlen(delms);
data/nodejs-14.13.0~dfsg/deps/cares/src/inet_ntop.c:177:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tp += strlen(tp);
data/nodejs-14.13.0~dfsg/deps/cares/src/setup_once.h:134:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define sread(x,y,z) (ares_ssize_t)read((RECV_TYPE_ARG1)(x), \
data/nodejs-14.13.0~dfsg/deps/nghttp2/lib/nghttp2_session.c:231:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    debug_datalen = strlen(reason);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:335:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            res = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1428:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = strlen(serialfile);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1430:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = strlen(serialfile) + strlen(suffix) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1430:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = strlen(serialfile) + strlen(suffix) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1474:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(serialfile) + strlen(old_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1474:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(serialfile) + strlen(old_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1475:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(serialfile) + strlen(new_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1475:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(serialfile) + strlen(new_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1632:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(dbfile) + strlen(suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1632:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(dbfile) + strlen(suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1678:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(dbfile) + strlen(old_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1678:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(dbfile) + strlen(old_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1679:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(dbfile) + strlen(new_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1679:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = strlen(dbfile) + strlen(new_suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1848:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        valstr, strlen((char *)valstr),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:1967:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(in);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2136:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t i, flen = strlen(from) + 1, tlen = strlen(to) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2136:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t i, flen = strlen(from) + 1, tlen = strlen(to) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2361:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t i, len_0 = strlen(name) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/apps.c:2456:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(fileno_stdin(), buf, siz);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/bf_prefix.c:107:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!BIO_write_ex(BIO_next(b), ctx->prefix, strlen(ctx->prefix),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/bf_prefix.c:176:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return BIO_write(b, str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:525:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        OPENSSL_cleanse(key, strlen(key));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:649:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2161:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t serial_len = strlen(serial);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2376:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i += strlen(reason) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/ca.c:2378:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i += strlen(other) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/dgst.c:472:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t i, e = 0, length = strlen(file), newline_count = 0, mem_len = 0;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:211:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = (int)strlen(p) - 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:424:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t str_len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:525:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            OPENSSL_cleanse(hkey, strlen(hkey));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/enc.c:654:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(in);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:49:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(s) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:56:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const int blen = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:197:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((xpos > (int)strlen(indent)) &&
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/engine.c:198:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    (xpos + (int)strlen(name) > line_wrap)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:69:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((len = strlen(f->name)) > maxlen)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:108:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(t) + 1 + strlen(OPENSSL_CONF) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:108:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(t) + 1 + strlen(OPENSSL_CONF) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:112:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(p, "/");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:209:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:226:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                i = strlen(text);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:230:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    p += strlen(strcpy(p, text));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/openssl.c:237:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                p += strlen(strcpy(p, text));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:48:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (p = argv0 + strlen(argv0); --p > argv0;)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:55:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:76:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (p = argv0 + strlen(argv0); --p > argv0;)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:83:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(prog, p, sizeof(prog) - 1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:97:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (p = argv0 + strlen(argv0); --p > argv0;)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:102:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(prog, p, sizeof(prog) - 1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:341:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp(v, b[i].prefix, strlen(b[i].prefix)) == 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:846:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = 2 + (int)strlen(o->name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:848:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i += 1 + strlen(valtype2param(o));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:882:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p += strlen(strcpy(p, o->name));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/opt.c:887:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p += strlen(strcpy(p, valtype2param(o)));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:325:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    passwd_len = strlen(passwd);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:328:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    magic_len = strlen(magic);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:337:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    salt_len = strlen(ascii_salt);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:362:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(out_buf) > 6 + 8) /* assert "$apr1$..salt.." */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:457:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert(output == out_buf + strlen(out_buf));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:473:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert(strlen(out_buf) < sizeof(out_buf));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:475:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ascii2ebcdic(out_buf, out_buf, strlen(out_buf));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:524:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    passwd_len = strlen(passwd);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:525:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    magic_len = strlen(magic);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:570:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    salt_len = strlen(ascii_salt);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:593:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            ebcdic2ascii(tmp_buf, tmp_buf, strlen(tmp_buf));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:601:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(out_buf) > 3 + 17 * rounds_custom + salt_len )
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:703:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cp = out_buf + strlen(out_buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:760:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ascii2ebcdic(out_buf, out_buf, strlen(out_buf));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:818:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(passwd) > pw_maxlen)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/passwd.c:828:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(passwd) <= pw_maxlen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkcs8.c:258:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p8 = PKCS8_set0_pbe(p8pass, strlen(p8pass), p8inf, pbe);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/pkcs8.c:318:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:212:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncasecmp(suffix, &filename[i], strlen(suffix)) == 0)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:215:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += strlen(suffixes[type]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:314:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        path += strlen(path) - 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/rehash.c:346:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buflen = strlen(dirname);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1387:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1427:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    elen = strlen(end);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1428:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1442:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t name_len = strlen(name), tail_len = strlen(tail);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1442:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t name_len = strlen(name), tail_len = strlen(tail);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/req.c:1481:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(gstr);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:233:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *idlen = strlen(psk_identity);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:436:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unsigned char *ret = app_malloc(strlen(in) / 2, "hexdecode");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:1433:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:2353:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (mbuf_len < (int)strlen("HTTP/1.0 200")) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:2624:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(sbuf, mbuf, 2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:3352:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(keymatexportlabel),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_client.c:3488:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t length = strlen(host);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:142:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   (int)strlen(identity), identity);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:191:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(psk_identity) != identity_len
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:445:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return ebcdic_write(bp, str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1815:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(session_id_prefix) >= 32)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:1910:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(session_id_prefix) >= 32)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:2270:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       strlen((char *)context))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:2557:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    BIO_write(SSL_get_wbio(con), str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:2915:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(keymatexportlabel),
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:2989:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       strlen((char *)context))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:3268:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                i = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:3365:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       strlen((char *)context))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:3509:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               (strlen(session_id_prefix) < *id_len) ?
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_server.c:3510:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(session_id_prefix) : *id_len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/s_time.c:174:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            buf_size = strlen(www_path) + fmt_http_get_cmd_size;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/sess_id.c:105:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t ctx_len = strlen(context);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/speed.c:2200:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(hmac_key);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/spkac.c:135:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            challenge, (int)strlen(challenge));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:357:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    AscTimeDesc.dsc$w_length = strlen (AscTimeBuff);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/vms_term_sock.c:514:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat (TerminalDeviceBuff, "\n");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/win32_init.c:162:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wlen = wcslen(wcmdline);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/x509.c:920:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = p != NULL ? (size_t)(p - CAfile) : strlen(CAfile);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/apps/x509.c:1114:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(names);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_unix.c:105:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            char c = directory[strlen(directory) - 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_unix.c:123:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy((*ctx)->previous_entry_name, (*ctx)->entry_name,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_unix.c:138:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *p = (*ctx)->entry_name + strlen((*ctx)->entry_name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:96:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t filespeclen = strlen(directory);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_vms.c:184:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy((*ctx)->result, r, l);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:83:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t dirlen = strlen(directory);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:161:21:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
                    strcpy(buf + dirlen, "*");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/LPdir_win.c:196:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy((*ctx)->entry_name, (const char *)(*ctx)->ctx.cFileName,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_gentm.c:39:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    t.length = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_mbstr.c:55:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)in);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_object.c:65:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        num = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strex.c:347:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        outlen += strlen(tagname);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_strex.c:528:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            objlen = strlen(objbuf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_time.c:384:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    t.length = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/a_utctm.c:36:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    t.length = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/ameth_lib.c:110:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/ameth_lib.c:132:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((int)strlen(ameth->pem_str) == len
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_gen.c:567:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(tagstr);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn1_lib.c:280:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(data);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:578:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    blen = strlen(bound);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:783:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (p = name + strlen(name) - 1; p >= name; p--) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:935:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        linelen = strlen(line);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/asn_mime.c:937:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        blen = strlen(bound);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/asn1/bio_asn1.c:300:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return asn1_bio_write(b, str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:98:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(ap->s_un.sun_path, where, sizeof(ap->s_un.sun_path) - 1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:148:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(ap->s_un.sun_path);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:485:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pl = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:508:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pl = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:511:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            hl = strlen(h);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:514:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pl = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_addr.c:665:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (addrinfo_wrap(family, socktype, host, strlen(host), 0, res))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_print.c:461:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        min - OSSL_MAX(max, place) - (signvalue ? 1 : 0) - strlen(prefix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_sock.c:255:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *ip_port = OPENSSL_zalloc(strlen(host) + strlen(port) + 2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_sock.c:255:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *ip_port = OPENSSL_zalloc(strlen(host) + strlen(port) + 2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/b_sock.c:265:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(*ip_port, ":");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_buff.c:474:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return buffer_write(b, str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bf_lbuf.c:325:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return linebuffer_write(b, str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_cb.c:92:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        BIO_write(b, buf, strlen(buf));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bio_local.h:183:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define UP_read         read
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_acpt.c:548:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_bio.c:605:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return bio_write(bio, str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_conn.c:534:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:804:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_dgram.c:1828:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_fd.c:205:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_fd.c:224:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_file.c:350:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ret = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_file.c:359:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_log.c:235:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_mem.c:97:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sz = (len < 0) ? strlen(buf) : (size_t)len;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_mem.c:368:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_null.c:86:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/bio/bss_sock.c:170:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cms/cms_pwri.c:33:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        passlen = strlen((char *)pass);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_api.c:199:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(section) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.c:235:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ii = i = strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.c:519:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(from) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.c:625:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            newsize = strlen(p) + buf->length - (e - from);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.c:708:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pathlen = strlen(path);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_def.c:712:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        namelen = strlen(filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_mod.c:277:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nchar = strlen(name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_mod.c:489:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(X509_get_default_cert_area());
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_mod.c:494:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(OPENSSL_CONF);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/conf/conf_mod.c:538:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                tmpend = lstart + strlen(lstart) - 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/cryptlib.c:294:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t len_0 = strlen(fmta) + 1, i;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ct/ct_b64.c:26:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t inlen = strlen(in);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/fcrypt.c:85:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ascii2ebcdic(ret, ret, strlen(ret));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/str2key.c:19:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/des/str2key.c:47:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:185:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        spec2len = (filespec2 ? strlen(filespec2) : 0);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:186:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = spec2len + (filespec1 ? strlen(filespec1) : 0);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:216:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:221:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rsize += strlen(DSO_EXTENSION); /* The length of ".s?" */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dl.c:258:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = (int)strlen(inf.filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:113:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (filename[strlen(filename) - 1] == ')')
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:234:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        spec2len = strlen(filespec2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:235:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = spec2len + strlen(filespec1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:258:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:263:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rsize += strlen(DSO_EXTENSION);    /* The length of ".so" */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:375:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            buffer_sz = strlen(this_ldi->ldinfo_filename) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:377:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((member_len = strlen(member)) > 0)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_dlfcn.c:423:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (int)strlen(dli.dli_fname);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:167:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sp2 = sp1 + strlen(sp1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:171:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        || (sp1 - filename) + strlen(sp2) > FILENAME_MAX) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:182:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(p->filename, sp1, sp2 - sp1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:185:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(p->imagename, filename, sp1 - filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:194:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p->filename_dsc.dsc$w_length = strlen(p->filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:198:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p->imagename_dsc.dsc$w_length = strlen(p->imagename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:299:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    symname_dsc.dsc$w_length = strlen(SYMNAME);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:393:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filespec1len = strlen(filespec1);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:394:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    filespec2len = strlen(filespec2);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:450:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(merged, nam.NAMX_ESA, nam.NAMX_ESL);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_vms.c:459:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:37:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len_0 = strlen(lpLibFileName) + 1, i;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:345:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], file_split->node, file_split->nodelen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:352:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], file_split->device, file_split->devicelen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:365:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], start, end - start);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:378:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&result[offset], start, end - start);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:384:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(&result[offset], file_split->file, file_split->filelen);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:458:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(filename);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:578:35:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int i, len = (int)wcslen(me32.szExePath);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/dso/dso_win32.c:591:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int len = (int)strlen(me32.szExePath);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:2056:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
static uint8_t equal(signed char b, signed char c)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4205:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][0], equal(babs, 1));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4206:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][1], equal(babs, 2));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4207:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][2], equal(babs, 3));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4208:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][3], equal(babs, 4));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4209:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][4], equal(babs, 5));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4210:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][5], equal(babs, 6));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4211:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][6], equal(babs, 7));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve25519.c:4212:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cmov(t, &k25519Precomp[pos][7], equal(babs, 8));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/curve448/eddsa.c:69:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            || !EVP_DigestUpdate(hashctx, dom_s, strlen(dom_s))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:861:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        u64 equal;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:875:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 32;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:875:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 32;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:876:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 16;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:876:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 16;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:877:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 8;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:877:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 8;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:878:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 4;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:878:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 4;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:879:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 2;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:879:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 2;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:880:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:880:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal &= equal << 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:881:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal = 0 - (equal >> 63);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ec/ecp_nistp256.c:883:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        all_equal_so_far &= equal;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_ctrl.c:108:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(cdp->cmd_name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_ctrl.c:110:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(strcpy(s, cdp->cmd_name));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_ctrl.c:112:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(cdp->cmd_desc == NULL ? int_no_description
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_ctrl.c:115:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(strcpy(s, cdp->cmd_desc == NULL ? int_no_description
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_dyn.c:307:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (p && (strlen((const char *)p) < 1))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_dyn.c:320:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (p && (strlen((const char *)p) < 1))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/eng_dyn.c:346:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!p || (strlen((const char *)p) < 1)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_asnmth.c:146:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_asnmth.c:151:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            && ((int)strlen(ameth->pem_str) == len)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/engine/tb_asnmth.c:176:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                && ((int)strlen(ameth->pem_str) == lk->len)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c:228:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                size_t l = strlen(cur);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c:418:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        end = &file[strlen(file) - 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c:616:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(buf) == len - 1) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err.c:863:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n += strlen(a);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/err/err_prn.c:40:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (cb(buf2, strlen(buf2), u) <= 0)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_b64.c:552:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64_write(b, str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:475:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN)))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/bio_ok.c:513:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!EVP_DigestUpdate(md, WELLKNOWN, strlen(WELLKNOWN)))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_key.c:25:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(prompt_string, prompt, 79);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/evp_pbe.c:107:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        passlen = strlen(pass);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt.c:74:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        passlen = strlen(pass);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/p5_crpt2.c:54:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        passlen = strlen(pass);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/evp/pmeth_lib.c:426:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem.c:158:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buff);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_dbg.c:533:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            info_len = strlen(amip->info);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/mem_dbg.c:594:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cb(buf, strlen(buf), u);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:42:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int sz, len_0 = (int)strlen(filename) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:68:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            MultiByteToWideChar(CP_UTF8, 0, mode, strlen(mode) + 1,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_fopen.c:90:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((newname = OPENSSL_malloc(strlen(filename) + 1)) == NULL) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_str.c:33:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ret = CRYPTO_malloc(strlen(str) + 1, file, line);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_str.c:90:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return l + strlen(src);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/o_str.c:155:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.c:419:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            n = strlen(s);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.c:485:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(bndec);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/objects/obj_dat.c:506:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(tbuf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ocsp/ocsp_ht.c:256:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (r = q + strlen(q) - 1; ossl_isspace(*r); r--)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_info.c:126:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(header) > 10) /* assume encrypted */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_info.c:149:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(header) > 10) /* assume encrypted */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_info.c:172:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(header) > 10) /* assume encrypted */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_info.c:264:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                || (strlen(objstr) + 23 + 2 * EVP_CIPHER_iv_length(enc) + 13)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:38:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = strlen(userdata);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:63:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:69:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *p = buf + strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:86:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *p = buf + strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:101:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(p, "\n");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:328:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                || (strlen(objstr) + 23 + 2 * EVP_CIPHER_iv_length(enc) + 13)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:617:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nlen = strlen(name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:624:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(header);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:839:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            namelen = strlen(name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:976:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int pem_len = strlen(pem_str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pem/pem_lib.c:977:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int suffix_len = strlen(suffix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_utl.c:23:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        asclen = strlen(asc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/pkcs12/p12_utl.c:82:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        asclen = strlen(asc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_egd.c:73:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(path) >= sizeof(addr.sun_path))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_egd.c:76:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = offsetof(struct sockaddr_un, sun_path) + strlen(path);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c:466:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    while ((r = read(fd, &c, 1)) < 0 && errno == EINTR);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/rand_unix.c:676:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                bytes = read(fd, buffer, bytes_needed);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:298:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:304:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (len + 1 + strlen(RFILE) + 1 >= size)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/rand/randfile.c:308:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(buf, "/");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_lib.c:137:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        || !EVP_DigestUpdate(ctxt, user, strlen(user))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_lib.c:139:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        || !EVP_DigestUpdate(ctxt, pass, strlen(pass))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:50:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(src);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:561:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        || !EVP_DigestUpdate(ctxt, vb->seed_key, strlen(vb->seed_key))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/srp/srp_vfy.c:562:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        || !EVP_DigestUpdate(ctxt, username, strlen(username))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:116:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return pass == NULL ? 0 : strlen(pass);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:235:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (!PKCS12_verify_mac(p12, pass, strlen(pass))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:366:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!PKCS12_pbe_crypt(dalg, pass, strlen(pass), doct->data, doct->length,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:1118:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(*pem_header) > 10) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:1149:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        uri += strlen(uri) - 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:1167:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        long calculated_length = strlen(ctx->_.dir.uri) + strlen(pathsep)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:1167:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        long calculated_length = strlen(ctx->_.dir.uri) + strlen(pathsep)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/loader_file.c:1168:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            + strlen(name) + 1 /* \0 */;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/store/store_lib.c:556:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    search->stringlength = strlen(alias);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_lib.c:30:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        result = result && BIO_write(bio, hex, strlen(hex)) > 0;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_sign.c:312:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            || !ASN1_STRING_set(utf8_text, text, strlen(text)))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_sign.c:1015:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        p += strlen(p);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:501:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                    strcat(failure_text, ",");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ts/ts_rsp_verify.c:546:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(p, (const char *)ASN1_STRING_get0_data(current), length);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/txt_db/txt_db.c:69:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        i = strlen(&(buf->data[offset]));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/txt_db/txt_db.c:207:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                l += strlen(pp[j]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_lib.c:372:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = sizeof(prompt1) - 1 + strlen(object_desc);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_lib.c:374:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len += sizeof(prompt2) - 1 + strlen(object_name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_lib.c:884:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return UI_set_result_ex(ui, uis, result, strlen(result));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/ui/ui_openssl.c:708:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(buf);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/by_dir.c:177:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strlen(ent->dir) == len && strncmp(ent->dir, ss, len) == 0)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/by_dir.c:257:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j = strlen(ent->dir) + 1 + 8 + 6 + 1 + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/by_dir.c:281:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            c = ent->dir[strlen(ent->dir) - 1];
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_cmp.c:44:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!EVP_DigestUpdate(ctx, (unsigned char *)f, strlen(f)))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_obj.c:55:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(buf, "NO X509_NAME", len);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_obj.c:69:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l1 = strlen(s);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_vfy.c:2625:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    recnum = (dane->umask & mask) ? sk_danetls_record_num(dane->trecs) : 0;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_vpm.c:46:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        namelen = name ? strlen(name) : 0;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509_vpm.c:245:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            srclen = strlen(src);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509name.c:330:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)bytes);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509/x509spki.c:37:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_alt.c:134:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                    strcat(oline, ":");
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_alt.c:500:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen(value))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_conf.c:192:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(p) < 9) || strncmp(p, "critical,", 9))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_conf.c:206:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(p) >= 4) && strncmp(p, "DER:", 4) == 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_conf.c:209:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if ((strlen(p) >= 5) && strncmp(p, "ASN1:", 5) == 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_cpols.c:203:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(cnf->value)))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_cpols.c:311:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(value);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_cpols.c:327:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen(cnf->value)))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_ia5.c:54:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!ASN1_STRING_set((ASN1_STRING *)ia5, str, strlen(str))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_info.c:81:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_info.c:81:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_ncons.c:340:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((size_t)utf8_length != strlen((char *)utf8_value)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_ncons.c:621:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        hostlen = strlen(hostptr);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_pci.c:201:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            val_len = strlen(val->value + 5);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_prn.c:53:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(nval->value) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_prn.c:106:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(value) + 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_sxnet.c:148:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        userlen = strlen(user);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_sxnet.c:169:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        userlen = strlen(user);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:121:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(tmp) + 3;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:385:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    q = p + strlen(p) - 1;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:404:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cmp);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:782:73:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
static int do_check_string(const ASN1_STRING *a, int cmp_type, equal_fn equal,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:828:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    equal_fn equal;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:852:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chklen = strlen(chk);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:870:55:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            if ((rv = do_check_string(cstr, alt_type, equal, flags,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:892:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if ((rv = do_check_string(str, -1, equal, flags,
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:910:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chklen = strlen(chk);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/crypto/x509v3/v3_utl.c:929:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        chklen = strlen((char *)chk);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/e_os.h:168:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#    define strlen(s) _strlen31(s)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_afalg.c:267:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(aio->efd, &eval, sizeof(eval));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_capi.c:1113:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len_0 = (int)wcslen(wstr) + 1; /* WideCharToMultiByte expects int */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/engines/e_dasync.c:472:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(pipefds[0], &buf, 1) < 0)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/driver.c:41:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        size_t size = read(0, buf, BUF_SIZE);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/fuzz/test-corpus.c:67:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t dirname_len = strlen(argv[n]);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/bio.h:33:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int bread_conv(BIO *bio, char *data, size_t datal, size_t *read);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:72:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    uint32_t        umask;      /* Usages present */
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:93:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_PKIX(dane) ((dane) && ((dane)->umask & DANETLS_PKIX_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:94:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_DANE(dane) ((dane) && ((dane)->umask & DANETLS_DANE_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:95:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_TA(dane)   ((dane) && ((dane)->umask & DANETLS_TA_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:96:52:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_EE(dane)   ((dane) && ((dane)->umask & DANETLS_EE_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:98:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_PKIX_TA(dane) ((dane)&&((dane)->umask & DANETLS_PKIX_TA_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:99:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_PKIX_EE(dane) ((dane)&&((dane)->umask & DANETLS_PKIX_EE_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:100:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_DANE_TA(dane) ((dane)&&((dane)->umask & DANETLS_DANE_TA_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/dane.h:101:53:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define DANETLS_HAS_DANE_EE(dane) ((dane)&&((dane)->umask & DANETLS_DANE_EE_MASK))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/sockets.h:146:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define readsocket(s,b,n)           read((s),(b),(n))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/internal/sockets.h:151:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define readsocket(s,b,n)       read((s),(b),(n))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/include/openssl/bio.h:776:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      int (*read) (BIO *, char *, int));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/bio_ssl.c:416:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(str);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_srtp.c:49:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((len == strlen(p->name))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/d1_srtp.c:80:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               : strlen(ptr))) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record.h:62:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    unsigned int read;
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/record/record_local.h:98:55:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define SSL3_RECORD_is_read(r)                  ((r)->read)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_enc.c:495:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                strlen((const char *)salt[i])) <= 0
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:3487:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen((char *)parg);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:3888:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/s3_lib.c:3888:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_asn1.c:99:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ssl_session_oinit(dest, os, (unsigned char *)data, strlen(data));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert.c:724:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(dir) + strlen(filename) + 2 > sizeof(buf)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_cert.c:724:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(dir) + strlen(filename) + 2 > sizeof(buf)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_ciph.c:1581:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (ok && (strlen(rule_p) > 0))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_conf.c:722:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(*pcmd) <= cctx->prefixlen)
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_conf.c:951:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cctx->prefixlen = strlen(tmp);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:454:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    dane->umask |= DANETLS_USAGE_BIT(usage);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:2610:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        n = strlen(c->name);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:4278:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (identity_hint != NULL && strlen(identity_hint) > PSK_MAX_IDENTITY_LEN) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:4297:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (identity_hint != NULL && strlen(identity_hint) > PSK_MAX_IDENTITY_LEN) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_lib.c:5232:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prefix_len = strlen(prefix);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:954:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(name) < strlen(namePrefix1)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:954:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(name) < strlen(namePrefix1)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:958:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp(name, namePrefix1, strlen(namePrefix1)) == 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:961:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(name) < strlen(namePrefix2)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:961:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(name) < strlen(namePrefix2)) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/ssl_rsa.c:966:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strncmp(name, namePrefix2, strlen(namePrefix2)) != 0) {
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:51:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       strlen(s->ext.hostname))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:103:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                               strlen(s->srp_ctx.login))
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_clnt.c:776:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            idlen = strlen(identity);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/extensions_srvr.c:174:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen(s->session->ext.hostname));
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_clnt.c:2915:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    identitylen = strlen(identity);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/statem/statem_srvr.c:2678:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        ? 0 : strlen(s->cert->psk_identity_hint);
data/nodejs-14.13.0~dfsg/deps/openssl/openssl/ssl/tls_srp.c:327:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        OPENSSL_clear_free(passwd, strlen(passwd));
data/nodejs-14.13.0~dfsg/deps/uv/src/fs-poll.c:79:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/fs-poll.c:150:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  required_len = strlen(ctx->path);
data/nodejs-14.13.0~dfsg/deps/uv/src/inet.c:135:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tp += strlen(tp);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix-common.c:72:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cached_len = strlen(original_exepath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:500:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(tmp);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:537:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(cmd, filename, (p - filename));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:567:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen(mon_file) + strlen(filename) + 5) > PATH_MAX)
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:567:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((strlen(mon_file) + strlen(filename) + 5) > PATH_MAX)
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:602:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rc = write(*fd, mon_file_write_string, strlen(mon_file_write_string)+1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:653:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(buf, "BUF_WRAP", strlen("BUF_WRAP")) == 0) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:901:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size += strlen(argv[i]) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:914:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(argv[i]) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:972:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(process_argv[0]);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/aix.c:1007:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, &psinfo, sizeof(psinfo)) == sizeof(psinfo)) {
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:407:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(l_name, l_rtaData, l_rtaDataSize);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/android-ifaddrs.c:560:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(l_name, l_rtaData, l_rtaDataSize);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/async.c:132:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(w->fd, buf, sizeof(buf));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/bsd-proctitle.c:83:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(process_title) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:731:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *size = strlen(buffer);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1079:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(pwd.homedir);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1126:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1197:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  name_size = strlen(pw.pw_name) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1198:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  homedir_size = strlen(pw.pw_dir) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1199:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  shell_size = strlen(pw.pw_shell) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1323:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(var);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1376:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1564:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    abspath_size = strlen(abspath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/core.c:1594:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        abspath_size = strlen(abspath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin-proctitle.c:41:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(namebuf, name, sizeof(namebuf) - 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/darwin.c:94:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  abspath_size = strlen(abspath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:133:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      path_len = strlen(path) + 1;                                            \
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:134:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      new_path_len = strlen(new_path) + 1;                                    \
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:303:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  path_length = strlen(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:454:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      result = read(req->file, req->bufs[0].base, req->bufs[0].len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fs.c:830:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        nread = read(in_fd, buf, buflen);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:256:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/fsevents.c:825:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  handle->realpath_len = strlen(handle->realpath);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:166:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          hostname + strlen(hostname),
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:175:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  hostname_len = hostname ? strlen(hostname) + 1 : 0;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/getaddrinfo.c:176:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  service_len = service ? strlen(service) + 1 : 0;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/ibmi.c:167:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  srclen = strlen(src);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:565:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(fd, buf, sizeof(buf) - 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:750:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        model = uv__strndup(model, strlen(model) - 1);  /* Strip newline. */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:769:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        model = uv__strndup(model, strlen(model) - 1);  /* Strip newline. */
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:800:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    model = uv__strndup(inferred_model, strlen(inferred_model));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:991:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t namelen = strlen(ent->ifa_name);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:1039:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(fd, buf, len - 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-core.c:1067:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p += strlen(what);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-inotify.c:183:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      size = read(loop->inotify_fd, buf, sizeof(buf));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/linux-inotify.c:283:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/netbsd.c:94:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *size = strlen(buffer);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/openbsd.c:98:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  exepath_size = strlen(argsbuf[0]);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:437:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:451:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, &v, sizeof(v)) != sizeof(v))
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:535:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  plen = strlen(delimiter);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/os390-syscalls.c:536:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  vlen = strlen(realpathstr);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/pipe.c:265:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    addrlen = strlen(sa.sun_path);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/process.c:511:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(signal_pipe[0], &exec_errorno, sizeof(exec_errorno));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c:57:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pt.len = strlen(argv[0]);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c:63:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size += strlen(argv[i]) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c:79:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(argv[i]) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/proctitle.c:108:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(title);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/qnx.c:65:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *size = strlen(buffer);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/random-devurandom.c:55:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      n = read(fd, (char*) buf + pos, buflen - pos);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/signal.c:121:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(uv__signal_lock_pipefd[0], &data, sizeof data);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/signal.c:429:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    r = read(loop->signal_pipefd[0], buf + bytes, sizeof(buf) - bytes);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/stream.c:199:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        r = read(s->int_fd, buf, sizeof(buf));
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/stream.c:1155:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        nread = read(uv__stream_fd(stream), buf.base, buf.len);
data/nodejs-14.13.0~dfsg/deps/uv/src/unix/sunos.c:606:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, &psinfo, sizeof(psinfo)) == sizeof(psinfo)) {
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:56:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(s) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:65:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(s);
data/nodejs-14.13.0~dfsg/deps/uv/src/uv-common.c:600:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  required_len = strlen(handle->path);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:70:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t filenamelen = wcslen(filename);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:71:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t dirlen = wcslen(dir);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:79:3:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  wcsncpy(*relpath, filename + dirlen + 1, relpathlen);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:95:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = wcslen(filename);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:124:7:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      wcsncpy(*dir, filename, i + 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:132:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(*file, filename + i + 1, len - i - 1);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:413:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  str_len = wcslen(str);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs-event.c:482:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              size = wcslen(handle->dirw) +
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:175:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_len = 1 + strlen(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:418:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = wcslen(w_target);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:425:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    w_target_len = wcslen(w_target);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:482:19:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  current_umask = umask(0);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:483:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(current_umask);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:1247:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = wcslen(req->file.pathw);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:1269:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:1592:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = wcslen(pathw);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:1843:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = wcslen(pathw);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2381:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  target_len = wcslen(path);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2416:3:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  wcsncpy((WCHAR*)&path_buf[path_buf_len], JUNCTION_PREFIX,
data/nodejs-14.13.0~dfsg/deps/uv/src/win/fs.c:2791:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    XX(READ, read)
data/nodejs-14.13.0~dfsg/deps/uv/src/win/getaddrinfo.c:284:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          node + strlen(node),
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:202:3:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  wcsncpy(result_pos, cwd, cwd_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:212:3:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  wcsncpy(result_pos, dir, dir_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:222:3:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  wcsncpy(result_pos, name, name_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:233:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(result_pos, ext, ext_len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:351:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t file_len = wcslen(file);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:352:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t cwd_len = wcslen(cwd);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:454:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = wcslen(source);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:468:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(target, source, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:479:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(target, source, len);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:808:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = wcslen(*ptr_copy) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/process.c:832:43:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (; env != NULL && *env != 0; env += wcslen(env) + 1) {
data/nodejs-14.13.0~dfsg/deps/uv/src/win/req-inl.h:159:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        DELEGATE_STREAM_REQ(loop, req, read, data);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:476:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(process_title) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1181:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(pwd.homedir);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1460:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (penv = env, i = 0; *penv != L'\0'; penv += wcslen(penv) + 1, i++);
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1495:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    penv += wcslen(penv) + 1;
data/nodejs-14.13.0~dfsg/deps/uv/src/win/util.c:1679:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(buf);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/fd_table.c:81:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  mp_len = strlen(mapped_path);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/fd_table.c:82:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rp_len = strlen(real_path);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:54:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cur_len = (next == NULL) ? strlen(cur) : (size_t) (next - cur);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:208:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                     strlen(fd->normalized_path))) {
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:247:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fd_path_len = strlen(fd->normalized_path);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:273:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  norm_len = strlen(normalized);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:315:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  real_path_len = strlen(fd->real_path);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:316:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fake_path_len = strlen(fd->normalized_path);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/path_resolver.c:461:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    input_len = strlen(req.ptr);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:259:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    args_size += strlen(options->argv[i]) + 1;
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:279:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size = strlen(options->argv[i]) + 1;
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:290:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      env_buf_size += strlen(options->envp[env_count]) + 1;
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:313:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size = strlen(options->envp[i]) + 1;
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:1122:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf->u.dir.pr_name_len = strlen(wrap->path) + 1;
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:1156:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size = strlen(wrap->path) + 1;
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:1350:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_len = strlen(dirents[i].name);
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:1877:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read;
data/nodejs-14.13.0~dfsg/deps/uvwasi/src/uvwasi.c:1904:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  flags = write ? read ? UV_FS_O_RDWR : UV_FS_O_WRONLY : UV_FS_O_RDONLY;
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:831:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  SetFlagsFromString(str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:892:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         : (source ? static_cast<int>(strlen(source)) : 0)),
data/nodejs-14.13.0~dfsg/deps/v8/src/api/api.cc:6216:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(string);
data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-value-factory.cc:121:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (length != strlen(data)) return false;
data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast-value-factory.cc:275:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  static_cast<int>(strlen(data)));         \
data/nodejs-14.13.0~dfsg/deps/v8/src/ast/ast.cc:1028:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t length = strlen(bigint_str);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:223:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t fieldlen = strlen(field);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/cpu.cc:266:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t item_len = strlen(item);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_posix.cc:114:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      search_from = mangled_start + strlen(demangled_symbol.get());
data/nodejs-14.13.0~dfsg/deps/v8/src/base/debug/stack_trace_posix.cc:183:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ssize_t return_val = write(STDERR_FILENO, output, strlen(output));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/file-utils.cc:17:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t basename_start = strlen(exec_path);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/file-utils.cc:22:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t name_length = strlen(name);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:98:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t rc = read(fd, addr_buffer + 2, 8);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:101:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rc = read(fd, addr_buffer + 2, 1);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:104:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rc = read(fd, addr_buffer + 2, 8);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-aix.cc:112:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      rc = read(fd, buffer + bytes_read, 1);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:232:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(fp);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:246:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        lib_name[strlen(lib_name) - 1] = '\0';
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-cygwin.cc:257:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(fp);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-fuchsia.cc:56:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(kVirtualMemoryName));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:72:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(fp);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:87:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        lib_name[strlen(lib_name) - 1] = '\0';
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:95:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t lib_name_length = strlen(lib_name);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-linux.cc:113:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(fp);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc:66:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(fp);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc:80:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        lib_name[strlen(lib_name) - 1] = '\0';
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-openbsd.cc:91:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(fp);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:451:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(static_cast<useconds_t>(interval.InMicroseconds()));
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:739:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dest, src, n);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-posix.cc:811:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(name_, name, sizeof(name_) - 1);
data/nodejs-14.13.0~dfsg/deps/v8/src/base/platform/platform-win32.cc:1340:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  OS::StrNCpy(name_, sizeof(name_), name, strlen(name));
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:658:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &prepare_step_in_suspended_generator);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:739:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ Assert(equal, AbortReason::kMissingBytecodeArray);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:897:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ Assert(equal, AbortReason::kExpectedOptimizationSentinel);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:962:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, if_return);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:1069:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:1584:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:1623:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &function_entry_bytecode);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:1759:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ j(equal, &no_arg_array, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:1903:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:1964:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:2073:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &ok);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:2077:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &ok);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:2125:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:2147:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:2222:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &arguments_adaptor, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:2749:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &dont_adapt_arguments);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3090:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &exception_returned);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3102:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &okay, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3367:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3370:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3373:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3376:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3379:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3382:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3637:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &move_last_63);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/ia32/builtins-ia32.cc:3729:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &pop_and_return);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:759:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &prepare_step_in_suspended_generator);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:840:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ Assert(equal, AbortReason::kMissingBytecodeArray);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:967:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ Assert(equal, AbortReason::kExpectedOptimizationSentinel);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:1063:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, if_return, Label::kFar);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:1555:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:1592:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &function_entry_bytecode);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:1729:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ j(equal, &no_arg_array, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:1874:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:1928:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2006:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &dont_adapt_arguments);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2197:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &ok);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2201:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &ok);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2246:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2268:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2326:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &arguments_adaptor, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2653:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          RelocInfo::CODE_TARGET, equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2657:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          RelocInfo::CODE_TARGET, equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2667:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2767:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          RelocInfo::CODE_TARGET, equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2773:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          RelocInfo::CODE_TARGET, equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:2778:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3025:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &exception_returned);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3037:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &okay, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3271:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3274:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3277:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3280:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3283:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/builtins/x64/builtins-x64.cc:3286:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/assembler-arm64.cc:650:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int size = static_cast<int>(kDebugMessageOffset + strlen(message) + 1);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/arm64/assembler-arm64.cc:3606:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(string) + 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-comments.cc:46:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CHECK_EQ(GetCommentSize(), strlen(comment_string) + 1);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-stub-assembler.cc:48:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t name_length = strlen(name);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-stub-assembler.cc:53:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t option_length = strlen(FLAG_csa_trap_on_node);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/code-stub-assembler.h:1034:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DCHECK_EQ(strlen(single_char), 1);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/assembler-ia32.h:81:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  zero = equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:492:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:617:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:640:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:663:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:686:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Check(equal, AbortReason::kOperandIsNotASmi);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:710:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Check(equal, AbortReason::kOperandIsNotAFunction);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:721:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Check(equal, AbortReason::kOperandIsNotABoundFunction);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:740:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &do_check, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:744:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &do_check, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:753:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Check(equal, AbortReason::kOperandIsNotAGeneratorObject);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:762:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &done_checking);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:765:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Assert(equal, AbortReason::kExpectedUndefinedOrCell);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:800:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Check(equal, AbortReason::kStackFrameTypesMustMatch);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:1109:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &regular_invoke);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.cc:1679:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  j(equal, target_if_cleared);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.h:151:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, dest);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/ia32/macro-assembler-ia32.h:593:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, if_equal, if_equal_distance);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/constants-mips.h:1014:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  zero = equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips/constants-mips.h:1015:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  eq = equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/constants-mips64.h:1048:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  zero = equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/mips64/constants-mips64.h:1049:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  eq = equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/s390/assembler-s390.cc:128:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        bytes_read = read(fd, buffer, sizeof(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/safepoint-table.cc:200:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (!std::equal(indexes1->begin(), indexes1->end(), indexes2->begin())) {
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/signature.h:54:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return std::equal(all().begin(), all().end(), other.all().begin());
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/assembler-x64.h:91:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  zero = equal,
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:463:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &ok, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2129:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Check(equal, AbortReason::kOperandIsNotAFunction);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2140:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Check(equal, AbortReason::kOperandIsNotABoundFunction);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2157:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  j(equal, &do_check);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2161:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  j(equal, &do_check);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2169:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Check(equal, AbortReason::kOperandIsNotAGeneratorObject);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2177:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &done_checking);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2179:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Assert(equal, AbortReason::kExpectedUndefinedOrCell);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2186:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  j(equal, target_if_cleared);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2365:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, &regular_invoke, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.cc:2441:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Check(equal, AbortReason::kStackFrameTypesMustMatch);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.h:409:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, dest);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.h:727:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, if_equal, if_equal_distance);
data/nodejs-14.13.0~dfsg/deps/v8/src/codegen/x64/macro-assembler-x64.h:732:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    j(equal, if_equal, if_equal_distance);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ia32/code-generator-ia32.cc:647:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ Assert(equal, AbortReason::kWrongFunctionCodeStart);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ia32/code-generator-ia32.cc:806:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ Assert(equal, AbortReason::kWrongFunctionContext);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/ia32/code-generator-ia32.cc:4312:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      return equal;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc:596:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ setcc(equal, dst);                       \
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc:729:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ Assert(equal, AbortReason::kWrongFunctionCodeStart);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc:756:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cmovq(equal, kSpeculationPoisonRegister, rbx);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc:896:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ Assert(equal, AbortReason::kWrongFunctionContext);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc:1652:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc:1681:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ j(equal, &done, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/backend/x64/code-generator-x64.cc:4151:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      return equal;
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/graph-visualizer.cc:206:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(debug_name.get()) > 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typed-optimization.cc:539:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      ReplaceWithValue(node, equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/compiler/typed-optimization.cc:540:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      return Replace(equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:266:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytes_read = read(exec_error_fds[kReadFD], &err, sizeof(err));
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:295:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        read(child_fd, buffer + fullness, kStdoutReadBufferSize - fullness));
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:355:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(useconds);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:521:20:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    int previous = umask(
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8-posix.cc:703:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t name_len = strlen(name) + 1;  // Includes the null terminator
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:1478:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = static_cast<int>(strlen(buffer));
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:2511:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t input_length = strlen(input);
data/nodejs-14.13.0~dfsg/deps/v8/src/d8/d8.cc:2512:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t suffix_length = strlen(suffix);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:324:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read > 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:325:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          pkt_out->AddBlock(buff, read);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:603:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read > 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/target.cc:604:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        pkt_out->AddBlock(buff, read);
data/nodejs-14.13.0~dfsg/deps/v8/src/debug/wasm/gdb-server/transport.cc:428:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(faulted_thread_fd_read_, &buf, sizeof(buf)) < 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm/disasm-arm.cc:125:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (strncmp(string, compare_string, strlen(compare_string)) == 0)
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3968:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          return static_cast<int>(strlen("IVByElemIndex"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3971:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strncmp(format, "IVInsIndex", strlen("IVInsIndex")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3979:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (strncmp(format, "IVInsIndex1", strlen("IVInsIndex1")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3981:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                return static_cast<int>(strlen("IVInsIndex1"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3983:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 strlen("IVInsIndex2")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3985:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                return static_cast<int>(strlen("IVInsIndex2"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:3998:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strncmp(format, "IVMIImmFPSingle", strlen("IVMIImmFPSingle")) ==
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4002:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return static_cast<int>(strlen("IVMIImmFPSingle"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4004:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen("IVMIImmFPDouble")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4007:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return static_cast<int>(strlen("IVMIImmFPDouble"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4008:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          } else if (strncmp(format, "IVMIImm8", strlen("IVMIImm8")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4011:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return static_cast<int>(strlen("IVMIImm8"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4012:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          } else if (strncmp(format, "IVMIImm", strlen("IVMIImm")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4021:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return static_cast<int>(strlen("IVMIImm"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4023:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen("IVMIShiftAmt1")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4027:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return static_cast<int>(strlen("IVMIShiftAmt1"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4029:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             strlen("IVMIShiftAmt2")) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/arm64/disasm-arm64.cc:4033:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return static_cast<int>(strlen("IVMIShiftAmt2"));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:240:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DCHECK(strlen(name_) < sizeof(header->sectname));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:241:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DCHECK(strlen(segment_) < sizeof(header->segname));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:242:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(header->sectname, name_, sizeof(header->sectname));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:243:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(header->segname, segment_, sizeof(header->segname));
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/gdb-jit.cc:2001:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(FLAG_gdbjit_dump_filter) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/mips/disasm-mips.cc:159:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (strncmp(string, compare_string, strlen(compare_string)) == 0)
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/mips64/disasm-mips64.cc:171:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (strncmp(string, compare_string, strlen(compare_string)) == 0)
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/ppc/disasm-ppc.cc:94:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (strncmp(string, compare_string, strlen(compare_string)) == 0)
data/nodejs-14.13.0~dfsg/deps/v8/src/diagnostics/s390/disasm-s390.cc:92:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (strncmp(string, compare_string, strlen(compare_string)) == 0)
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:1330:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      padding_chars -= strlen(suffix);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:1335:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      padding_chars -= strlen(suffix);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:2576:14:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask = (umask >> R) | (umask << (reg_size - R));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:2576:29:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask = (umask >> R) | (umask << (reg_size - R));
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:2577:27:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    mask = static_cast<T>(umask);
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:3643:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t size = kDebugMessageOffset + strlen(message) + 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/execution/arm64/simulator-arm64.cc:5830:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(format_base) + 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/factory.h:238:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DCHECK_EQ(N, strlen(str) + 1);
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4841:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      Min(strlen(string), kTraceRingBufferSize - ring_buffer_end_);
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4844:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (first_part < strlen(string)) {
data/nodejs-14.13.0~dfsg/deps/v8/src/heap/heap.cc:4846:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t second_part = strlen(string) - first_part;
data/nodejs-14.13.0~dfsg/deps/v8/src/init/bootstrapper.cc:120:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      FLAG_expose_gc_as != nullptr && strlen(FLAG_expose_gc_as) != 0;
data/nodejs-14.13.0~dfsg/deps/v8/src/init/bootstrapper.cc:126:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         strlen(FLAG_expose_cputracemark_as) != 0;
data/nodejs-14.13.0~dfsg/deps/v8/src/inspector/string-16.cc:57:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    : String16(characters, std::strlen(characters)) {}
data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-config.cc:36:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  DCHECK(included_category != nullptr && strlen(included_category) > 0);
data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-object.cc:19:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return str ? strlen(str) + 1 : 0;
data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-object.cc:27:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(*member) + 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/libplatform/tracing/trace-writer.cc:21:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log-utils.cc:60:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(Version::GetEmbedder()) != 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log-utils.cc:113:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  AppendString(str, strlen(str));
data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log.cc:140:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(bytes);
data/nodejs-14.13.0~dfsg/deps/v8/src/logging/log.cc:561:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:929:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      static_cast<int>(strlen(string)));
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1107:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t rep_length = strlen(decimal_rep);
data/nodejs-14.13.0~dfsg/deps/v8/src/numbers/conversions.cc:1215:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          const size_t len = strlen(decimal_rep + decimal_point);
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/debug-objects.cc:402:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  } else if (strlen(function_name.get()) > 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/intl-objects.cc:519:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (icu_script == nullptr || strlen(icu_script) == 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-locale.cc:414:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(language) == 0) return factory->undefined_value();
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-locale.cc:421:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(script) == 0) return factory->undefined_value();
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-locale.cc:428:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(region) == 0) return factory->undefined_value();
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-number-format.cc:360:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  index += static_cast<int32_t>(std::strlen(currency));
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/js-number-format.cc:369:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  index += static_cast<int32_t>(std::strlen(numbering_system));
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/map.cc:417:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(reason) > 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects.cc:6348:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      escapes += std::strlen("\\u2028") - 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/objects/objects.cc:6351:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      escapes += std::strlen("\\u2029") - 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parser-base.h:4466:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           strlen(name));
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/parser.cc:877:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(function_name.get())));
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/scanner-character-streams.cc:790:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return ScannerStream::ForTesting(data, strlen(data));
data/nodejs-14.13.0~dfsg/deps/v8/src/parsing/token.cc:22:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return str ? static_cast<uint8_t>(strlen(str)) : 0;
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-snapshot-generator-inl.h:57:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = static_cast<int>(strlen(s));
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-snapshot-generator.cc:2126:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(s);
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/heap-snapshot-generator.cc:2132:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DCHECK_LE(n, strlen(s));
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/strings-storage.cc:30:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = static_cast<int>(strlen(src));
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/strings-storage.cc:100:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int cons_length = actual_length + static_cast<int>(strlen(prefix)) + 1;
data/nodejs-14.13.0~dfsg/deps/v8/src/profiler/strings-storage.cc:112:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = static_cast<int>(strlen(str));
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:170:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, on_equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:182:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, on_at_start);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:218:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &fallthrough);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:252:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &loop_increment);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:265:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &fail);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:376:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &fallthrough);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:458:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, on_equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:540:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ j(equal, &success, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:923:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &exit_with_exception);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/ia32/regexp-macro-assembler-ia32.cc:975:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, if_eq);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-compiler-tonode.cc:1391:69:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                               character_ranges->at(read));
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-compiler-tonode.cc:1393:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  } while (read < n);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-parser.cc:1416:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  DCHECK(name_1->size() - 1 == std::strlen(name_1->data()));
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/regexp-parser.cc:1417:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  DCHECK(name_2->empty() || name_2->size() - 1 == std::strlen(name_2->data()));
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:179:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, on_equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:191:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, on_at_start);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:231:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &fallthrough);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:272:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &loop_increment);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:289:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, on_no_match);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:396:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ j(equal, &fallthrough);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:475:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, on_equal);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:555:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ j(equal, &success, Label::kNear);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:980:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ j(equal, &exit_with_exception);
data/nodejs-14.13.0~dfsg/deps/v8/src/regexp/x64/regexp-macro-assembler-x64.cc:1038:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  BranchOrBacktrack(equal, if_eq);
data/nodejs-14.13.0~dfsg/deps/v8/src/runtime/runtime.cc:89:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        static_cast<int>(strlen(function->name)));
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/embedded/embedded-file-writer.cc:137:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (current_line_length + strlen(",0x") + write_size * 2 > kTextWidth) {
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/mksnapshot.cc:122:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (filename == nullptr || strlen(filename) == 0) return nullptr;
data/nodejs-14.13.0~dfsg/deps/v8/src/snapshot/mksnapshot.cc:140:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    i += read;
data/nodejs-14.13.0~dfsg/deps/v8/src/strings/string-hasher-inl.h:125:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name, static_cast<int>(strlen(name)), hashseed_);
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/constants.h:100:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return name.substr(0, std::strlen(CONSTEXPR_TYPE_PREFIX)) ==
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/constants.h:106:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return name.substr(std::strlen(CONSTEXPR_TYPE_PREFIX));
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/ls/message-handler.cc:49:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  std::cin.read(&content[0], content_length);
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/source-positions.cc:37:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  path_from_root.resize(path_from_root.size() - strlen(".tq"));
data/nodejs-14.13.0~dfsg/deps/v8/src/torque/utils.cc:257:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         index == js_position + strlen("JS"))) {
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:35:9:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
  ptr = memalign(alignment, size);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:99:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(str);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/allocation.cc:107:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(str);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:25:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(s);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:32:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  DCHECK_LE(n, strlen(s));
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:71:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  DCHECK(strlen(buffer_.begin()) == static_cast<size_t>(position_));
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:151:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(line_buf);
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:204:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read != (size - i) && ferror(file) != 0) {
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:209:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    i += read;
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/utils.cc:343:19:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  auto res = std::mismatch(filter_it, filter.end(), name.begin());
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/vector.h:253:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return {data, strlen(data)};
data/nodejs-14.13.0~dfsg/deps/v8/src/utils/vector.h:263:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return OneByteVector(data, strlen(data));
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/ia32/liftoff-assembler-ia32.h:782:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    assm->j(equal, trap_div_unrepresentable);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/ia32/liftoff-assembler-ia32.h:1831:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  liftoff::setcc_32(this, equal, dst);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/ia32/liftoff-assembler-ia32.h:1849:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  liftoff::setcc_32(this, equal, dst);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/liftoff-assembler-defs.h:82:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
constexpr Condition kEqual = equal;
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/x64/liftoff-assembler-x64.h:1835:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  setcc(equal, dst);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/baseline/x64/liftoff-assembler-x64.h:1848:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  setcc(equal, dst);
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/struct-types.h:41:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return std::equal(fields().begin(), fields().end(), other.fields().begin());
data/nodejs-14.13.0~dfsg/deps/v8/src/wasm/wasm-result.cc:24:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = str_offset + strlen(format);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json.cc:350:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    out_->insert(out_->end(), str, str + strlen(str));
data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json_test.cc:579:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen("{\"foo\":") * 301));
data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/json_test.cc:587:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen("{\"foo\":") * 301));
data/nodejs-14.13.0~dfsg/deps/v8/third_party/inspector_protocol/crdtp/span.h:59:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return str ? span<uint8_t>(reinterpret_cast<const uint8_t*>(str), strlen(str))
data/nodejs-14.13.0~dfsg/deps/v8/third_party/markupsafe/_speedups.c:15:84:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define UNICHR(x) (PyUnicode_AS_UNICODE((PyUnicodeObject*)PyUnicode_DecodeASCII(x, strlen(x), NULL)));
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/callback.cc:72:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/finalize.cc:30:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/global.cc:66:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hello.cc:34:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/hostref.cc:125:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/memory.cc:78:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/multi.cc:40:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/reflect.cc:87:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/serialize.cc:34:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/start.cc:32:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/table.cc:86:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/threads.c:38:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(100000);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/threads.cc:90:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/example/trap.cc:42:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  file.read(binary.get(), file_size);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/wasm-api/wasm.h:103:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  wasm_name_new(out, strlen(s) + 1, s);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:143:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = (int)strlen(newdir);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:390:27:  [1] (buffer) scanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                    ret = scanf("%1s",answer);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/miniunz.c:609:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(filename_try, zipfilename,MAXFILENAME-1);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:111:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(f);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:115:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, f,MAXFILENAME-1);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:324:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(filename_try, argv[zipfilenamearg],MAXFILENAME-1);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:328:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len=(int)strlen(filename_try);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:352:27:  [1] (buffer) scanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                    ret = scanf("%1s",answer);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/minizip.c:396:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  (strlen(argv[i]) == 2)))
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:151:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int comsize = (int) strlen(comment);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/mztools.c:226:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int comsize = (int) strlen(comment);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/unzip.c:1245:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(szFileName)>=UNZ_MAXFILENAMEINZIP)
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:962:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  uInt size_filename = (uInt)strlen(filename);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:1101:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_comment = (uInt)strlen(comment);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:1103:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_filename = (uInt)strlen(filename);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/contrib/minizip/zip.c:1870:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_global_comment = (uInt)strlen(global_comment);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzguts.h:48:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define read _read
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:199:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)path);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:605:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:605:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:611:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzlib.c:611:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzread.c:35:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = read(state->fd, buf + *have, get);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:370:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:426:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/nodejs-14.13.0~dfsg/deps/v8/third_party/zlib/gzwrite.c:524:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/nodejs-14.13.0~dfsg/deps/v8/tools/shell-utils.h:57:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    i += read;
data/nodejs-14.13.0~dfsg/deps/zlib/gzguts.h:48:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define read _read
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:199:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((const char *)path);
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:605:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:605:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) ==
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:611:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/nodejs-14.13.0~dfsg/deps/zlib/gzlib.c:611:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3,
data/nodejs-14.13.0~dfsg/deps/zlib/gzread.c:35:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ret = read(state->fd, buf + *have, get);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:370:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(str);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:426:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/nodejs-14.13.0~dfsg/deps/zlib/gzwrite.c:524:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(next);
data/nodejs-14.13.0~dfsg/src/api/exceptions.cc:170:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (int i = strlen(errmsg) - 1;
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:322:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                       int read,
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:333:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read || write) {
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:352:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  (read ? UV_READABLE : 0) | (write ? UV_WRITABLE : 0),
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:422:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t name_size = strlen(src->h_name) + 1;
data/nodejs-14.13.0~dfsg/src/cares_wrap.cc:435:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t cur_alias_size = strlen(src->h_aliases[i]) + 1;
data/nodejs-14.13.0~dfsg/src/debug_utils.cc:411:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(cur_info->ldinfo_filename) + 1;
data/nodejs-14.13.0~dfsg/src/env.cc:902:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      Buffer::Copy(env->isolate(), path, strlen(path)).ToLocalChecked();
data/nodejs-14.13.0~dfsg/src/env.cc:909:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      Buffer::Copy(env->isolate(), dest, strlen(dest)).ToLocalChecked();
data/nodejs-14.13.0~dfsg/src/fs_event_wrap.cc:221:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    strlen(filename),
data/nodejs-14.13.0~dfsg/src/inspector/node_string.h:37:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  builderAppend(builder, value, std::strlen(value));
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:44:50:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  void ReclaimUvBuf(const uv_buf_t* buf, ssize_t read);
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:717:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void TcpHolder::ReclaimUvBuf(const uv_buf_t* buf, ssize_t read) {
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:718:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read > 0) {
data/nodejs-14.13.0~dfsg/src/inspector_socket.cc:719:56:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    buffer.insert(buffer.end(), buf->base, buf->base + read);
data/nodejs-14.13.0~dfsg/src/inspector_socket_server.cc:89:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(expected);
data/nodejs-14.13.0~dfsg/src/node.h:728:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#pragma section(".CRT$XCU", read)
data/nodejs-14.13.0~dfsg/src/node_api.cc:615:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const_cast<char*>(location), strlen(location));
data/nodejs-14.13.0~dfsg/src/node_api.cc:623:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const_cast<char*>(message), strlen(message));
data/nodejs-14.13.0~dfsg/src/node_api.h:47:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#pragma section(".CRT$XCU", read)
data/nodejs-14.13.0~dfsg/src/node_binding.cc:129:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  struct equal {
data/nodejs-14.13.0~dfsg/src/node_binding.cc:138:61:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
static std::unordered_set<dl_wrap*, dl_wrap::hash, dl_wrap::equal>
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:173:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(passphrase);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:973:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                              strlen(root_certs[i])).get(),
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1189:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(*ciphers) == 0 && ERR_GET_REASON(err) == SSL_R_NO_CIPHER_MATCH) {
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:1826:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t size = strlen(line);
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:2453:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen(servername));
data/nodejs-14.13.0~dfsg/src/node_crypto.cc:6725:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      Encode(env->isolate(), cert.get(), strlen(cert.get()), BUFFER);
data/nodejs-14.13.0~dfsg/src/node_crypto_bio.cc:139:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return Write(bio, str, strlen(str));
data/nodejs-14.13.0~dfsg/src/node_dir.cc:179:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t namelen = strlen(ents[i].name);
data/nodejs-14.13.0~dfsg/src/node_file.cc:893:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(*path) != path.length()) {
data/nodejs-14.13.0~dfsg/src/node_file.cc:2045:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FS_SYNC_TRACE_BEGIN(read);
data/nodejs-14.13.0~dfsg/src/node_file.cc:2048:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FS_SYNC_TRACE_END(read, "bytesRead", bytesRead);
data/nodejs-14.13.0~dfsg/src/node_file.cc:2091:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FS_SYNC_TRACE_BEGIN(read);
data/nodejs-14.13.0~dfsg/src/node_file.cc:2094:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FS_SYNC_TRACE_END(read, "bytesRead", bytesRead);
data/nodejs-14.13.0~dfsg/src/node_http2.cc:402:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nva[n].origin_len = strlen(p);
data/nodejs-14.13.0~dfsg/src/node_http_common-inl.h:60:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nva[n].namelen = strlen(p);
data/nodejs-14.13.0~dfsg/src/node_http_common-inl.h:63:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nva[n].valuelen = strlen(p);
data/nodejs-14.13.0~dfsg/src/node_i18n.cc:363:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ucnv_setSubstChars(conv_.get(), sub, strlen(sub), &status);
data/nodejs-14.13.0~dfsg/src/node_native_module.cc:191:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(id, "internal/deps", strlen("internal/deps")) == 0) {
data/nodejs-14.13.0~dfsg/src/node_native_module.cc:192:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    id += strlen("internal/");
data/nodejs-14.13.0~dfsg/src/node_os.cc:215:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(ip, "<unknown sa family>", INET6_ADDRSTRLEN);
data/nodejs-14.13.0~dfsg/src/node_process_methods.cc:24:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#define umask _umask
data/nodejs-14.13.0~dfsg/src/node_process_methods.cc:236:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    old = umask(0);
data/nodejs-14.13.0~dfsg/src/node_process_methods.cc:237:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask(static_cast<mode_t>(old));
data/nodejs-14.13.0~dfsg/src/node_process_methods.cc:240:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    old = umask(static_cast<mode_t>(oct));
data/nodejs-14.13.0~dfsg/src/node_win32_etw_provider-inl.h:40:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      (strlen(data) + 1) * sizeof(*data));
data/nodejs-14.13.0~dfsg/src/string_bytes.cc:776:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(buf);
data/nodejs-14.13.0~dfsg/src/tcp_wrap.cc:355:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const size_t addrlen = strlen(ip);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:515:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read;
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:518:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Debug(this, "Read %d bytes of cleartext output", read);
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:520:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read <= 0)
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:524:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (read > 0) {
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:525:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      int avail = read;
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:555:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read <= 0) {
data/nodejs-14.13.0~dfsg/src/tls_wrap.cc:558:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Local<Value> arg = GetSSLError(read, &err, nullptr);
data/nodejs-14.13.0~dfsg/src/tracing/traced_value.cc:34:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int32_t len = strlen(value);
data/nodejs-14.13.0~dfsg/src/util.cc:155:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf.resize(strlen(&buf[0]));
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:2361:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int length = strlen(ansi);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:3310:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    num_chars = static_cast<int>(wcslen(str));
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:5194:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      segment = next_segment + strlen("]]>");
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:5789:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result.reserve(strlen(str) + 1);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:7136:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t prefix_len = strlen(prefix);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:7561:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (temp_dir[strlen(temp_dir) - 1] == '\\')
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:8508:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          status_zx = stderr_socket_.read(
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10427:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t full_regex_len = strlen(regex) + 10;
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:10677:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(regex);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:11412:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PrintCharsAsStringTo(s, strlen(s), os);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest-all.cc:11429:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    PrintCharsAsStringTo(s, wcslen(s), os);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2322:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  return strncpy(dest, src, n);
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:2344:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return static_cast<int>(read(fd, buf, count));
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:3217:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (s.compare(0, strlen(prefix), prefix) == 0) {
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:3218:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    std::string::size_type end = s.find("::", strlen(prefix));
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:3221:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s.erase(strlen("std"), end - strlen("std"));
data/nodejs-14.13.0~dfsg/test/cctest/gtest/gtest.h:3221:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s.erase(strlen("std"), end - strlen("std"));
data/nodejs-14.13.0~dfsg/test/cctest/node_test_fixture.h:23:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      total_len += strlen(*it) + 1;
data/nodejs-14.13.0~dfsg/test/cctest/node_test_fixture.h:30:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = strlen(*it) + 1;
data/nodejs-14.13.0~dfsg/test/cctest/test_base64.cc:13:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(base64_string);
data/nodejs-14.13.0~dfsg/test/cctest/test_base64.cc:16:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    base64_encode(string, strlen(string), buffer, len);
data/nodejs-14.13.0~dfsg/test/cctest/test_base64.cc:49:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(string);
data/nodejs-14.13.0~dfsg/test/cctest/test_base64.cc:52:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    base64_decode(buffer, len, base64_string, strlen(base64_string));
data/nodejs-14.13.0~dfsg/test/cctest/test_inspector_socket_server.cc:209:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static void ReadCallback(uv_stream_t* stream, ssize_t read,
data/nodejs-14.13.0~dfsg/test/cctest/test_inspector_socket_server.cc:218:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                buf->base + read);
data/nodejs-14.13.0~dfsg/test/cctest/test_url.cc:36:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  URL simple(input, strlen(input));
data/nodejs-14.13.0~dfsg/test/cctest/test_url.cc:76:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  URL simple(input, strlen(input), base, strlen(base));
data/nodejs-14.13.0~dfsg/test/cctest/test_url.cc:76:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  URL simple(input, strlen(input), base, strlen(base));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:81:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_FALSE(StringEqualNoCaseN("a", "b", strlen("a")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:82:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_TRUE(StringEqualNoCaseN("", "", strlen("")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:83:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_TRUE(StringEqualNoCaseN("equal", "equal", strlen("equal")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:84:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_TRUE(StringEqualNoCaseN("equal", "EQUAL", strlen("equal")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:85:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_TRUE(StringEqualNoCaseN("EQUAL", "EQUAL", strlen("equal")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:86:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_TRUE(StringEqualNoCaseN("equal", "equals", strlen("equal")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:87:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_FALSE(StringEqualNoCaseN("equal", "equals", strlen("equals")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:88:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_TRUE(StringEqualNoCaseN("equals", "equal", strlen("equal")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:89:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_FALSE(StringEqualNoCaseN("equals", "equal", strlen("equals")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:90:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_TRUE(StringEqualNoCaseN("abc\0abc", "abc\0efg", strlen("abcdefgh")));
data/nodejs-14.13.0~dfsg/test/cctest/test_util.cc:91:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_FALSE(StringEqualNoCaseN("abc\0abc", "abcd\0efg", strlen("abcdefgh")));
data/nodejs-14.13.0~dfsg/test/js-native-api/3_callbacks/binding.c:25:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/nodejs-14.13.0~dfsg/test/js-native-api/test_object/test_object.c:304:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str_val);
data/nodejs-14.13.0~dfsg/test/node-api/1_hello_world/binding.c:8:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/nodejs-14.13.0~dfsg/test/node-api/test_policy/binding.c:8:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/nodejs-14.13.0~dfsg/test/wasi/c/create_symlink.c:14:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         strlen(target) + 1);
data/nodejs-14.13.0~dfsg/test/wasi/c/create_symlink.c:20:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/create_symlink.c:24:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/follow_symlink.c:8:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  char c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/follow_symlink.c:12:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/freopen.c:10:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = fgetc(file_new);
data/nodejs-14.13.0~dfsg/test/wasi/c/freopen.c:14:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(file_new);
data/nodejs-14.13.0~dfsg/test/wasi/c/read_file.c:8:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  char c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/read_file.c:12:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/read_file_twice.c:9:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    char c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/read_file_twice.c:13:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = fgetc(file);
data/nodejs-14.13.0~dfsg/test/wasi/c/write_file.c:12:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(nwritten == strlen(message));
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2057:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(codepage, nl_langinfo(CODESET),63-strlen(UCNV_SWAP_LFNL_OPTION_STRING));
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/common/putil.cpp:2057:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncpy(codepage, nl_langinfo(CODESET),63-strlen(UCNV_SWAP_LFNL_OPTION_STRING));
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/i18n/dtptngen.cpp:1994:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
       UBool equal;
data/nodejs-14.13.0~dfsg/tools/icu/patches/64/source/i18n/dtptngen.cpp:2000:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
       if (equal) {
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding.cc:1480:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    out_->insert(out_->end(), str, str + strlen(str));
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding.h:67:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return str ? span<uint8_t>(reinterpret_cast<const uint8_t*>(str), strlen(str))
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding_test.cc:38:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return end == str + strlen(str);
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding_test.cc:1685:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_EQ(strlen("{\"foo\":") * 301, log_.status().pos);
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/encoding/encoding_test.cc:1693:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_EQ(strlen("{\"foo\":") * 301, log_.status().pos);
data/nodejs-14.13.0~dfsg/tools/inspector_protocol/markupsafe/_speedups.c:15:84:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define UNICHR(x) (PyUnicode_AS_UNICODE((PyUnicodeObject*)PyUnicode_DecodeASCII(x, strlen(x), NULL)));

ANALYSIS SUMMARY:

Hits = 5044
Lines analyzed = 1859700 in approximately 47.72 seconds (38970 lines/second)
Physical Source Lines of Code (SLOC) = 1414902
Hits@level = [0] 1517 [1] 1043 [2] 3065 [3] 126 [4] 786 [5]  24
Hits@level+ = [0+] 6561 [1+] 5044 [2+] 4001 [3+] 936 [4+] 810 [5+]  24
Hits/KSLOC@level+ = [0+] 4.63707 [1+] 3.56491 [2+] 2.82776 [3+] 0.66153 [4+] 0.572478 [5+] 0.0169623
Dot directories skipped = 6 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.