Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_copy.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.h
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_dump.c
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/lmdb.h
Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/decode.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/io.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/options.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/lber-int.h
Examining data/openldap-2.4.56+dfsg/libraries/liblber/idtest.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/encode.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/memory.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/assert.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/nt_err.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/debug.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/etest.c
Examining data/openldap-2.4.56+dfsg/libraries/liblber/dtest.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/map.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/subst.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/params.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rule.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/session.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/parse.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite-map.h
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/info.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/context.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/config.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/var.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite-int.h
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c
Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/sockpair.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/signal.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/getpeereid.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/meter.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/hash.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/getopt.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/slapdmsg.h
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/passfile.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/md5.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/ptest.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/memcmp.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/lockf.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/base64.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/tavl.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/avl.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c
Examining data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/free.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/getattr.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/modify.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/unbind.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/urltest.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/schema.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/getentry.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/options.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldap-int.h
Examining data/openldap-2.4.56+dfsg/libraries/libldap/url.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/addentry.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/modrdn.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/stctrl.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldap_sync.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/turn.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/references.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/assertion.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/open.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/abandon.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/add.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/sbind.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/ftest.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/sort.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/passwd.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/filter.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/getvalues.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/vlvctrl.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/sortctrl.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/init.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/deref.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldap-tls.h
Examining data/openldap-2.4.56+dfsg/libraries/libldap/test.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/result.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/extended.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/request.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/controls.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/pagectrl.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/bind.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/charray.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/t61.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/sasl.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/txn.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/compare.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/messages.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/cancel.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/print.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/error.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/utf-8.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/search.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/apitest.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/dds.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/string.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/fetch.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/ppolicy.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/whoami.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/delete.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/ntlm.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/rdwr.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_cthreads.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/rq.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/ldap_thr_debug.h
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_posix.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/tpool.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_nt.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_thr.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_stub.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/rmutex.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_pth.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c
Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/threads.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucpgba.h
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/uctable.h
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucpgba.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.h
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/utbm/utbmstub.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/utbm/utbm.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/utbm/utbm.h
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ure/ure.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ure/urestubs.c
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ure/ure.h
Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucstr.c
Examining data/openldap-2.4.56+dfsg/build/version.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/str2filter.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_ops.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_ext.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/proto-slapi.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/ava.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slaptest.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/unbind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/config.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/user.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/unbind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/back-sock.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/proto-sock.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/opensock.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/extended.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/schema.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/log.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/proto-back-monitor.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/rww.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/back-monitor.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/overlay.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/thread.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/backend.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/listener.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/operation.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/cache.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/entry.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/sent.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/operational.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/cr.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapcat.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/mods.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/ad.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/sets.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/seqmod.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/translucent.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/dyngroup.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/deref.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/valsort.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/refint.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/overlays.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/auditlog.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/collect.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/unique.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/sssvlv.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/syntax.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapschema.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapauth.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/mra.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/abandon.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/starttls.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/acl.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/back-ndb.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/proto-ndb.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/delete.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modify.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modrdn.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/add.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/bind.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/compare.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/back-relay.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/op.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/proto-back-relay.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/alock.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/backend.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/schema_prep.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/index.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/alock.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/lock.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/id2entry.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/tools.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/back-bdb.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/key.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/nextid.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/index.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/proto-bdb.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/trans.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/filterindex.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/cache.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/extended.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/referral.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dbcache.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2entry.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/attr.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/operational.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/error.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/zn_malloc.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/operation.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/proto-ldap.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/unbind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/pbind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/chain.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/extended.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/distproc.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/back-ldap.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/dncache.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/unbind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/proto-meta.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/candidates.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/back-meta.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/globals.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/mr.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/dn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/passwd.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/back-passwd.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/proto-passwd.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/id2entry.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/back-mdb.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/key.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/nextid.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/index.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/filterindex.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/extended.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/referral.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2entry.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/attr.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/proto-mdb.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/operational.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/sl_malloc.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/filter.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/at.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/ctxcsn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/backover.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-null/null.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/component.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/value.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/connection.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/ch_malloc.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/filterentry.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/unbind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/fork.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/proto-shell.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/shell.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/matchedValues.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/entry.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/schema_check.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/component.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/passwd-shell.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/result.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/frontend.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/aci.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/nt_svc.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-hdb/back-bdb.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/slappasswd.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/oc.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/limits.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/oidm.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/extended.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/proto-sql.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/sql-wrap.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/back-sql.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/api.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/operational.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/controls.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/sets.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/referral.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/proto-dnssrv.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/modify.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/proto-perl.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/modrdn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/perl_back.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/add.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/asperl_undefs.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/init.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/config.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/close.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/bind.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/attr.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/daemon.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/txn.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/compare.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/cancel.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/main.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/operational.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/backglue.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/schemaparse.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/search.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slap.h
Examining data/openldap-2.4.56+dfsg/servers/slapd/delete.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/slapindex.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/sasl.c
Examining data/openldap-2.4.56+dfsg/servers/slapd/module.c
Examining data/openldap-2.4.56+dfsg/doc/devel/template.c
Examining data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c
Examining data/openldap-2.4.56+dfsg/contrib/ldaptcl/tkAppInit.c
Examining data/openldap-2.4.56+dfsg/contrib/ldaptcl/tclAppInit.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/allop/allop.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/denyop/denyop.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nops/nops.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/posixgroup.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastbind/lastbind.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/noopsrch/noopsrch.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/addpartial/addpartial-overlay.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/trace/trace.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/argon2/pw-argon2.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/radius.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/netscape.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/kerberos.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/samba4/vernum.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/samba4/rdnval.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/samba4/pguid.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/kinit/kinit.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/proxyOld/proxyOld.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/dupent/dupent.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/asn_to_syn_mr.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/asn.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/nslcd-prot.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/nslcd.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/attrs.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.h
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/alias.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c
Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/allowed/allowed.c
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/main.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/startTls.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/urlTest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/readSchema.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConstraints.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteraction.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPBindRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrlList.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSaslBindResult.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteractionHandler.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttrType.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModification.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntry.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPCompareRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPDeleteRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPReferenceList.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntryList.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessage.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAsynConnection.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModList.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModifyRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifReader.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPDeleteRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResult.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebindAuth.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModDNRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPBindRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttribute.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebind.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrl.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrlList.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPObjClass.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/StringList.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifReader.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttributeList.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebind.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControlSet.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessageQueue.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAsynConnection.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPException.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/ac/time.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifWriter.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/StringList.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPCompareRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttributeList.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSchema.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControlSet.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControl.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPResult.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtResult.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResult.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResults.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSchema.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControl.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/TlsOptions.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchReference.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntryList.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPObjClass.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPReferenceList.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/TlsOptions.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteractionHandler.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConnection.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifWriter.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResults.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAddRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModifyRequest.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessageQueue.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSaslBindResult.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModification.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrl.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPException.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModList.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchReference.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConnection.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPResult.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModDNRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/debug.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttribute.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAddRequest.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessage.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebindAuth.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConstraints.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntry.h
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteraction.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttrType.cpp
Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtResult.cpp
Examining data/openldap-2.4.56+dfsg/contrib/slapi-plugins/addrdnvalues/addrdnvalues.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapmodrdn.c
Examining data/openldap-2.4.56+dfsg/clients/tools/common.c
Examining data/openldap-2.4.56+dfsg/clients/tools/common.h
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapwhoami.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapurl.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c
Examining data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c
Examining data/openldap-2.4.56+dfsg/include/openldap.h
Examining data/openldap-2.4.56+dfsg/include/lber.h
Examining data/openldap-2.4.56+dfsg/include/sysexits-compat.h
Examining data/openldap-2.4.56+dfsg/include/ldif.h
Examining data/openldap-2.4.56+dfsg/include/avl.h
Examining data/openldap-2.4.56+dfsg/include/ldap_int_thread.h
Examining data/openldap-2.4.56+dfsg/include/ldap_pvt_uc.h
Examining data/openldap-2.4.56+dfsg/include/getopt-compat.h
Examining data/openldap-2.4.56+dfsg/include/ldap_queue.h
Examining data/openldap-2.4.56+dfsg/include/lutil_meter.h
Examining data/openldap-2.4.56+dfsg/include/lutil_hash.h
Examining data/openldap-2.4.56+dfsg/include/ldap_cdefs.h
Examining data/openldap-2.4.56+dfsg/include/ldap_pvt_thread.h
Examining data/openldap-2.4.56+dfsg/include/ac/socket.h
Examining data/openldap-2.4.56+dfsg/include/ac/termios.h
Examining data/openldap-2.4.56+dfsg/include/ac/stdarg.h
Examining data/openldap-2.4.56+dfsg/include/ac/fdset.h
Examining data/openldap-2.4.56+dfsg/include/ac/unistd.h
Examining data/openldap-2.4.56+dfsg/include/ac/errno.h
Examining data/openldap-2.4.56+dfsg/include/ac/signal.h
Examining data/openldap-2.4.56+dfsg/include/ac/bytes.h
Examining data/openldap-2.4.56+dfsg/include/ac/param.h
Examining data/openldap-2.4.56+dfsg/include/ac/dirent.h
Examining data/openldap-2.4.56+dfsg/include/ac/wait.h
Examining data/openldap-2.4.56+dfsg/include/ac/setproctitle.h
Examining data/openldap-2.4.56+dfsg/include/ac/localize.h
Examining data/openldap-2.4.56+dfsg/include/ac/stdlib.h
Examining data/openldap-2.4.56+dfsg/include/ac/time.h
Examining data/openldap-2.4.56+dfsg/include/ac/syslog.h
Examining data/openldap-2.4.56+dfsg/include/ac/alloca.h
Examining data/openldap-2.4.56+dfsg/include/ac/string.h
Examining data/openldap-2.4.56+dfsg/include/ac/ctype.h
Examining data/openldap-2.4.56+dfsg/include/ac/regex.h
Examining data/openldap-2.4.56+dfsg/include/ac/crypt.h
Examining data/openldap-2.4.56+dfsg/include/ac/assert.h
Examining data/openldap-2.4.56+dfsg/include/ac/sysexits.h
Examining data/openldap-2.4.56+dfsg/include/ldap_utf8.h
Examining data/openldap-2.4.56+dfsg/include/lutil_md5.h
Examining data/openldap-2.4.56+dfsg/include/rewrite.h
Examining data/openldap-2.4.56+dfsg/include/ldap_pvt.h
Examining data/openldap-2.4.56+dfsg/include/slapi-plugin.h
Examining data/openldap-2.4.56+dfsg/include/lutil_ldap.h
Examining data/openldap-2.4.56+dfsg/include/ldap_log.h
Examining data/openldap-2.4.56+dfsg/include/ldap_schema.h
Examining data/openldap-2.4.56+dfsg/include/lutil.h
Examining data/openldap-2.4.56+dfsg/include/lutil_lockf.h
Examining data/openldap-2.4.56+dfsg/include/lber_pvt.h
Examining data/openldap-2.4.56+dfsg/include/ldap_rq.h
Examining data/openldap-2.4.56+dfsg/include/lutil_sha1.h
Examining data/openldap-2.4.56+dfsg/include/ldap.h
Examining data/openldap-2.4.56+dfsg/include/ldap_defaults.h
Examining data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-common.h
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-bind.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c
Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c

FINAL RESULTS:

data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:918:7:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (chmod(NSLCD_SOCKET,(mode_t)0666))
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4830:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
			SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4830:4:  [5] (misc) SetSecurityDescriptorDacl:
  Never create NULL ACLs; an attacker can set it to Everyone (Deny All
  Access), which would even forbid administrator access (CWE-732).
			SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE);
data/openldap-2.4.56+dfsg/clients/tools/common.c:1565:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy( msgbuf+2, ldap_passwordpolicy_err2txt( pErr ));
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:812:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( def_urlpre, "file:///%s/",
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:882:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( urlpre, "file:///%s/",
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1391:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		outlen = snprintf( filter, max_fsize, filtpatt, value );
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:317:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(filter, filtpatt, value);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c:1783:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				ptr += snprintf( c->cr_msg, sizeof( c->cr_msg ),
data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:63:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					len = snprintf( c->cr_msg, 
data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:69:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					len = snprintf( c->cr_msg, 
data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:126:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( c->cr_msg, 
data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:139:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( c->cr_msg, sizeof( c->cr_msg ), CLOAK_USAGE
data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:151:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( c->cr_msg, sizeof( c->cr_msg ),
data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:382:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( line + lcur, buf ); \
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:614:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(ssd.bv_val, "%s ldap:///%s??%s?%s", nss_svcs[i].word.bv_val,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:634:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(map.bv_val, "%s %s %s", nss_svcs[i].word.bv_val,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:85:23:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					pi->msg.bv_len = sprintf(pi->msg.bv_val,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:131:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sdn.bv_val, "cn=%s+uid=%s,cn=%s,cn=pam,cn=auth",
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:648:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(bv[0].bv_val, "%s %s %s %s (%s@%s)",
data/openldap-2.4.56+dfsg/include/ac/crypt.h:26:16:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	extern char *(crypt)();
data/openldap-2.4.56+dfsg/include/ac/setproctitle.h:27:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		LDAP_GCCATTR((format(printf, 1, 2)));
data/openldap-2.4.56+dfsg/include/ac/unistd.h:39:56:  [4] (misc) getpass:
  This function is obsolete and not portable. It was in SUSv2 but removed by
  POSIX.2. What it does exactly varies considerably between systems,
  particularly in where its prompt is displayed and where it gets its data
  (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations
  overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do
  exactly what you want. If you continue to use it, or write your own, be
  sure to zero the password as soon as possible to avoid leaving the
  cleartext password visible in the process' address space.
LDAP_LUTIL_F(char*)(lutil_getpass) LDAP_P((const char *getpass));
data/openldap-2.4.56+dfsg/include/lber_pvt.h:61:30:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	... )) LDAP_GCCATTR((format(printf, 3, 4)));
data/openldap-2.4.56+dfsg/include/ldap_log.h:143:9:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
#define syslog	eb_syslog
data/openldap-2.4.56+dfsg/include/ldap_log.h:156:4:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
			syslog( LDAP_LEVEL_MASK((severity)), (fmt) ); \
data/openldap-2.4.56+dfsg/include/ldap_log.h:163:4:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
			syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1) ); \
data/openldap-2.4.56+dfsg/include/ldap_log.h:170:4:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
			syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2) ); \
data/openldap-2.4.56+dfsg/include/ldap_log.h:177:4:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
			syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2), (arg3) ); \
data/openldap-2.4.56+dfsg/include/ldap_log.h:184:4:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
			syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2), (arg3), (arg4) ); \
data/openldap-2.4.56+dfsg/include/ldap_log.h:191:4:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
			syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2), (arg3), (arg4), (arg5) ); \
data/openldap-2.4.56+dfsg/include/ldap_log.h:250:47:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	const char* fmt, ... )) LDAP_GCCATTR((format(printf, 3, 4)));
data/openldap-2.4.56+dfsg/include/slapi-plugin.h:90:97:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int slapi_access_allowed( Slapi_PBlock *pb, Slapi_Entry *e, char *attr, struct berval *val, int access );
data/openldap-2.4.56+dfsg/include/slapi-plugin.h:427:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	int access,
data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:113:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		vsnprintf( buf, sizeof(buf)-1, fmt, vl );
data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:137:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf( buf, sizeof(buf)-1, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:74:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf( buffer+off, sizeof(buffer)-off, fmt, vl );
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:88:8:  [4] (format) syslog:
  If syslog's format strings can be influenced by an attacker, they can be
  exploited (CWE-134). Use a constant format string for syslog.
#undef syslog
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:95:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf( buffer, sizeof(buffer), fmt, vl );
data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:802:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( (char *)sbiod->sbiod_pvt, (char *)arg );
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:65:8:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	res = vfprintf( f, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:70:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
		res = vsprintf( str, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:83:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	res = vsnprintf( str, n, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:178:12:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					s2 += sprintf(s2, fm2, ss);
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:181:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				s2 += sprintf(s2, fm2, va_arg(ap, int));
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:202:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	return vsnprintf( str, 0, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:215:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf( buf, sizeof(buf), fmt, ap );
data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:792:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			ptr += sprintf(ptr, "%s%d", sprops[i].key.bv_val, v );
data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:797:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				ptr += sprintf(ptr, "%s", sprops[i].key.bv_val );
data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:802:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			ptr += sprintf(ptr, "%s", sprops[i].key.bv_val );
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:168:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dn + loc, s);
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:280:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(request, "_ldap._tcp.%s", domain);
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:402:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        cur += sprintf(&hostlist[cur], "%s:%hu", hostent_head[i].hostname, hostent_head[i].port);
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:560:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = snprintf( svc_principal, svc_principal_size, principal_fmt, str );
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:346:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s" LDAP_DIRSEP "%s", home, file);
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:350:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s" LDAP_DIRSEP ".%s", home, file);
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:381:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(&buf[len], attrs[i].name);
data/openldap-2.4.56+dfsg/libraries/libldap/ldap-int.h:648:103:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
LDAP_F (int) ldap_log_printf LDAP_P((LDAP *ld, int level, const char *fmt, ...)) LDAP_GCCATTR((format(printf, 3, 4)));
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:549:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(*out, name);
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:939:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( *bufp + lcur, line );
data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:349:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( server.sun_path, path );
data/openldap-2.4.56+dfsg/libraries/libldap/print.c:56:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf( buf, sizeof(buf)-1, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1507:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( *referralsp, LDAP_REF_STR );
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1511:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat( *referralsp, s );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:258:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:343:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf( stderr, usage, argv[ 0 ] );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:381:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:408:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:428:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:448:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:493:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:506:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:551:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:567:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat( dn, dnsuffix );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:633:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( dnsuffix, line );
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:649:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sofar = sprintf( s, "%s://%s%s%s:%d", u->lud_scheme,
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:657:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sofar = sprintf( s, "%s://", u->lud_scheme );
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:716:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( &s[sofar], scope.bv_val );
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1443:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			p += sprintf(p, "[%s]", ludp->lud_host);
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1445:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(p, ludp->lud_host);
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:208:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf( stderr,
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:219:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf( stderr,
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:240:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				j += sprintf( errbuf + j, ", %d %s",
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4147:23:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
# define mdb_name_cpy	wcscpy
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4152:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
# define mdb_name_cpy	strcpy	/**< Copy name (#mdb_nchar_t string) */
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4191:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fname->mn_val, path);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4843:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_rmname, "Global\\MDBr%s", encbuf);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4844:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_wmname, "Global\\MDBw%s", encbuf);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4870:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_rmname, "/MDBr%s", encbuf);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4871:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(env->me_txns->mti_wmname, "/MDBw%s", encbuf);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:10121:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(buf, txnid == (txnid_t)-1 ?
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c:196:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
						printf(span>1 ? "     %9"Z"u[%"Z"d]\n" : "     %9"Z"u\n",
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:21:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:24:53:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1358:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _ucprop_size = %d;\n\n", NUMPROPS);
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1360:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint2 _ucprop_offsets[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1370:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _ucprop_ranges[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1420:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uccase_size = %ld;\n\n",
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1423:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint2 _uccase_len[2] = {%ld, %ld};\n\n",
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1425:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uccase_map[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1507:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uccomp_size = %ld;\n\n",
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1510:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uccomp_data[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1567:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _ucdcmp_size = %ld;\n\n",
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1570:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _ucdcmp_nodes[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1587:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(out, PREF "ac_uint4 _ucdcmp_decomp[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1659:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uckdcmp_size = %ld;\n\n",
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1662:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uckdcmp_nodes[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1679:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(out, PREF "ac_uint4 _uckdcmp_decomp[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1757:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uccmcl_size = %ld;\n\n", (long) ccl_used);
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1759:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _uccmcl_nodes[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1816:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _ucnum_size = %lu;\n\n",
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1819:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(out, PREF "ac_uint4 _ucnum_nodes[] = {");
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1834:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(out, PREF "short _ucnum_vals[] = {");
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:171:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, TEXT("SYSTEM\\CurrentControlSet\\Services\\"));
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:172:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(buf, lpszServiceName);
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:904:13:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	char *cr = crypt( key, salt );
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1218:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( entropy, (char *) salt );
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1219:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf( (char *) salt, sizeof(entropy), salt_format, entropy );
data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:58:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf( buf, sizeof(buf)-1, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:74:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( s, buf );
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:340:16:  [4] (tmpfile) mktemp:
  Temporary file race condition (CWE-377).
	return open ( mktemp ( template ), O_RDWR|O_CREAT|O_EXCL, 0600 );
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:404:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmp, path);
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:422:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(d->data.d_name, data.cFileName);
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:434:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dir->data.d_name, data.cFileName);
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:962:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ret = vsnprintf( buf, bufsize, fmt, ap );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:384:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf( filter, sizeof( filter ), lud->lud_filter,
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:69:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t access );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:111:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:140:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:164:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	access_level = ACL_LEVEL( access );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:205:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			access2str( access ),
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:224:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		state->as_access == access &&
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:289:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			e, desc, val, &matches, count, state, access );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:312:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	ret = ACL_GRANT( mask, access );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:316:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access2str( access ), ret ? "granted" : "denied",
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:330:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:352:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	rc = slap_access_allowed( op, e, desc, val, access, state, maskp );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:364:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:381:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	access_level = ACL_LEVEL( access );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:410:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			state->as_access == access &&
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:427:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access2str( access ), e->e_dn, attr );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:451:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				desc, val, access, state, &mask );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:457:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				desc, val, access, state, &mask );
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:477:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		access2str( access ), ret ? "granted" : "denied",
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:482:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		state->as_access = access;
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1122:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t	access )
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1131:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_mask_t	a2pmask = ACL_ACCESS2PRIV( access );
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2277:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	Debug( LDAP_DEBUG_ANY, "%s%s%s\n", access, what, who );
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2464:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
access2str( slap_access_t access )
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:399:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(d2->ad_cname.bv_val, d2->ad_type->sat_cname.bv_val);
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:434:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(lp, desc.ad_tags.bv_val);
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:1004:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( in, s );
data/openldap-2.4.56+dfsg/servers/slapd/at.c:1031:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val, ibuf );
data/openldap-2.4.56+dfsg/servers/slapd/at.c:1032:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:470:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					bv.bv_len = sprintf( bv.bv_val, "{%d}%s", i,
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:519:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					bv.bv_len = sprintf( buf, "%s %d", ps->bdp_name.bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:932:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( ps->bdp_name.bv_val, c->argv[1] );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dbcache.c:171:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( file, db->bdi_name.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dbcache.c:172:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( file+db->bdi_name.bv_len, BDB_SUFFIX );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/error.c:58:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( msg, db_strerror( rc ) );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:250:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( path, bdb->bi_dbenv_home );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:485:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( path, bdbi_databases[i].file );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:780:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( v2, version );
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c:100:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( &url.bv_val[STRLENOF( "ldap://" )], hosts[i] );
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:109:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( &url.bv_val[STRLENOF( "ldap://" )], hosts[i] );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1006:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( bv2.bv_val, bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1008:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( &bv2.bv_val[bv.bv_len + 1], bc.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1083:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				int len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:428:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( peername, "PATH=%s", sa.sa_un_addr.sun_path );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:444:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( peername, "IP=%s:%d", peeraddr,
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:451:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( peername, "IP=[%s]:%d", peeraddr,
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:465:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				      sprintf( peername, "IP=%s:%d", peeraddr,
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:470:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			      sprintf( peername, SLAP_STRING_UNKNOWN );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:310:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( res->bv_val + i, LDIF );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:325:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( name + len, suffix );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:510:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(header, HEADER "# CRC32 %08x\n", crc32(spew, len));
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:856:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( BVL_NAME( bvl ), dir->d_name );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:411:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( ptr, matched->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c:155:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( path, mdb->mi_dbenv_home );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c:420:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( v2, version );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:695:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		idx.bv_len = snprintf( idx.bv_val, sizeof( ibuf ), SLAP_X_ORDERED_FMT, i );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1393:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( bv2.bv_val, bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1395:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( &bv2.bv_val[bv.bv_len + 1], bc.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1419:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( p2, p1 );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1454:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				int len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:465:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len - 2], vtmp.bv_len + 3,
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:480:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3,
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:495:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3,
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:541:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len-1], vtmp.bv_len + 2, 
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c:173:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( &res->bv_val[diff], dc->target->mt_rwmap.rwm_suffix_massage[i+dst].bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2359:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat( dn.bv_val, monitor_subsys[ i ]->mss_name );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:152:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( sqlbuf, "CREATE DATABASE IF NOT EXISTS %s", ni->ni_dbname );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:161:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( sqlbuf, "USE %s", ni->ni_dbname );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:201:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			ptr += sprintf( ptr, "`%s` VARCHAR(%d), ",
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:180:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				*ptr += sprintf( *ptr, ", `%s` BLOB", ai->na_attr->sat_cname.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:182:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				*ptr += sprintf( *ptr, ", `%s` VARCHAR(%d)", ai->na_attr->sat_cname.bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:197:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		ptr = buf + sprintf( buf,
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:275:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( oci->no_table.bv_val, oc->soc_cname.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:395:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( oci->no_table.bv_val, oc->soc_cname.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:450:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( oci->no_table.bv_val, sname->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:477:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	ptr = buf + sprintf( buf,
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:485:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		ptr += sprintf( ptr, ", `%s` VARCHAR(%d)", ai->na_attr->sat_cname.bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:488:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			ptr += sprintf( ptr, ", INDEX (`%s`)", ai->na_attr->sat_cname.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:324:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(dptr->dn.bv_val, npdn.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:295:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( val.bv_val, "uid=%s,%s",
data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:345:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( s, pw->pw_name );
data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:347:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat( s, val.bv_val + i + 1 );
data/openldap-2.4.56+dfsg/servers/slapd/back-shell/fork.c:92:3:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execv( args[0], args );
data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:89:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bp, line );
data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:95:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bp, line );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:863:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( logbuf, sizeof( logbuf ), "val[%lu], id=" BACKSQL_IDNUMFMT,
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:1394:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf( buf, sizeof(buf),
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:283:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( buf, sizeof( buf ), 
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:288:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( buf, sizeof( buf ),
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:294:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( buf, sizeof( buf ), "%s(" /* ?) */ ,
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:170:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(oDn, oldDnP);
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:202:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	sbv.bv_len = snprintf( s, sizeof( s ), BACKSQL_IDNUMFMT, oc_map->bom_id );
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1584:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( g->ga_ndn, gr_ndn->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1632:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t access )
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1668:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if ( op->o_conn && access > ACL_NONE &&
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1670:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
						access, &acl_state ) == 0 )
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1707:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if ( op->o_conn && access > ACL_NONE &&
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1709:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
						access, &acl_state ) == 0 )
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1720:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				if ( op->o_conn && access > ACL_NONE && 
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1723:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
							access,
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1766:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t access )
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1779:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		entry_at, vals, access );
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1793:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1805:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	assert( access > ACL_NONE );
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1835:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
					NULL, access, NULL, mask ) == 0 )
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1875:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
						nval, access, NULL, mask ) == 0 )
data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:1506:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:1518:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	rc = be->bd_info->bi_access_allowed ( op, e, desc, val, access, state, maskp );
data/openldap-2.4.56+dfsg/servers/slapd/backover.c:256:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/backover.c:290:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				desc, val, access, state, maskp );
data/openldap-2.4.56+dfsg/servers/slapd/backover.c:311:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			desc, val, access, state, maskp );
data/openldap-2.4.56+dfsg/servers/slapd/backover.c:542:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access )
data/openldap-2.4.56+dfsg/servers/slapd/backover.c:569:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				entry_ndn, entry_at, vals, access );
data/openldap-2.4.56+dfsg/servers/slapd/backover.c:590:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			entry_ndn, entry_at, vals, access );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:946:18:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					bv.bv_len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1059:18:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				abv.bv_len = snprintf( ibuf, sizeof( ibuf ), SLAP_X_ORDERED_FMT, i );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1107:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						bv.bv_len = sprintf( bv.bv_val, "%d %s", si->si_num,
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1167:18:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					bv.bv_len = snprintf( bv.bv_val, sizeof( c->log ),
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1206:19:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					idx.bv_len = snprintf( idx.bv_val, sizeof( ibuf ), SLAP_X_ORDERED_FMT, i );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1902:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy( si->si_url.bv_val, c->argv[2] );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:3445:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf( out,
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:3591:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( next, numbuf );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:4590:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	ival.bv_len = snprintf( ibuf, sizeof( ibuf ), SLAP_X_ORDERED_FMT, idx );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:6630:24:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		c->value_dn.bv_len = snprintf(c->value_dn.bv_val, sizeof( c->log ), "cn=" SLAP_X_ORDERED_FMT, c->depth);
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:6673:24:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		c->value_dn.bv_len = snprintf(c->value_dn.bv_val, sizeof( c->log ), "cn=module" SLAP_X_ORDERED_FMT, i);
data/openldap-2.4.56+dfsg/servers/slapd/config.c:2227:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( line + lcur, buf ); \
data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1563:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( peername, "IP=%s:%d", peeraddr_string,
data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1570:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf( peername, "IP=[%s]:%d", peeraddr_string,
data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1582:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf( peername, "IP=%s:%d",
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:458:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val, ibuf );
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:459:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:710:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( lutil_strcopy(slapd_srvurls[i],
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:716:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( lutil_strcopy(slapd_srvurls[i],
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1210:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( ((struct sockaddr_un *)*sap)->sun_path, host );
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1427:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( (char *)url, "%s://%s/", lud->lud_scheme, lud->lud_host );
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2018:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( peername, "PATH=%s", from.sa_un_addr.sun_path );
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2057:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( peername, "IP=%s:%d", peeraddr,
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2064:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( peername, "IP=[%s]:%d", peeraddr,
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2078:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf( peername, "IP=%s:%d", peeraddr,
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:1158:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( ptr, parent_dn->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:718:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len - 2],
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:739:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( &fstr->bv_val[len - 1],
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:759:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len - 1],
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:801:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len-1],
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1255:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf( &fstr->bv_val[len-1], tmp.bv_len + 2, 
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1354:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len-2], tmp.bv_len+3,
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1372:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( &fstr->bv_val[len-1], tmp.bv_len+3,
data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1388:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len-1], tmp.bv_len+3,
data/openldap-2.4.56+dfsg/servers/slapd/limits.c:888:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	(WHATSLEFT <= (tmpLen = snprintf args) ? -1 : ((void) (ptr += tmpLen), 0))
data/openldap-2.4.56+dfsg/servers/slapd/main.c:338:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf( stderr,	
data/openldap-2.4.56+dfsg/servers/slapd/module.c:63:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( ebuf, error );
data/openldap-2.4.56+dfsg/servers/slapd/module.c:85:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( ebuf, error );
data/openldap-2.4.56+dfsg/servers/slapd/module.c:186:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( module->name, file_name );
data/openldap-2.4.56+dfsg/servers/slapd/module.c:189:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( file, file_name );
data/openldap-2.4.56+dfsg/servers/slapd/module.c:200:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( ebuf, error );
data/openldap-2.4.56+dfsg/servers/slapd/module.c:285:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ebuf, path);
data/openldap-2.4.56+dfsg/servers/slapd/module.c:295:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ebuf, name);
data/openldap-2.4.56+dfsg/servers/slapd/oc.c:870:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val, ibuf );
data/openldap-2.4.56+dfsg/servers/slapd/oc.c:871:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:67:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(tmp, om->som_oid.bv_val);
data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:71:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(tmp+suflen, oid+pos+1);
data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:211:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( ptr, om->som_subs[j].bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1305:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( rdnbuf, RDNEQ );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1307:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( nrdnbuf, RDNEQ );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1322:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( nrdn.bv_val + STRLENOF(RDNEQ), ntimestamp.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dyngroup.c:65:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( ptr, ap->ap_uri->ad_cname.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:911:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				ptr += snprintf( c->cr_msg, sizeof( c->cr_msg ),
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1073:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1083:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1096:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1105:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1113:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1125:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1135:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1176:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1186:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1216:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					snprintf( c->cr_msg, sizeof( c->cr_msg ),
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1230:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( c->cr_msg, sizeof( c->cr_msg ),
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1260:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					snprintf( c->cr_msg, sizeof( c->cr_msg ),
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1342:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( c->cr_msg, sizeof( c->cr_msg ),
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1120:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( temp, temp+ber2->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:3891:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( ptr, c->cr_msg );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:4128:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						strcpy( c->cr_msg, text );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:1021:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(nowstr_usec, nowstr);
data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:866:17:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				bv.bv_len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:650:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len - 2], vtmp.bv_len + 3,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:667:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
				snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:683:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:731:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf( &fstr->bv_val[len-1], vtmp.bv_len + 2, 
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:572:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( maxcsn->bv_val, a->a_vals[0].bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:719:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( cbuf, cf.f_av_value.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:2431:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( ptr, so->s_filterstr.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:2449:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( g2->ga_ndn, g1->ga_ndn );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/valsort.c:127:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( ptr, bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/passwd.c:600:7:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
	cr = crypt( key, salt );
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:52:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t access,
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:55:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access_allowed(op,e,desc,val,access,state) access_allowed_mask(op,e,desc,val,access,state,NULL)
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:55:86:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access_allowed(op,e,desc,val,access,state) access_allowed_mask(op,e,desc,val,access,state,NULL)
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:61:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:69:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:107:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LDAP_SLAPD_F (char *) access2str LDAP_P(( slap_access_t access ));
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:258:64:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	BerVarray *bva, AttributeType *start, AttributeType *end, int system ));
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:415:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t access
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:424:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:823:60:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	BerVarray *bva, ContentRule *start, ContentRule *end, int system ));
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:1446:60:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	BerVarray *bva, ObjectClass *start, ObjectClass *end, int system ));
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:1459:54:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	BerVarray *bva, OidMacro *start, OidMacro *end, int system ));
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:1895:50:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	BerVarray *bva, Syntax *start, Syntax *end, int system ));
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2117:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t access ));
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2123:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2182:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		len = snprintf( buf, sizeof( buf ), UI2BV_FORMAT, (ui) ); \
data/openldap-2.4.56+dfsg/servers/slapd/referral.c:115:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( &muck.bv_val[ntargetDN.bv_len-nbaseDN.bv_len],
data/openldap-2.4.56+dfsg/servers/slapd/result.c:80:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(v2, text);
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:975:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( ret->filter.bv_val, lud->lud_filter );
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1066:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( ptr, filter );
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:357:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf( stderr, fmt, ap );
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.h:94:59:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
void	debug_printf(const char *, ...) LDAP_GCCATTR((format(printf, 1, 2)));
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1375:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define ACL_ACCESS2PRIV(access)		((0x01U << ACL_LEVEL((access))) | ACL_QUALIFIERS((access)))
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1375:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define ACL_ACCESS2PRIV(access)		((0x01U << ACL_LEVEL((access))) | ACL_QUALIFIERS((access)))
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1375:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define ACL_ACCESS2PRIV(access)		((0x01U << ACL_LEVEL((access))) | ACL_QUALIFIERS((access)))
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2178:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	AttributeDescription *desc, struct berval *val, slap_access_t access,
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2185:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	BerVarray *vals, slap_access_t access ));
data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:327:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			switch ( access ) {
data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:362:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		rc = access_allowed_mask( op, ep, desc, valp, access,
data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:299:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf( leakfilename, "%s.leak", progname );
data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:1143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy( maxcsn[ sid ].bv_val, attr->a_nvals[0].bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:82:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf( fp, fmt, arglist );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/proto-slapi.h:33:144:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LDAP_SLAPI_F (int) slapi_int_access_allowed LDAP_P((Operation *op, Entry *entry, AttributeDescription *desc, struct berval *val, slap_access_t access, AccessControlState *state ));
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c:724:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t		access,
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c:742:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	rc = slapi_int_access_allowed( op, e, desc, val, access, state );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c:844:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( g->ga_ndn, gr_ndn->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2589:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	struct berval *val, int access )
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2605:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	switch ( access & SLAPI_ACL_ALL ) {
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3034:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	slap_access_t access,
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3047:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	switch ( access ) {
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2345:30:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		op2.ors_filterstr.bv_len = sprintf(op2.ors_filterstr.bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5013:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy( rnc+2, si->si_suffixm.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5207:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf( si->si_ridtxt, IDSTR "=%03d", si->si_rid );
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5802:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = snprintf( ptr, WHATSLEFT, IDSTR "=%03d " PROVIDERSTR "=%s",
data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:448:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val, ibuf );
data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:449:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/value.c:286:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy( tmp.bv_val, ibv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/value.c:303:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( tmp.bv_val, ibv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/value.c:360:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(a->a_nvals[i].bv_val, ptr );
data/openldap-2.4.56+dfsg/servers/slapd/value.c:366:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(a->a_nvals[i].bv_val, ptr);
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:133:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		ptr = strcpy( ptr, vals[n].val ) + vals[n].len;
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:171:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy( line, prev_eol ? "" : *sep ? sep : "\n" );
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:740:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(fbuf, "%.*s%d%s", flen, filter, r, ftail);
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:80:33:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define	ArgDup(x) strdup(strcat(strcat(strcpy(argbuf,"\""),x),"\""))
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:527:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( scmd, sizeof scmd, "%s" LDAP_DIRSEP SEARCHCMD,
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:588:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( rcmd, sizeof rcmd, "%s" LDAP_DIRSEP READCMD,
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:642:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( ncmd, sizeof ncmd, "%s" LDAP_DIRSEP MODRDNCMD,
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:685:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( mcmd, sizeof mcmd, "%s" LDAP_DIRSEP MODIFYCMD,
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:730:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( acmd, sizeof acmd, "%s" LDAP_DIRSEP ADDCMD,
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:773:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf( bcmd, sizeof bcmd, "%s" LDAP_DIRSEP BINDCMD,
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1109:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp( prog, args );
data/openldap-2.4.56+dfsg/clients/tools/common.c:418:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while (( i = getopt( argc, argv, options )) != EOF ) {
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:795:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if((def_tmpdir = getenv("TMPDIR")) == NULL &&
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:796:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   (def_tmpdir = getenv("TMP")) == NULL &&
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:797:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	   (def_tmpdir = getenv("TEMP")) == NULL )
data/openldap-2.4.56+dfsg/clients/tools/ldapurl.c:179:13:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		int opt = getopt( argc, argv, "S:h:p:b:a:s:f:E:H:" );
data/openldap-2.4.56+dfsg/include/getopt-compat.h:32:9:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
#define getopt lutil_getopt
data/openldap-2.4.56+dfsg/include/getopt-compat.h:36:20:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
LDAP_LUTIL_F (int) getopt LDAP_P(( int, char * const [], const char *));
data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c:51:13:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		int opt = getopt( argc, argv, "d:" );
data/openldap-2.4.56+dfsg/libraries/libldap/ftest.c:52:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while( (c = getopt( argc, argv, "d:" )) != EOF ) {
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:331:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	home = getenv("HOME");
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:382:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		value = getenv(buf);
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:669:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if( getenv("LDAPNOINIT") != NULL ) {
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:676:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char *user = getenv("USER");
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:678:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if( user == NULL ) user = getenv("USERNAME");
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:679:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if( user == NULL ) user = getenv("LOGNAME");
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:697:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char *altfile = getenv(LDAP_ENV_PREFIX "CONF");
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:710:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		char *altfile = getenv(LDAP_ENV_PREFIX "RC");
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:295:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while (( c = getopt( argc, argv, "h:d:s:p:t:T:" )) != -1 ) {
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:273:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *s = getenv( "LDAP_THREAD_DEBUG" );
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_dump.c:187:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt(argc, argv, "af:lnps:V")) != EOF) {
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:309:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt(argc, argv, "f:ns:NTV")) != EOF) {
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c:70:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((i = getopt(argc, argv, "Vaefnrs:")) != EOF) {
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:38:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:40:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:41:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:41:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:43:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/openldap-2.4.56+dfsg/libraries/liblutil/getopt.c:71:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt (int argc, char * const argv [], const char * opts)
data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite.c:133:13:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
		int opt = getopt( argc, argv, "d:f:hr:" );
data/openldap-2.4.56+dfsg/servers/slapd/main.c:466:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( (i = getopt( argc, argv,
data/openldap-2.4.56+dfsg/servers/slapd/main.c:763:8:  [3] (misc) chroot:
  chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22).
  Make sure the program immediately chdir("/"), closes file descriptors, and
  drops root privileges, and that all necessary files (and no more!) are in
  the new root.
		if ( chroot( sandbox ) ) {
data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:740:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand( getpid() );
data/openldap-2.4.56+dfsg/servers/slapd/result.c:147:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		if ( no_assert == 0 && (s = getenv( "NO_RS_ASSERT" )) && *s ) {
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/passwd-shell.c:68:18:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while (( c = getopt( argc, argv, "d" )) != EOF ) {
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:106:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    return ((random() & 0x07 ) == 0x07) /* XXX random for now */
data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:357:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( (i = getopt( argc, argv, options )) != EOF ) {
data/openldap-2.4.56+dfsg/servers/slapd/slappasswd.c:124:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while( (i = getopt( argc, argv,
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:218:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char *backend = getenv( "BACKEND" ), *specs = "", *tmp;
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:226:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( (i = getopt( argc, argv, "b:s:" )) != EOF ) {
data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:90:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( ( i = getopt( argc, argv, "CD:Ff:H:h:i:L:l:p:r:t:w:" ) ) != EOF )
data/openldap-2.4.56+dfsg/tests/progs/slapd-bind.c:123:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( ( i = getopt( argc, argv, "a:B:b:D:Ff:H:h:Ii:L:l:p:t:w:" ) ) != EOF )
data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:204:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand( pid );
data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c:84:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( ( i = getopt( argc, argv, "a:CD:e:FH:h:i:L:l:p:r:t:w:" ) ) != EOF )
data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:85:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( ( i = getopt( argc, argv, "CD:e:FH:h:i:L:l:p:r:t:w:" ) ) != EOF )
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:188:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( (i = getopt( argc, argv, "ACc:D:e:Ff:H:h:i:L:l:M:m:Np:r:t:T:w:v" )) != EOF ) {
data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:113:15:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( (i = getopt( argc, argv, "ACD:e:Ff:H:h:i:L:l:p:r:St:T:w:" )) != EOF ) {
data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:121:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( ( i = getopt( argc, argv, "Aa:b:CD:f:FH:h:i:l:L:Np:r:Ss:t:T:w:" ) ) != EOF )
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:220:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ( ( i = getopt( argc, argv, "AB:CD:d:FH:h:Ii:j:L:l:NP:p:r:St:Ww:y:" ) ) != EOF )
data/openldap-2.4.56+dfsg/clients/tools/common.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		namebuf[ MAXHOSTNAMELEN ];
data/openldap-2.4.56+dfsg/clients/tools/common.c:1512:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msgbuf[256];
data/openldap-2.4.56+dfsg/clients/tools/common.c:1569:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf( msgbuf+len,
data/openldap-2.4.56+dfsg/clients/tools/common.c:1573:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf( msgbuf+len,
data/openldap-2.4.56+dfsg/clients/tools/common.c:2033:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ BUFSIZ ], *ptr = buf;
data/openldap-2.4.56+dfsg/clients/tools/common.c:2082:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/clients/tools/common.c:2103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/clients/tools/common.c:2267:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ BUFSIZ ], *ptr = buf;
data/openldap-2.4.56+dfsg/clients/tools/common.c:2351:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				(unsigned char *) ctrls[i]->ldctl_value.bv_val,
data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ 4096 ];
data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c:179:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (( fp = fopen( infile, "r" )) == NULL ) {
data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c:143:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ttl = atoi( argv[ 2 ] );
data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c:264:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (( rejfp = fopen( rejfile, "w" )) == NULL ) {
data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c:338:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( rejbuf, rbuf, len+1 );
data/openldap-2.4.56+dfsg/clients/tools/ldapmodrdn.c:186:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (( fp = fopen( infile, "r" )) == NULL ) {
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:843:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		} else if (( fp = fopen( infile, "r" )) == NULL ) {
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:900:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (( fp = fopen( infile, "r" )) == NULL ) {
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1251:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[12];
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[BUFSIZ];
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmpfname[ 256 ];
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	url[ 256 ];
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1672:14:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
					tmpfd = mkstemp( tmpfname );
data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifReader.cpp:283:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char outbuf[value.size()];
data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteractionHandler.cpp:61:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&old_attr, &attr, sizeof(attr));
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char shortbuf[16];
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:133:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(shortbuf, "0x%03x", code);
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          filter[BUFSIZ];
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:359:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char msg[100];
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:360:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(msg, "\n    (\"search\" body line %d)",
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:733:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    free ((char *) modArray[i]->mod_vals.modv_strvals);
data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:734:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    free ((char *) modArray[i]);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newbuf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char error[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/posixgroup.c:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ 1024 ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			textbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c:880:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char			textbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:111:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->type_id)->identifier.bv_val, "type_id");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:127:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->value)->identifier.bv_val, "value");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:339:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->type_id)->identifier.bv_val, "type_id");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:352:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->value)->identifier.bv_val, "value");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:376:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->extension)->identifier.bv_val, "extension");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:649:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.teletexString)->identifier.bv_val, "teletexString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:659:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.printableString)->identifier.bv_val, "printableString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:669:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.universalString)->identifier.bv_val, "universalString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:679:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.utf8String)->identifier.bv_val, "utf8String");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:689:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.bmpString)->identifier.bv_val, "bmpString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:901:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->nameAssigner)->identifier.bv_val, "nameAssigner");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:919:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->partyName)->identifier.bv_val, "partyName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1243:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.otherName)->identifier.bv_val, "otherName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1263:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.rfc822Name)->identifier.bv_val, "rfc822Name");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1283:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.dNSName)->identifier.bv_val, "dNSName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1301:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.x400Address)->identifier.bv_val, "x400Address");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1316:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.directoryName)->identifier.bv_val, "directoryName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1334:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.ediPartyName)->identifier.bv_val, "ediPartyName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1354:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.uniformResourceIdentifier)->identifier.bv_val, "uniformResourceIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1374:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.iPAddress)->identifier.bv_val, "iPAddress");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1392:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.registeredID)->identifier.bv_val, "registeredID");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1876:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy( (&k->keyIdentifier)->identifier.bv_val, "keyIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1899:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy( (k->authorityCertIssuer)->identifier.bv_val, "authorityCertIssuer");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1920:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy( (k->authorityCertSerialNumber)->identifier.bv_val, "authorityCertSerialNumber");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:170:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->algorithm)->identifier.bv_val, "algorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:194:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->parameters)->identifier.bv_val, "parameters");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:410:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.utcTime)->identifier.bv_val, "utcTime");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:420:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.generalizedTime)->identifier.bv_val, "generalizedTime");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:610:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->extnID)->identifier.bv_val, "extnID");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:625:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->critical)->identifier.bv_val, "critical");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:638:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->extnValue)->identifier.bv_val, "extnValue");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:659:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->critical)->identifier.bv_val, "critical");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:872:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->type)->identifier.bv_val, "type");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:885:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->value)->identifier.bv_val, "value");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1092:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->notBefore)->identifier.bv_val, "notBefore");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1110:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->notAfter)->identifier.bv_val, "notAfter");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1315:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->algorithm)->identifier.bv_val, "algorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1331:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->subjectPublicKey)->identifier.bv_val, "subjectPublicKey");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2257:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->a.rdnSequence)->identifier.bv_val, "rdnSequence");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2533:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->version)->identifier.bv_val, "version");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2547:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->serialNumber)->identifier.bv_val, "serialNumber");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2562:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->signature)->identifier.bv_val, "signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2577:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->issuer)->identifier.bv_val, "issuer");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2592:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->validity)->identifier.bv_val, "validity");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2607:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->subject)->identifier.bv_val, "subject");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2622:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->subjectPublicKeyInfo)->identifier.bv_val, "subjectPublicKeyInfo");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2649:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->issuerUniqueIdentifier)->identifier.bv_val, "issuerUniqueIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2673:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->subjectUniqueIdentifier)->identifier.bv_val, "subjectUniqueIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2705:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->extensions)->identifier.bv_val, "extensions");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2725:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->version)->identifier.bv_val, "version");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3076:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->toBeSigned)->identifier.bv_val, "toBeSigned");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3091:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->signatureAlgorithm)->identifier.bv_val, "signatureAlgorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3107:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->signature)->identifier.bv_val, "signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2142:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy ( a->oid.octs, oid->octs, oid->octetLen );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_OID_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( out->bv_val + *pos, buf, rc );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( out->bv_val + *pos, buf, rc );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2283:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( out->bv_val + start_pos, at->sat_cname.bv_val, desc_size );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2305:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( out->bv_val + *pos, value_ptr, value_size );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:295:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:509:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char            oe_oid[MAX_OID_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:575:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:125:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->userCertificate)->identifier.bv_val, "userCertificate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:143:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->revocationDate)->identifier.bv_val, "revocationDate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:169:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->crlEntryExtensions)->identifier.bv_val, "crlEntryExtensions");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:696:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->version)->identifier.bv_val, "version");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:708:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->signature)->identifier.bv_val, "signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:723:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->issuer)->identifier.bv_val, "issuer");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:741:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->thisUpdate)->identifier.bv_val, "thisUpdate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:759:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->nextUpdate)->identifier.bv_val, "nextUpdate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:771:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->revokedCertificates)->identifier.bv_val, "revokedCertificates");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:806:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->crlExtensions)->identifier.bv_val, "crlExtensions");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1117:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->tbsCertList)->identifier.bv_val, "tbsCertList");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1132:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (k->signatureAlgorithm)->identifier.bv_val, "signatureAlgorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1148:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( (&k->signature)->identifier.bv_val, "signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_buf[MAX_IDENTIFIER_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1][128];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:332:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy ( bv->bv_val , "TRUE" );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:336:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy ( bv->bv_val , "FALSE" );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:599:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char oid[MAX_OID_LEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:762:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( nval->bv_val, bv.bv_val, bv.bv_len );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:169:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(fname, "r");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:371:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	buf[BUFSIZ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastbind/lastbind.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char nowstr[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:382:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ 8192 ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:833:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:835:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/alias.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/alias.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr[64];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr[64];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:213:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(ptr, fp->readbuffer.buffer + fp->readbuffer.start, count);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:225:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ptr, fp->readbuffer.buffer + fp->readbuffer.start,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:433:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fp->writebuffer.buffer + fp->writebuffer.start +
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:441:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fp->writebuffer.buffer + fp->writebuffer.start +
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:210:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(dst->bv_val+pos,"\\2a");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:214:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(dst->bv_val+pos,"\\28");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:218:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(dst->bv_val+pos,"\\29");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:222:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(dst->bv_val+pos,"\\5c");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char authid[sizeof("gidNumber=4294967295+uidNumber=424967295,cn=peercred,cn=external,cn=auth")];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char peerbuf[8];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:308:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  op->o_dn.bv_len = sprintf(authid,"gidNumber=%d+uidNumber=%d,cn=peercred,cn=external,cn=auth",
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:88:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					pi->msg.bv_len = sprintf(pi->msg.bv_val,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uidc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:222:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char svcc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ruserc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rhostc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ttyc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pwdc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uidc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char svcc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ruserc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rhostc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:350:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ttyc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:389:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:568:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char svcc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:569:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uidc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:570:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ttyc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rhostc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ruserc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:573:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sessionID[64];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timebuf[LDAP_LUTIL_GENTIME_BUFSIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:719:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uidc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char svcc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ruserc[32];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:722:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rhostc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:723:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ttyc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:725:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opwc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:726:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char npwc[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[1024],buf3[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nbuf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pbuf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[8];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[1024];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c:120:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[LUTIL_MD5_BYTES];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c:182:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest_buf[LUTIL_MD5_BYTES];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char salt_buf[APR_SALT_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/kerberos.c:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char lrealm[REALM_SZ];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/kerberos.c:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tkt[MAXHOSTNAMELEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/netscape.c:35:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char MD5digest[LUTIL_MD5_BYTES], c;
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/netscape.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[LUTIL_MD5_BYTES*2];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char salt_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_SALT_SIZE) + 1];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dk_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_MAX_DK_SIZE) + 1];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:146:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char salt_value[PBKDF2_SALT_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:148:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dk_value[PBKDF2_MAX_DK_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:268:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char salt_value[PBKDF2_SALT_SIZE + 1];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char salt_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_SALT_SIZE) + 1];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:271:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dk_value[PBKDF2_MAX_DK_SIZE + 1];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dk_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_MAX_DK_SIZE) + 1];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:273:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char input_dk_value[PBKDF2_MAX_DK_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:338:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	iteration = atoi(passwd->bv_val);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:178:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MEMCPY_BCOPY(d,s,l)	memcpy((d), (s), (l))
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:182:29:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MEMCPY_BCOPY(d,s,l)	bcopy((s), (d), (l))
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:657:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGTH]) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:988:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char* SHA512_Data(const sha2_byte* data, size_t len, char digest[SHA512_DIGEST_STRING_LENGTH]) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:1063:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char* SHA384_Data(const sha2_byte* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH]) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:47:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash256[SHA256_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          saltdata[SHA2_SALT_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash256[SHA256_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:95:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash384[SHA384_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          saltdata[SHA2_SALT_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:124:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash384[SHA384_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:143:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash512[SHA512_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          saltdata[SHA2_SALT_SIZE];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:172:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char hash512[SHA512_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:230:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHAdigest[SHA256_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:274:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHAdigest[SHA256_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:318:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHAdigest[SHA384_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:362:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHAdigest[SHA384_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:406:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHAdigest[SHA512_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:450:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHAdigest[SHA512_DIGEST_LENGTH];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:71:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char DES_cblock[8];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:165:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char in[HASHLEN],
data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UcasePassword[15];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hbuf[HASHLEN];
data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:520:30:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		ml->sml_values[0].bv_len = sprintf(ml->sml_values[0].bv_val,
data/openldap-2.4.56+dfsg/include/ac/dirent.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_PATH+1];
data/openldap-2.4.56+dfsg/include/ac/string.h:43:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#		undef memcpy
data/openldap-2.4.56+dfsg/include/ac/string.h:44:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#		define memcpy(d, s, n)		((void) bcopy ((s), (d), (n)))
data/openldap-2.4.56+dfsg/include/ac/string.h:44:36:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#		define memcpy(d, s, n)		((void) bcopy ((s), (d), (n)))
data/openldap-2.4.56+dfsg/include/ac/string.h:46:37:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#		define memmove(d, s, n)		((void) bcopy ((s), (d), (n)))
data/openldap-2.4.56+dfsg/include/ac/string.h:79:34:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#		define SAFEMEMCPY( d, s, n ) 	bcopy((s), (d), (n))
data/openldap-2.4.56+dfsg/include/ac/string.h:82:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#		define SAFEMEMCPY( d, s, n )	memcpy((d), (s), (n))
data/openldap-2.4.56+dfsg/include/avl.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		avl_bits[2];
data/openldap-2.4.56+dfsg/include/lber_pvt.h:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[size]; \
data/openldap-2.4.56+dfsg/include/lutil.h:217:1:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
mkstemp LDAP_P (( char * template ));
data/openldap-2.4.56+dfsg/include/lutil_hash.h:41:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[LUTIL_HASH_BYTES],
data/openldap-2.4.56+dfsg/include/lutil_md5.h:34:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char in[64];
data/openldap-2.4.56+dfsg/include/lutil_md5.h:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[16],
data/openldap-2.4.56+dfsg/include/lutil_md5.h:55:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char in[64]));
data/openldap-2.4.56+dfsg/include/lutil_sha1.h:42:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buffer[64];
data/openldap-2.4.56+dfsg/include/lutil_sha1.h:47:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	LDAP_P((uint32 state[5], const unsigned char buffer[64]));
data/openldap-2.4.56+dfsg/include/lutil_sha1.h:59:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	LDAP_P((unsigned char digest[20], lutil_SHA1_CTX *context));
data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[BP_LEN];
data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[132];
data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:268:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( buf, "ber_dump: buf=%p ptr=%p end=%p len=%ld\n",
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[4096];
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:56:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		log_file = fopen( LDAP_RUNDIR LDAP_DIRSEP "openldap.log", "w" );
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:59:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			log_file = fopen( "openldap.log", "w" );
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:68:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buffer, "%08x ", (unsigned) time(0L));
data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[4096];
data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:71:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				ptr += sprintf( ptr, "%u", val1 );
data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:73:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			ptr += sprintf( ptr, ".%lu", val );
data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:328:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( buf, bv.bv_val, bv.bv_len );
data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:500:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( bv->bv_val, data, bv->bv_len );
data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:537:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( bv->bv_val, data, bv->bv_len );
data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:629:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( *buf, data.bv_val, data.bv_len );
data/openldap-2.4.56+dfsg/libraries/liblber/dtest.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128];
data/openldap-2.4.56+dfsg/libraries/liblber/dtest.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fmt[2];
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:176:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sign, data[TAGBUF_SIZE+1 + OCTET_SIZE(ber_int_t)], *ptr;
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:230:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char header[HEADER_SIZE], *ptr;
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:285:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	unusedbits, header[HEADER_SIZE + 1], *ptr;
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:313:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[TAGBUF_SIZE + 1], *ptr;
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:331:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char data[TAGBUF_SIZE + 2], *ptr;
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:350:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char xtagbuf[TAGBUF_SIZE + 1];	/* room for tag + len(tag or len) */
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char padding[SOS_LENLEN-1];	/* for final length encoding */
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:454:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( SOS_TAG_END(header), lenptr, SOS_LENLEN );
data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:54:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[1024];
data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:86:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (( fd = open( "lber-test", O_WRONLY|O_CREAT|O_TRUNC|O_BINARY ))
data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fmt[2];
data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:129:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rc = ber_printf( ber, fmt, atoi(buf) );
data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:152:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tag = atoi(buf);
data/openldap-2.4.56+dfsg/libraries/liblber/io.c:526:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[sizeof(ber->ber_len)-1];
data/openldap-2.4.56+dfsg/libraries/liblber/lber-int.h:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				sb_ungetbuf[8];
data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:57:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	bmu_char[4];
data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:82:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char toppattern[4] = { 0xde, 0xad, 0xba, 0xde };
data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:84:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char endpattern[4] = { 0xd1, 0xed, 0xde, 0xca };
data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[LBER_MIN_BUFF_SIZE];
data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:827:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ebuf[128];
data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:852:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ebuf[128];
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8192];
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fm2[64];
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8192];
data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char my_hostname[HOST_NAME_MAX + 1];
data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:481:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char authid[sizeof("gidNumber=4294967295+uidNumber=4294967295,"
data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:483:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf( authid, "gidNumber=%u+uidNumber=%u,"
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:165:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(dn + loc, "dc=");
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[MAXHOST];
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:267:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char reply[DNSBUFSIZ];
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[DNSBUFSIZ];
data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c:59:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			debug = atoi( optarg );
data/openldap-2.4.56+dfsg/libraries/libldap/fetch.c:82:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		url = fopen( p, "rb" );
data/openldap-2.4.56+dfsg/libraries/libldap/fetch.c:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/openldap-2.4.56+dfsg/libraries/libldap/free.c:101:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		LDAP_FREE( (char *) mods[i] );
data/openldap-2.4.56+dfsg/libraries/libldap/ftest.c:55:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			debug = atoi( optarg );
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[256];
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:192:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[256];
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:227:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(b + 4, wrapped.value, wrapped.length);
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:271:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[256];
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:299:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(b, unwrapped.value, unwrapped.length);
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:353:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[256];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char linebuf[ AC_LINE_MAX ];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:172:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(file, "r");
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:244:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				p = &((char *) gopts)[attrs[i].offset];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:259:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							p = &((char *) gopts)[attrs[i].offset];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:267:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				p = &((char *) gopts)[attrs[i].offset];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_LDAP_ATTR_LEN+MAX_LDAP_ENV_PREFIX_LEN];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:402:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			p = &((char *) gopts)[attrs[i].offset];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:403:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			* (int*) p = atoi(value);
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:414:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						p = &((char *) gopts)[attrs[i].offset];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:422:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			p = &((char *) gopts)[attrs[i].offset];
data/openldap-2.4.56+dfsg/libraries/libldap/ldap_sync.c:598:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:58:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char nib2b64[0x40] =
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:61:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char b642nib[0x80] = {
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:514:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[3];
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:783:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fp = fopen( file, mode );
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:822:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char        line[LDIF_MAXLINE], *nbufp;
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:550:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char serv[7];
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:637:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char addr[INET6_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:646:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char addr[INET_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:718:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char address[INET_ADDR_LEN];
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:825:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hbuf[NI_MAXHOST];
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:827:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hbuf[MAXHOSTNAMELEN];
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:829:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hbuf[256];
data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ebuf[128]; \
data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:212:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					unsigned char control[CMSG_SPACE(sizeof(int))];
data/openldap-2.4.56+dfsg/libraries/libldap/ppolicy.c:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof("-2147483648")];
data/openldap-2.4.56+dfsg/libraries/libldap/ppolicy.c:238:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( buf, ctrl->ldctl_value.bv_val, ctrl->ldctl_value.bv_len );
data/openldap-2.4.56+dfsg/libraries/libldap/print.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ 1024 ];
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:860:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   	char		timebuf[32];
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:332:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1302:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*len = atoi(*sp);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2291:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					    	at->at_syntax_len = atoi(sp);
data/openldap-2.4.56+dfsg/libraries/libldap/search.c:352:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ BUFSIZ ], *ptr = " *";
data/openldap-2.4.56+dfsg/libraries/libldap/search.c:445:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char escape[128] = {
data/openldap-2.4.56+dfsg/libraries/libldap/t61.c:108:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef wchar_t wvec16[16];
data/openldap-2.4.56+dfsg/libraries/libldap/t61.c:109:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef wchar_t wvec32[32];
data/openldap-2.4.56+dfsg/libraries/libldap/t61.c:110:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef wchar_t wvec64[64];
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:75:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buf[256];
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:125:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (( fp = fopen( path, "r" )) == NULL ) {
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:170:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buf[256];
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:181:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tmp.mod_op = atoi( buf );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:249:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	dn[256], passwd[256];
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[256], command1, command2, command3;
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		passwd[64], dn[256], rdn[64], attr[64], value[256];
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filter[256], *host, **types;
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:299:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ldap_debug = atoi( optarg );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:319:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			port = atoi( optarg );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:358:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ( ( ld->ld_sb->sb_fd = open( copyfname, O_WRONLY|O_CREAT|O_EXCL,
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:394:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				id = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:461:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ldap_debug = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:482:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ld->ld_msgid = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:487:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ld->ld_version = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:531:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					id = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:537:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					all = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:570:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			scope = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:576:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			attrsonly = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:589:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			timeout.tv_sec = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:638:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ld->ld_deref = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:640:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ld->ld_timelimit = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:642:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ld->ld_sizelimit = atoi( line );
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:648:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if ( atoi( line ) != 0 ) {
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:652:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				if ( atoi( line ) != 0 ) {
data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c:383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256], *msg;
data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c:449:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[256], *msg;
data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c:1215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char oids[8192], *oidptr = oids, *oidbuf = NULL;
data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ebuf[128];
data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:152:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open( path, O_RDONLY );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char altname[NI_MAXHOST];
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:504:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
nss_parse_ciphers(const char *cipherstr, int cipher_list[ciphernum])
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:913:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char phrase[200];
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:1651:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *securitydirs[3];
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2653:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( buf, msg, len );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2818:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[2048];
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2842:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( buf, av->data, len );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:531:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char err[256] = "";
data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:1242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[200];
data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:1302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[MAXPATHLEN];
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1420:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, *p, buf[32];	/* big enough to hold a long decimal # (overkill) */
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1433:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			size += sprintf(buf, ":%d", ludp->lud_port);
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1449:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			p += sprintf(p, ":%d", ludp->lud_port);
data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[6];				/* Large enough for biggest multibyte char */
data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:843:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *fqdn, hostbuf[MAXHOSTNAMELEN+1];
data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:915:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			return (char *) _(values[i].msg);
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errbuf[200];
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:738:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[40];
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:811:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[40], buf2[40];
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:832:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[40], buf2[40];
data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:861:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[40], buf2[40];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:586:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define DKBUF	char kbuf[DKBUF_MAXKEYSIZE*2+1]
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:707:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[(sizeof(MDB_rxbody)+CACHELINE-1) & ~(CACHELINE-1)];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:732:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	mtb_rmname[MNAME_LEN];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:761:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[(sizeof(MDB_txbody)+CACHELINE-1) & ~(CACHELINE-1)];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:765:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mt2_wmname[MNAME_LEN];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:771:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[(MNAME_LEN+CACHELINE-1) & ~(CACHELINE-1)];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:919:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		mn_data[1];			/**< key and data are appended here */
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1061:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		mm_pad[PAGEHDRSZ];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MSGSIZE+PADSIZE], *ptr = buf;
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1539:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[400];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1540:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.100s:%d: Assertion '%.200s' failed in %.40s()",
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1584:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		ptr += sprintf(ptr, "%02x", *c++);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1586:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.*s", key->mv_size, key->mv_data);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1594:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char *const tp[2][2] = {{"", ": DB"}, {": sub-page", ": sub-DB"}};
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2337:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, (lower + PAGEBASE + (Align-1)) & -Align);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2338:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((pgno_t *)((char *)dst+upper), (pgno_t *)((char *)src+upper),
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2341:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, psize - unused);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2381:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(np, mp, num * env->me_psize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2775:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(txn->mt_dbiseqs, env->me_dbiseqs, env->me_maxdbs * sizeof(unsigned int));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2779:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(txn->mt_dbs, meta->mm_dbs, CORE_DBS * sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2888:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(txn->mt_dbs, parent->mt_dbs, txn->mt_numdbs * sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2899:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(env->me_pghead, ntxn->mnt_pgstate.mf_pghead, size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:3186:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(data.mv_data, free_pgs, data.mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:3500:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(parent->mt_dbs, txn->mt_dbs, txn->mt_numdbs * sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4292:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fname->mn_val, which & MDB_O_MASK, mode);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4367:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+7);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4371:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+7);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4376:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				i = atoi(uts.release+2);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4380:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+4);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4384:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					i = atoi(uts.release+4);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4825:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char encbuf[11];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4856:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char encbuf[11];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:5645:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&flags, ((char *) data.mv_data + offsetof(MDB_db, md_flags)),
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:5652:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(mc->mc_db, data.mv_data, sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6700:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ptr, key->mv_data, ksize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6761:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				dkey.mv_data = memcpy(fp+1, olddata.mv_data, olddata.mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6842:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(METADATA(mp), METADATA(fp), NUMKEYS(fp) * fp->mp_pad);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6844:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((char *)mp + mp->mp_upper + PAGEBASE, (char *)fp + fp->mp_upper + PAGEBASE,
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6846:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy((char *)(&mp->mp_ptrs), (char *)(&fp->mp_ptrs), NUMKEYS(fp) * sizeof(mp->mp_ptrs[0]));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6912:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy((size_t *)((char *)np + off),
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6916:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(np, omp, sz); /* Copy beginning of page */
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6923:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(METADATA(omp), data->mv_data, data->mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6937:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(olddata.mv_data, data->mv_data, data->mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6939:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(NODEKEY(leaf), key->mv_data, key->mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7038:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(db, &mc->mc_xcursor->mx_db, sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7060:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					data[0].mv_data = (char *)data[0].mv_data + data[0].mv_size;
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7122:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(db, &mc->mc_xcursor->mx_db, sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7310:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, key->mv_data, ksize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7370:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NODEKEY(node), key->mv_data, key->mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7376:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ndata, data->mv_data, sizeof(pgno_t));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7380:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ndata, data->mv_data, data->mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7382:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ndata, &ofp->mp_pgno, sizeof(pgno_t));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7387:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ndata, data->mv_data, data->mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7546:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&mx->mx_db, NODEDATA(node), sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7783:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char kbuf2[DKBUF_MAXKEYSIZE*2+1];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7829:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NODEKEY(node), key->mv_data, key->mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8717:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(rp->mp_ptrs, split, rsize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8720:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ins, newkey->mv_data, ksize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8725:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(rp->mp_ptrs, split, x * ksize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8727:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ins, newkey->mv_data, ksize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8728:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ins+ksize, split + x * ksize, rsize - x * ksize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8924:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(NODEPTR(mp, nkeys-1), NODEPTR(copy, nkeys-1),
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9063:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *mc_wbuf[2];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9064:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *mc_over[2];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9241:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(NODEDATA(ni), &my->mc_next_pgno, sizeof(pgno_t));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9252:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(mo, omp, my->mc_env->me_psize);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9281:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(NODEDATA(ni), &db, sizeof(db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9857:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&txn->mt_dbs[slot], data.mv_data, sizeof(MDB_db));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:10108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:10303:10:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		need = MultiByteToWideChar(CP_UTF8, 0, src, -1, result, need);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_dump.c:282:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str, key.mv_data, key.mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:75:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			version=atoi((char *)dbuf.mv_data+STRLENOF("VERSION="));
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c:235:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str, key.mv_data, key.mv_size);
data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.c:180:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ids[ids[0]+1], &app[1], app[0] * sizeof(MDB_ID));
data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.h:68:34:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MDB_IDL_CPY( dst, src ) (memcpy( dst, src, MDB_IDL_SIZEOF( src ) ))
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32] = "";
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:60:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:91:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sval, "%03x ", values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32] = "";
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:63:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:90:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x ", values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kval[sizeof(int)];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:68:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(kval, "%03x", values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:69:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:94:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kval, "%03x", values[i & ~0x0f]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:95:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[8];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kval[sizeof(int)];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:64:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(kval, "001");
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:66:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%07x", values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:98:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sval, "%07x", values[3]+1);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:103:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sval, "%07x", values[255]+1);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:108:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sval, "%07x", values[500]+1);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:130:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%07x", values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sval[32];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kval[sizeof(int)];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:69:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(kval, "%03x", values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:70:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:96:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kval, "%03x", values[i & ~0x0f]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:97:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:27:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char dkbuf[1024];
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:64:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%08x", kval);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:71:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%08x", kval);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:78:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%08x", kval);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:100:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(kval, "%03x", values[i & ~0x0f]);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:101:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sval, "%03x %d foo bar", values[i], values[i]);
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *fp, *dp, *pp, path[BUFSIZ];
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c:113:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((f = fopen(path, mode)) != 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c:215:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    fread((char *) _ucprop_ranges, sizeof(ac_uint4),
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:508:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              realloc((char *) (*pdecomps)[i].decomp,
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:518:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    (void) AC_MEMCPY((char *) (*pdecomps)[i].decomp, (char *) dectmp,
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:828:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[512], *s, *e, *first_prop;
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[512], *s;
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[BUFSIZ];
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1314:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "w")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1321:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "wb")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1406:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          fwrite((char *) proptbl[i].ranges, sizeof(ac_uint4),
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1454:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "wb")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1531:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "wb")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1607:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "wb")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1643:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          fwrite((char *) decomps[i].decomp, sizeof(ac_uint4),
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1700:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "wb")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1736:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          fwrite((char *) kdecomps[i].decomp, sizeof(ac_uint4),
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1780:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "wb")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1854:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(path, "wb")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1926:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                if ((in = fopen(argv[0], "r")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1942:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if ((in = fopen(argv[0], "r")) == 0)
data/openldap-2.4.56+dfsg/libraries/liblunicode/ucstr.c:182:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out, s, outpos);
data/openldap-2.4.56+dfsg/libraries/liblutil/avl.c:188:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pdir[MAX_TREE_DEPTH];
data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:93:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ( (sd = open( "/dev/null", O_RDWR   )) == -1 &&
data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:94:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			 (sd = open( "/dev/null", O_RDONLY )) == -1 &&
data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:96:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			 (sd = open( "/",         O_RDONLY )) == -1    ) {
data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:133:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ( (sd = open( "/dev/tty", O_RDWR )) != -1 ) {
data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c:59:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open( URANDOM_DEVICE, O_RDONLY );
data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c:140:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char digest[16];
data/openldap-2.4.56+dfsg/libraries/liblutil/getopt.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *ptr, outbuf[4096];
data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c:72:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char pbuf[PBUF];
data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c:90:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fi = fopen(TTY, "r")) == NULL)
data/openldap-2.4.56+dfsg/libraries/liblutil/md5.c:309:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char checksum[LUTIL_MD5_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/meter.c:54:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( dest, "none" );
data/openldap-2.4.56+dfsg/libraries/liblutil/meter.c:281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char time_buffer[19];
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:80:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char regpath[132];
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[255];
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:356:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char vValue[1024];
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *Inserts[5];
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:494:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char msgBuf[1024];
data/openldap-2.4.56+dfsg/libraries/liblutil/passfile.c:39:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *f = fopen( filename, "r" );
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:57:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char des_data_block[8];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:493:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHA1digest[LUTIL_SHA1_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:538:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SHA1digest[LUTIL_SHA1_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:580:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char MD5digest[LUTIL_MD5_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:625:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char MD5digest[LUTIL_MD5_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:669:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(key, keyData, 8);
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:823:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char k[8];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UcasePassword[15];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:850:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PasswordHash[33], storedPasswordHash[33];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:883:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( PasswordHash, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", 
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1033:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   SHA1digest[LUTIL_SHA1_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1034:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            saltdata[SALT_SIZE];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1064:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   SHA1digest[LUTIL_SHA1_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1085:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   MD5digest[LUTIL_MD5_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1086:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            saltdata[SALT_SIZE];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1116:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char   MD5digest[LUTIL_MD5_BYTES];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UcasePassword[15];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PasswordHash[33];
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1170:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( PasswordHash, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", 
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1190:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char salt[32];	/* salt suitable for most anything */
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char entropy[sizeof(salt)];
data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char input[1024];
data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ 1024 ];
data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:185:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char finalcount[8];
data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:242:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[20];
data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:260:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buffer[BUFSIZ];
data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:266:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(filename,O_RDONLY)) < 0)
data/openldap-2.4.56+dfsg/libraries/liblutil/tavl.c:197:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char pdir[MAX_TREE_DEPTH];
data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	command[ 10 ];
data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[ 80 ];
data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	command[ 10 ];
data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[ 80 ];
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:337:5:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
int mkstemp( char * template )
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:340:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	return open ( mktemp ( template ), O_RDWR|O_CREAT|O_EXCL, 0600 );
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_PATH+1];
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:393:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32768];
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:751:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tbuf[HEXMAX+1];
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:762:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( tbuf, pin, chunk );
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:782:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmpbuf[64], *tmp;
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:786:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tbuf[DECMAX+1];
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:811:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( tbuf, pin, chunk );
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:65:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char zero[6];
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:66:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char eaddr[6];
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(struct ifreq) * 32];
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:428:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf1[8], buf2[64];
data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				*lm_attrs[ 2 ];
data/openldap-2.4.56+dfsg/libraries/librewrite/parse.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ 1024 ];
data/openldap-2.4.56+dfsg/libraries/librewrite/parse.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[11];
data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite.c:149:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fin = fopen( optarg, "r" );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:137:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		map->lm_args = ( void * )fopen( filename, "r" );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024];
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:366:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filter[1024];
data/openldap-2.4.56+dfsg/servers/slapd/aci.c:401:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ ACI_BUF_SIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/aci.c:819:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			accessmaskbuf[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/aci.c:820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			accessmaskbuf1[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				accessmaskbuf[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				accessmaskbuf[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:856:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		accessmaskbuf[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1262:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1299:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1362:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1378:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char		buf[STRLENOF("255.255.255.255") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1423:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char		buf[STRLENOF("FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1507:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1657:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:2651:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newbuf[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/acl.c:2670:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char error[ACL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char error[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:213:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		dnbuf[SLAP_LDAPDN_MAXLEN + 2];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		rebuf[SLAP_LDAPDN_MAXLEN + 1];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:518:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:537:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char	err[SLAP_TEXT_BUFLEN],
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:577:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:593:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:608:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:649:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:696:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char	err[ SLAP_TEXT_BUFLEN ],
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1064:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1081:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1233:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1251:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1279:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2592:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2606:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char maskbuf[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2724:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2730:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2736:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2742:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tagbuf[MAX_TAGS_LEN];
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:1143:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen( fname, "r" );
data/openldap-2.4.56+dfsg/servers/slapd/add.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/add.c:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/add.c:591:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/add.c:592:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/add.c:642:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:250:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char slotbuf [ALOCK_SLOT_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:298:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char slotbuf [ALOCK_SLOT_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:415:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	info->al_fd = open (filename, O_CREAT|O_RDWR, 0666);
data/openldap-2.4.56+dfsg/servers/slapd/at.c:987:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[32];
data/openldap-2.4.56+dfsg/servers/slapd/at.c:1027:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			idx.bv_len = sprintf(idx.bv_val, "{%d}", i);
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/add.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/back-bdb.h:262:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	((db)->open)(db, file, name, type, flags, mode)
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/back-bdb.h:293:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	((db)->open)(db, NULL, file, name, type, flags, mode)
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:343:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					FILE *f = fopen( bdb->bi_db_config_path, "w" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:383:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:396:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:442:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:443:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				FILE *f = fopen( bdb->bi_db_config_path, "r" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:513:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:781:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen( bdb->bi_db_config_path, "a" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:818:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( ptr, "DUMMY" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:819:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen( testpath, "w" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:843:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( ptr, "DB_CONFIG" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:845:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen( bdb->bi_db_config_path, "r" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:919:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		s = atoi(c->argv[2]);
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/delete.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:412:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nrdnlen[2];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:413:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nrdn[1];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rdn[1];                        /* variable placement */
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:415:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char entryID[sizeof(ID)];  /* variable placement */
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:615:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dlen[2];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:639:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( d->nrdn, BEI(e)->bei_nrdn.bv_val, BEI(e)->bei_nrdn.bv_len+1 );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:711:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char dlen[2];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/error.c:56:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char msg[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/id2entry.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:284:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "[%02x%02x%02x%02x]", c[0], c[1], c[2], c[3] );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:545:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char keybuf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:708:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:919:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAXPATHLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:184:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( ptr, "__db.001" );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:330:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	rc = (bdb->bi_dbenv->open)( bdb->bi_dbenv, dbhome,
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:774:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char v2[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modify.c:452:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modrdn.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*argv[ 3 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:398:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		path[ MAXPATHLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:646:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		count_buf[ BDB_MONITOR_IDX_TYPES ][ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/nextid.c:40:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char idbuf[sizeof(ID)];
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/tools.c:31:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ehbuf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c:99:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( url.bv_val, "ldap://" );
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:108:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( url.bv_val, "ldap://" );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[ sizeof("BAPTIENSC") ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:1099:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:1168:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:2992:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:615:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ BUFSIZ * 2 ],
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:954:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*argv[ 3 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1060:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1282:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1294:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1306:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1396:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[AC_LINE_MAX];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:410:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr[INET6_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peername[MAXPATHLEN + sizeof("PATH=")];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peername[sizeof("IP=255.255.255.255:65336")];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:841:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*argv[ 3 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/search.c:934:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*attr[3], **attrp = NULL;
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:428:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open( path, O_RDONLY );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:508:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header[sizeof(HEADER "# CRC32 12345678\n")];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:560:31:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	fd = tmpfname == NULL ? -1 : mkstemp( tmpfname );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1606:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[128];
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1631:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/add.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/back-mdb.h:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pad[(sizeof(IndexRbody)+CACHELINE-1) & (!CACHELINE-1)];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:281:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:572:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( ptr, "DUMMY" );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:573:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen( testpath, "w" );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/delete.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char nrdnlen[2];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nrdn[1];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rdn[1];                        /* variable placement */
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char entryID[sizeof(ID)];  /* variable placement */
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:117:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( ptr, &e->e_id, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:119:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( ptr, &nsubs, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( ptr, &pid, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:169:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( &nid, ptr, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:174:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( p2, data.mv_data, rlen+2 );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:182:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( &subs, ptr, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:185:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( p2, data.mv_data, data.mv_size - sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:186:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( p2+data.mv_size - sizeof( ID ), &subs, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:228:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( &nid, key.mv_data, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:250:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( &nid, ptr, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:255:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( p2, data.mv_data, rlen+2 );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:263:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( &subs, ptr, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:266:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( p2, data.mv_data, data.mv_size - sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:267:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( p2+data.mv_size - sizeof( ID ), &subs, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dn[SLAP_LDAPDN_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:368:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &nid, ptr, sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:403:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( nsubs, ptr, sizeof( ID ));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:491:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &nid, ptr, sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:564:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dn[SLAP_LDAPDN_MAXLEN], ndn[SLAP_LDAPDN_MAXLEN], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:589:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &id, ptr, sizeof(ID) );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:599:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( nptr, d->nrdn, nrlen+1 );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:600:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( dptr, d->nrdn+nrlen+1, rlen+1 );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:609:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( name->bv_val, dn, name->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:611:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( nname->bv_val, ndn, nname->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:679:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( &id, ptr, sizeof(ID) );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:774:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &id, ptr, sizeof(ID) );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:839:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &id, ptr, sizeof(ID) );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:884:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( &isc->id, ptr, sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:889:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( &nsubs, ptr, sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:968:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( ptr, data.mv_data, nrlen+2 );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/id2entry.c:635:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ptr, a->a_vals[i].bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/id2entry.c:643:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ptr, a->a_nvals[i].bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:254:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( buf, "[%02x%02x%02x%02x]", c[0], c[1], c[2], c[3] );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char keybuf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:338:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( i, data.mv_data, data.mv_size );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:410:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:430:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key.mv_data, keys[k].bv_val, keys[k].bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:441:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&lo, data.mv_data, sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:569:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[16];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:588:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key.mv_data, keys[k].bv_val, keys[k].bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:598:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &tmp, data.mv_data, sizeof(ID) );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c:414:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char v2[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/key.c:53:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(kbuf, k->bv_val, k->bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modify.c:451:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modrdn.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:273:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*argv[ 3 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:481:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		path[ MAXPATHLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:729:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		count_buf[ MDB_MONITOR_IDX_TYPES ][ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:286:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( cursor, key.mv_data, sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:354:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( &ww->key, key.mv_data, sizeof(ID) );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:357:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ww->data.mv_data, data.mv_data, data.mv_size);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1008:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(d, isc.rdns[i].bv_val, isc.rdns[i].bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1011:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(n, isc.nrdns[i].bv_val, isc.nrdns[i].bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1018:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(d, isc.rdns[i].bv_val, isc.rdns[i].bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1021:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(n, isc.nrdns[i].bv_val, isc.nrdns[i].bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1028:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(d, pdn.bv_val, pdn.bv_len+1);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1029:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(n, pndn.bv_val, pndn.bv_len+1);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1238:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( ic->kstr.bv_val, itmp.kstr.bv_val, ic->kstr.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rdn[512];
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1402:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&id, ptr, sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1404:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stack[depth].rdn, data.mv_data, data.mv_size);
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1428:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr, &num[depth], sizeof(ID));
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:98:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:701:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[STRLENOF("4294967295U") + 1] = { 0 };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:766:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:841:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[STRLENOF("4294967295U") + 1] = { 0 };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:1193:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/candidates.c:257:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*rargv[ 3 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:677:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ibuf[32], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:907:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char regerr[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1189:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1437:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1653:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[AC_LINE_MAX];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2198:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char regerr[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2560:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	binddn[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2795:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *argv[5];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:3294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *rargv[ 5 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:303:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:728:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1234:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char buf[STRLENOF("4294967295U") + 1] = { 0 };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1726:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buf[STRLENOF("4294967295U") + 1] = { 0 };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1747:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[STRLENOF("4294967295U") + 1] = { 0 };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1757:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[STRLENOF("4294967295U") + 1] = { 0 };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1868:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/init.c:242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ SLAP_TEXT_BUFLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ SLAP_TEXT_BUFLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:263:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:939:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	cnd[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1397:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1759:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1858:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					free( (char *)candidates[ i ].sr_matched );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1884:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					free( (char *)candidates[ i ].sr_matched );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1984:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			free( (char *)candidates[ i ].sr_matched );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1989:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			ldap_memfree( (char *)candidates[ i ].sr_text );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:2153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:2371:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/backend.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char 		buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/backend.c:118:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ SLAP_LDAPDN_MAXLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:239:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[LDAP_PVT_INTTYPE_CHARS(long)];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf2[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf3[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:589:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:995:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:995:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1043:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1502:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1553:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2017:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*argv[ 3 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2041:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			((AttributeDescription **)&(((char *)mi)[ mat[ i ].offset ]));
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2057:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			((ObjectClass **)&(((char *)mi)[ moc[ i ].offset ]));
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2254:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2358:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( dn.bv_val, "cn=" );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/listener.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char 		buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/log.c:174:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char	textbuf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/overlay.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char 		buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/overlay.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ SLAP_LDAPDN_MAXLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/rww.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		buf[LDAP_PVT_INTTYPE_CHARS(long)];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/thread.c:132:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char	buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/thread.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 			buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ BACKMONITOR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/add.cpp:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/back-ndb.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nr_buf[NDB_MAX_RDNS][NDB_RDN_LEN+1];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp:140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[BUFSIZ];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp:239:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ai->na_len = atoi( c->argv[2] );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/delete.cpp:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sqlbuf[BUFSIZ], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:171:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	ptr += sprintf( ptr, "CREATE TABLE IF NOT EXISTS " DN2ID_TABLE " ("
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:217:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( ptr, ") ENGINE=ndb" );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modify.cpp:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modrdn.cpp:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:473:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[65538], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:670:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy( ptr, an[j]->a_vals[i].bv_val, an[j]->a_vals[i].bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:795:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char abuf[65536], *ptr, **attrs = NULL;
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:896:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				buf = (unsigned char *)attrs[k];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:933:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				buf = (unsigned char *)attrs[k++];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1102:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( rdns->nr_buf[i]+1, beg, len );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dummy[2] = {0,0};
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *ptr, buf[sizeof(MedVar)];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1225:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *ptr, buf[sizeof(MedVar)];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1237:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( ptr, a->a_vals[0].bv_val, len );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idbuf[NDB_MAX_RDNS][2*sizeof(ID)];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ocbuf[NDB_MAX_RDNS][NDB_OC_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1394:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dummy[2] = {0,0};
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:196:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy( ptr, f->f_av_value.bv_val, f->f_av_value.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:240:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy( ptr, f->f_sub_initial.bv_val, f->f_sub_initial.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:249:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy( ptr, f->f_sub_any[i].bv_val, f->f_sub_any[i].bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:257:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy( ptr, f->f_sub_final.bv_val, f->f_sub_final.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dnBuf[2048], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idbuf[2*sizeof(ID)];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ocbuf[NDB_OC_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:450:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char xbuf[512];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:512:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dnBuf[2048], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:513:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idbuf[2*sizeof(ID)];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ocbuf[NDB_OC_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:760:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idbuf[2*sizeof(ID)];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:48:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char myDNbuf[2048];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char myIdbuf[2*sizeof(ID)];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char myOcbuf[NDB_OC_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:76:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char text[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:339:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-perl/config.c:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eval_str[EVAL_BUF_SIZE];
data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[BUFSIZ];
data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ebuf[128];
data/openldap-2.4.56+dfsg/servers/slapd/back-sock/opensock.c:55:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sockun.sun_path, "%.*s", (int)(sizeof(sockun.sun_path)-1),
data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[BUFSIZ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	ebuf[128];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:784:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		logbuf[ STRLENOF("val[], id=") + 2*LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:923:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:952:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		textbuf[ SLAP_TEXT_BUFLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:987:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:1392:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[BUFSIZ*2], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:646:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			upperdn[ BACKSQL_MAX_DN_LEN + 1 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:267:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:789:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:824:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char	buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:1040:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		textbuf[ 1024 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:280:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[1024];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modify.c:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		textbuf[ SLAP_TEXT_BUFLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modrdn.c:395:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		textbuf[ SLAP_TEXT_BUFLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/operational.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dn_rn[512];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  oDn[512];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			s[LDAP_PVT_INTTYPE_CHARS(long)];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	tmp[STRLENOF("INSERT INTO ldap_entry_objclasses "
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	tmp[STRLENOF("DELETE FROM ldap_entry_objclasses "
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:373:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:411:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:593:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c:881:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		keyvalbuf[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c:1588:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char lowidstring[48];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c:1668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp_base_ndn[ BACKSQL_MAX_DN_LEN + 1 + 1 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/sql-wrap.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		drv_name[ 30 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/sql-wrap.c:386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			DBMSName[ 32 ];
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		*cstr, cc[ 2 ] = { '\0', '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/backend.c:971:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char *oids[ 2 ];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:942:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[4096*3];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1056:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *src, *dst, ibuf[11];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1111:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char buf[5];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1113:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						bv.bv_len = sprintf( buf, "%d", si->si_num );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ibuf[32];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1950:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				logfile = fopen(logfileName, "w");
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[8192];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2375:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[8192];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof("2147483648")], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2877:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buf[ SLAP_TEXT_BUFLEN ] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:3572:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char numbuf[32];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:4025:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[3];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:4583:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[32], *ptr1, *ptr2 = NULL;
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:5063:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:5429:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:5586:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( ca->log, "back-config" );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:7412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*argv[4];
data/openldap-2.4.56+dfsg/servers/slapd/component.c:657:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1][128];
data/openldap-2.4.56+dfsg/servers/slapd/component.c:672:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( cav.cav_buf+1, cr_ptr, cr_len );
data/openldap-2.4.56+dfsg/servers/slapd/config.c:718:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( c, cf, sizeof( ConfigArgs ) );
data/openldap-2.4.56+dfsg/servers/slapd/config.c:749:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen( fname, "r" );
data/openldap-2.4.56+dfsg/servers/slapd/config.c:1559:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[AC_LINE_MAX], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/config.c:1686:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[8];
data/openldap-2.4.56+dfsg/servers/slapd/config.c:2216:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	buf[AC_LINE_MAX];
data/openldap-2.4.56+dfsg/servers/slapd/config.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/config.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char log[MAXPATHLEN + STRLENOF(": line ") + LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1540:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")];
data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char addr[INET6_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char peername[sizeof("IP=255.255.255.255:65336")];
data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1544:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char addr[INET_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/servers/slapd/controls.c:99:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *slap_known_controls[SLAP_MAX_CIDS+1];
data/openldap-2.4.56+dfsg/servers/slapd/controls.c:952:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char *oids[ 2 ];
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[32];
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:454:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			idx.bv_len = sprintf(idx.bv_val, "{%d}", i);
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:451:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	slap_daemon[t].sd_dpfd = open( SLAP_EVENT_FNAME, O_RDWR ); \
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:707:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			slapd_srvurls[i] = (char *) ch_realloc( slapd_srvurls[i],
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:713:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			slapd_srvurls[i] = (char *) ch_realloc( slapd_srvurls[i],
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char serv[7];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1596:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char addr[INET_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1615:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char addr[INET6_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1865:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hbuf[NI_MAXHOST];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1871:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr[INET6_ADDRSTRLEN];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1873:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peername[MAXPATHLEN + sizeof("PATH=")];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1875:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peerbuf[8];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1881:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peername[sizeof("IP=255.255.255.255:65336")];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2032:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				authid.bv_len = sprintf( authid.bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2226:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2652:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char c[BUFSIZ];
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2827:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char c[BUFSIZ];
data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cookiestr[ LDAP_PVT_CSNSTR_BUFSIZE + 20 ];
data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:56:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				len += sprintf( cookiestr+len, ",sid=%03x", sid );
data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:75:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		len = sprintf( cookie->bv_val, "rid=%03d,", rid );
data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:78:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			ptr += sprintf( ptr, "sid=%03x,", sid );
data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE + 4 ];
data/openldap-2.4.56+dfsg/servers/slapd/limits.c:44:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *const dn_source[2] = { "DN", "DN.THIS" };
data/openldap-2.4.56+dfsg/servers/slapd/lock.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAXPATHLEN];
data/openldap-2.4.56+dfsg/servers/slapd/lock.c:52:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (*lfp = fopen( buf, "w" )) == NULL ) {
data/openldap-2.4.56+dfsg/servers/slapd/lock.c:62:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fp = fopen( fname, type )) == NULL ) {
data/openldap-2.4.56+dfsg/servers/slapd/main.c:396:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( ( leakfile = fopen( "slapd.leak", "w" )) == NULL ) {
data/openldap-2.4.56+dfsg/servers/slapd/main.c:933:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[4];
data/openldap-2.4.56+dfsg/servers/slapd/main.c:950:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *fp = fopen( slapd_pid_file, "w" );
data/openldap-2.4.56+dfsg/servers/slapd/main.c:972:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		FILE *fp = fopen( slapd_args_file, "w" );
data/openldap-2.4.56+dfsg/servers/slapd/modify.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/modify.c:134:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char abuf[BUFSIZ/2], *ptr = abuf;
data/openldap-2.4.56+dfsg/servers/slapd/modify.c:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/modify.c:870:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/modify.c:871:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/mods.c:413:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[sizeof(long)*3 + 2]; /* overly long */
data/openldap-2.4.56+dfsg/servers/slapd/module.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[1];
data/openldap-2.4.56+dfsg/servers/slapd/module.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ebuf[BUFSIZ];
data/openldap-2.4.56+dfsg/servers/slapd/nt_svc.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filename[MAX_PATH], *fname_start;
data/openldap-2.4.56+dfsg/servers/slapd/nt_svc.c:68:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(filename, " service");
data/openldap-2.4.56+dfsg/servers/slapd/oc.c:829:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[32];
data/openldap-2.4.56+dfsg/servers/slapd/oc.c:866:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			idx.bv_len = sprintf(idx.bv_val, "{%d}", i);
data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[32], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:203:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				idx.bv_len = sprintf(idx.bv_val, "{%d}", i );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:507:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	t2 = atoi( agestr );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:522:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	t2 = atoi( agestr );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:535:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		t1 += atoi( agestr );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timebuf[LDAP_LUTIL_GENTIME_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:753:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char agebuf[2*STRLENOF("ddddd+hh:mm:ss  ")];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1226:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		*ptr,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rdnbuf[STRLENOF(RDNEQ)+LDAP_LUTIL_GENTIME_BUFSIZE+8];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1298:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nrdnbuf[STRLENOF(RDNEQ)+LDAP_LUTIL_GENTIME_BUFSIZE+8];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1463:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timebuf[LDAP_LUTIL_GENTIME_BUFSIZE+8];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1859:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2048:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2441:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( normalized->bv_val, "%02d%02d%02d%02d%02d%02d%02d",
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2445:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( normalized->bv_val + STRLENOF("YYYYmmddHHMMSSZ")-1,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/auditlog.c:124:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((f = fopen(ad->ad_logfile, "a")) == NULL) {
data/openldap-2.4.56+dfsg/servers/slapd/overlays/collect.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errMsg[100];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:155:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char val_buf[SLAP_TEXT_BUFLEN] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:306:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char errmsg[1024];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:1068:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tsbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:397:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		ttlbuf[STRLENOF("31557600") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:398:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		tsbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:503:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:799:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		tsbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:897:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			ttlbuf[STRLENOF("31557600") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:1080:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		ttlbuf[STRLENOF("31557600") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:1329:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:199:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		textbuf[1024];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		textbuf[1024];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c:439:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c:481:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c:1870:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		attrset_buf[ LDAP_PVT_INTTYPE_CHARS( unsigned long ) ],
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:376:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	attrset_len = sprintf( attrset_buf,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:378:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	expiry_len = sprintf( expiry_buf,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:383:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		refresh_len = sprintf( refresh_buf,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:845:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1626:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( qbase->base.bv_val, qb.base.bv_val, qb.base.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1798:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filter_str[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(pcacheQueryID=)" ) ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1974:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( fstr->bv_val, "(?=)" );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:2098:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filtbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(entryUUID=)" ) ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:2214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filter_str[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(pcacheQueryID=)" ) ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:2306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:3310:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char			textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:3405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filter_str[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(pcacheQueryID=)" ) ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5133:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5457:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5674:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[ 4 ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pwdCheckModule[MODULE_NAME_SZ]; /* name of module to dynamically
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:454:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof("-2147483648")];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:886:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[ MAX_PWD_HISTORY_SZ ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:991:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nowstr[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:992:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nowstr_usec[ LDAP_LUTIL_GENTIME_BUFSIZE+8 ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:1637:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:2120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:862:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[4096];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:1269:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			buf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:1439:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char		textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:1973:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ibuf[32], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2062:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*rargv[ 3 ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char *argv[5];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2479:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *argv[5];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:187:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char prefix[1024];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:211:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char prefix[1024];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:326:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *rargv[ 5 ];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:651:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[LDAP_PVT_CSNSTR_BUFSIZE + STRLENOF("(entryCSN<=)")];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1103:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( ri->ri_csn.bv_val, csn.bv_val, csn.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1123:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( ri->ri_csn.bv_val, csn.bv_val, csn.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1567:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char txtbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1635:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char uuidstr[40] = {};
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1711:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1802:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char uuidstr[40] = {};
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1974:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cbuf[LDAP_PVT_CSNSTR_BUFSIZE];
data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:3365:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/passwd.c:583:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		hash = (char *)defhash[0];
data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	phoneme[MAXPHONEMELEN + 1];
data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:199:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char  vsvfn[26] = {
data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char            ntrans[40];	/* word with uppercase letters */
data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAXPHONEMELEN + 2];
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2180:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[LDAP_PVT_INTTYPE_CHARS(long)]; \
data/openldap-2.4.56+dfsg/servers/slapd/result.c:85:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( v2+len, "Referral:" );
data/openldap-2.4.56+dfsg/servers/slapd/result.c:148:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			no_assert = rs_suppress_assert = atoi( s );
data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[sizeof("255")];
data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*attrs[ 2 ] = { NULL, NULL };
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:451:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:476:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					op.o_req_ndn.bv_val = (char *)pr[i].values[0];
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:597:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *names[2];
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:743:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	authcDN.bv_val = auxvals[1].values ? (char *)auxvals[1].values[0] : NULL;
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:752:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	authzDN.bv_val = auxvals[3].values ? (char *)auxvals[3].values[0] : NULL;
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_LDAPDN_MAXLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:614:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_LDAPDN_MAXLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1044:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[ SLAP_LDAPDN_MAXLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[32], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1435:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		idx.bv_len = sprintf( idx.bv_val, "{%d}", i);
data/openldap-2.4.56+dfsg/servers/slapd/schema.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tubuf[STRLENOF("YYYYmmddHHMMSSZ") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:646:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char HASHdigest[HASH_BYTES];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:666:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			(unsigned char *)values[i].bv_val, values[i].bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:691:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char HASHdigest[HASH_BYTES];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:855:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char HASHdigest[HASH_BYTES];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:934:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					(unsigned char *)values[i].bv_val, j );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:976:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char HASHdigest[HASH_BYTES];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:1368:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy( out->bv_val + out->bv_len, uidval.bv_val, uidval.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2533:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char lenbuf[sizeof(k) + 2], *lenp, neg = 0xff;
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2575:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( key->bv_val, lenp, k );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2578:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( key->bv_val + k, itmp.bv_val, itmp.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2595:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[64];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2663:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[64];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3507:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( sptr, "%01X", ( ptr[0] & 0x0fU ) );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3512:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf( sptr, "%02X", ptr[i] );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sbuf2[SLAP_SN_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3545:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sbuf3[SLAP_SN_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3633:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char serialbuf2[SLAP_SN_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[STRLENOF("YYYYmmddHHMMSSZ") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4056:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sbuf[STRLENOF("YYYYmmddHHMMSSZ") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *p, tubuf[STRLENOF("YYYYmmddHHMMSSZ") + 1];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sbuf2[SLAP_SN_BUFLEN], i_sbuf2[SLAP_SN_BUFLEN],
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4792:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char issuer_serialbuf[SLAP_SN_BUFLEN], serialbuf[SLAP_SN_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*ptr,
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ STRLENOF( "YYYYmmddHHMMSS.uuuuuuZ#SSSSSS#SID#ssssss" ) + 1 ];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[ STRLENOF( "YYYYmmddHHMMSS.uuuuuuZ#SSSSSS#SID#ssssss" ) + 1 ];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5642:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( normalized->bv_val, "%02d%02d%02d%02d%02d%02dZ",
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5696:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf( normalized->bv_val, "%02d%02d%02d%02d%02d%02d%02d",
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5700:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( normalized->bv_val + STRLENOF("YYYYmmddHHMMSSZ")-1,
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5749:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[5];
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5804:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[5];
data/openldap-2.4.56+dfsg/servers/slapd/search.c:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char abuf[BUFSIZ/2], *ptr = abuf;
data/openldap-2.4.56+dfsg/servers/slapd/search.c:215:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(abuf, "scope=%d deref=%d", op->ors_scope, op->ors_deref);
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/passwd-shell.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	tmpbuf[ MAXLINELEN * 2 ];
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char		*p, *args, line[ MAXLINELEN + 1 ];
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1834:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		be_ctrls[SLAP_MAX_CIDS + 1];
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	bi_ctrls[SLAP_MAX_CIDS + 1];
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2453:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ga_ndn[1];
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2542:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		oh_log_prefix[ /* sizeof("conn= op=") + 2*LDAP_PVT_INTTYPE_CHARS(unsigned long) */ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2693:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char o_ctrlflag[SLAP_MAX_CIDS];	/* per-control flags */
data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			accessmaskbuf[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			accessmaskbuf[ACCESSMASK_MAXLEN];
data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:207:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ];
data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:300:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if( ( leakfile = fopen( leakfilename, "w" )) == NULL ) {
data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tv_maxcsnbuf[ LDAP_PVT_CSNSTR_BUFSIZE * ( SLAP_SYNC_SID_MAX + 1 ) ];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c:714:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char **argv, ibuf[32], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		timeStr[100];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:63:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen( slapi_log_file, "a" );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pb_textbuf[ SLAP_TEXT_BUFLEN ];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:435:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:453:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:462:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:543:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:605:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:1866:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s, pb->pb_conn->c_peer_name.bv_val, pb->pb_conn->c_peer_name.bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2415:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2722:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textbuf[SLAP_TEXT_BUFLEN] = { '\0' };
data/openldap-2.4.56+dfsg/servers/slapd/slapschema.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char textbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/slaptest.c:65:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE		*fp = fopen( fname, "w" );
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			si_ridtxt[ STRLENOF("rid=999") + 1 ];
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char **attrs, *lattrs[9];
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:1016:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char empty[6] = "empty";
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2445:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char txtbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2752:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char txtbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2997:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&s, syncUUID->bv_val, 2);
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2998:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(val, syncUUID->bv_val+2, UUIDLEN-2);
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:3034:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&s, val->bv_val, 2);
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:3070:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&s, val->bv_val, 2);
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:4185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char txtbuf[SLAP_TEXT_BUFLEN];
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5007:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( vnc, "(.*)" );
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5012:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy( rnc, "%1" );
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5631:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy( c->cr_msg, "rootDN must be defined before syncrepl may be used" );
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5785:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ*2], *ptr;
data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:415:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ibuf[32];
data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:444:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			idx.bv_len = sprintf(idx.bv_val, "{%d}", i);
data/openldap-2.4.56+dfsg/servers/slapd/value.c:268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *ptr, ibuf[64];	/* many digits */
data/openldap-2.4.56+dfsg/servers/slapd/value.c:275:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		ibv.bv_len = sprintf(ibv.bv_val, "{%u}", i);
data/openldap-2.4.56+dfsg/servers/slapd/zn_malloc.c:137:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	zh->zh_fd = open("/dev/zero", O_RDWR);
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:91:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( (s)->val + slen, data, sz * ((count) + !!(isString)) ); \
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[256];
data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:273:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fp = fopen( filename, "r" )) != NULL ) {
data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:274:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  line[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char progname[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:212:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	uribuf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *values[2];
data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*DNs[2];
data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*rdns[2];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		outstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:406:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:468:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dn[256], uids[32], cns[32], *base;
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:581:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:636:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*attrs[ 2 ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:641:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:718:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fbuf[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:752:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:787:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	thrstr[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:814:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:246:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*attrs[ 2 ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:418:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buf[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*attrs[ 2 ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:357:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:394:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[ BUFSIZ ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:79:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char argbuf[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*sreqs[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*sattrs[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*sbase[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*sargs[MAXARGS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		scmd[MAXPATHLEN];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		swampopt[sizeof("-SSS")];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:151:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	sloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*rreqs[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*rargs[MAXARGS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*rflts[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		rcmd[MAXPATHLEN];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:161:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	rloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:163:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*afiles[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*aargs[MAXARGS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		acmd[MAXPATHLEN];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:168:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	aloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*nreqs[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*nargs[MAXARGS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ncmd[MAXPATHLEN];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:176:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	nloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*mreqs[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*mdn[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*margs[MAXARGS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		mcmd[MAXPATHLEN];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:185:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	mloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*breqs[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*bcreds[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*battrs[MAXREQS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*bargs[MAXARGS];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		bcmd[MAXPATHLEN];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:195:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	bloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:836:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				sargs[sanum - 5] = (char *)ldap_pvt_scope2str( slud[jj]->lud_scope );
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:952:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAXPATHLEN];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:966:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fp = fopen( filename, "r" )) != NULL ) {
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:967:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  line[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1036:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fp = fopen( filename, "r" )) != NULL ) {
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1037:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  line[BUFSIZ];
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1099:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		{ char *arg2[MAXREQS];
data/openldap-2.4.56+dfsg/clients/tools/common.c:703:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					size_t		len = strlen( cvalue );
data/openldap-2.4.56+dfsg/clients/tools/common.c:971:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			passwd.bv_len = strlen( passwd.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/common.c:1231:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						len_proto = strlen( lud->lud_scheme );
data/openldap-2.4.56+dfsg/clients/tools/common.c:1276:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							+ strlen( hosts[ i ] )
data/openldap-2.4.56+dfsg/clients/tools/common.c:1462:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				passwd.bv_len = strlen( passwd.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/common.c:1566:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					len = strlen( msgbuf );
data/openldap-2.4.56+dfsg/clients/tools/common.c:1700:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		c[i].ldctl_value.bv_len = strlen( authzid );
data/openldap-2.4.56+dfsg/clients/tools/common.c:2150:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( dr->derefAttr ) + STRLENOF(": ");
data/openldap-2.4.56+dfsg/clients/tools/common.c:2155:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ber_len_t tlen = strlen(dv->type);
data/openldap-2.4.56+dfsg/clients/tools/common.c:2338:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen( ctrls[i]->ldctl_oid );
data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c:217:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bvalue.bv_len = strlen( bvalue.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c:221:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bvalue.bv_val = malloc( strlen( &sep[1] ));
data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c:223:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(unsigned char *) bvalue.bv_val, strlen( &sep[1] ));
data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c:209:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buf[ strlen( buf ) - 1 ] = '\0'; /* remove trailing newline */
data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c:147:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			dn.bv_len = strlen( dn.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c:306:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				"oid", retoid, strlen(retoid) );
data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c:332:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen( rbuf );
data/openldap-2.4.56+dfsg/clients/tools/ldapmodrdn.c:206:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buf[ strlen( buf ) - 1 ] = '\0';	/* remove nl */
data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:128:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		oldpw.bv_len = strlen( oldpw.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:143:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		newpw.bv_len = strlen( newpw.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:220:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		oldpw.bv_len = strlen( oldpw.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:245:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		newpw.bv_len = strlen( newpw.bv_val );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:805:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	def_urlpre = malloc( sizeof("file:////") + strlen(def_tmpdir) );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:875:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		urlpre = malloc( sizeof("file:////") + strlen(tmpdir) );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1229:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			line[ strlen( line ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1264:18:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			moreEntries = getchar();
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1270:19:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				moreEntries = getchar();
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1298:17:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		moreEntries = getchar();
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1304:18:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			moreEntries = getchar();
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1384:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t max_fsize = strlen( filtpatt ) + strlen( value ) + 1, outlen;
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1384:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t max_fsize = strlen( filtpatt ) + strlen( value ) + 1, outlen;
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1450:3:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		getchar();
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1624:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tool_write_ldif( LDIF_PUT_COMMENT, NULL, ufn, ufn ? strlen( ufn ) : 0 );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1644:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tool_write_ldif( LDIF_PUT_VALUE, "ufn", ufn, ufn ? strlen( ufn ) : 0 );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1695:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						&tmpfname[strlen(tmpdir) + sizeof(LDAP_DIRSEP) - 1] );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1698:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					tool_write_ldif( LDIF_PUT_URL, bv.bv_val, url, strlen( url ));
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1737:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				"ref", refs[i], strlen(refs[i]) );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1770:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			"extended", retoid, retoid ? strlen(retoid) : 0 );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1808:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			"partial", retoid, retoid ? strlen(retoid) : 0 );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1868:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				"matchedDN", matcheddn, strlen(matcheddn) );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1888:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							next ? (size_t) (next - line) : strlen( line ));
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1895:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						text, strlen(text) );
data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1909:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				tool_write_ldif( LDIF_PUT_VALUE, "ref", refs[i], strlen(refs[i]) );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:110:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->type_id)->identifier.bv_len = strlen("type_id");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:126:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->value)->identifier.bv_len = strlen("value");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:200:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "type_id", strlen("type_id") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:218:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "value", strlen("value") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:338:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->type_id)->identifier.bv_len = strlen("type_id");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:351:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->value)->identifier.bv_len = strlen("value");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:375:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->extension)->identifier.bv_len = strlen("extension");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:444:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "type_id", strlen("type_id") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:462:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "value", strlen("value") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:481:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "extension", strlen("extension") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:648:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.teletexString)->identifier.bv_len = strlen("teletexString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:658:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.printableString)->identifier.bv_len = strlen("printableString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:668:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.universalString)->identifier.bv_len = strlen("universalString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:678:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.utf8String)->identifier.bv_len = strlen("utf8String");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:688:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.bmpString)->identifier.bv_len = strlen("bmpString");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:750:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strncmp("teletexString",peek_head, strlen("teletexString")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:757:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("printableString",peek_head,strlen("printableString")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:764:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("universalString",peek_head,strlen("universalString")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:771:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("utf8String",peek_head,strlen("utf8String")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:778:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("bmpString",peek_head,strlen("bmpString")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:900:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->nameAssigner)->identifier.bv_len = strlen("nameAssigner");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:918:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->partyName)->identifier.bv_len = strlen("partyName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:992:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "nameAssigner", strlen("nameAssigner") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1010:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "partyName", strlen("partyName") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1242:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.otherName)->identifier.bv_len = strlen("otherName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1262:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.rfc822Name)->identifier.bv_len = strlen("rfc822Name");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1282:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.dNSName)->identifier.bv_len = strlen("dNSName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1300:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.x400Address)->identifier.bv_len = strlen("x400Address");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1315:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.directoryName)->identifier.bv_len = strlen("directoryName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1333:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.ediPartyName)->identifier.bv_len = strlen("ediPartyName");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1353:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.uniformResourceIdentifier)->identifier.bv_len = strlen("uniformResourceIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1373:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.iPAddress)->identifier.bv_len = strlen("iPAddress");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1391:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.registeredID)->identifier.bv_len = strlen("registeredID");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1455:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strncmp("otherName",peek_head, strlen("otherName")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1462:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("rfc822Name",peek_head,strlen("rfc822Name")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1469:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("dNSName",peek_head,strlen("dNSName")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1476:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("x400Address",peek_head,strlen("x400Address")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1483:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("directoryName",peek_head,strlen("directoryName")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1490:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("ediPartyName",peek_head,strlen("ediPartyName")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1497:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("uniformResourceIdentifier",peek_head,strlen("uniformResourceIdentifier")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1504:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("iPAddress",peek_head,strlen("iPAddress")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1511:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("registeredID",peek_head,strlen("registeredID")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1875:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                (&k->keyIdentifier)->identifier.bv_len = strlen("keyIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1898:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                (k->authorityCertIssuer)->identifier.bv_len = strlen("authorityCertIssuer");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1919:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                (k->authorityCertSerialNumber)->identifier.bv_len = strlen("authorityCertSerialNumber");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1987:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "keyIdentifier", strlen("keyIdentifier") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:2005:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "authorityCertIssuer", strlen("authorityCertIssuer") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:2023:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "authorityCertSerialNumber", strlen("authorityCertSerialNumber") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:169:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->algorithm)->identifier.bv_len = strlen("algorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:193:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->parameters)->identifier.bv_len = strlen("parameters");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:262:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "algorithm", strlen("algorithm") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:280:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "parameters", strlen("parameters") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:409:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.utcTime)->identifier.bv_len = strlen("utcTime");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:419:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.generalizedTime)->identifier.bv_len = strlen("generalizedTime");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:481:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strncmp("utcTime",peek_head, strlen("utcTime")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:488:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if( strncmp("generalizedTime",peek_head,strlen("generalizedTime")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:609:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->extnID)->identifier.bv_len = strlen("extnID");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:624:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->critical)->identifier.bv_len = strlen("critical");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:637:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->extnValue)->identifier.bv_len = strlen("extnValue");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:658:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->critical)->identifier.bv_len = strlen("critical");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:717:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "extnID", strlen("extnID") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:735:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "critical", strlen("critical") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:757:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "extnValue", strlen("extnValue") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:871:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->type)->identifier.bv_len = strlen("type");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:884:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->value)->identifier.bv_len = strlen("value");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:953:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "type", strlen("type") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:971:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "value", strlen("value") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1091:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->notBefore)->identifier.bv_len = strlen("notBefore");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1109:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->notAfter)->identifier.bv_len = strlen("notAfter");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1181:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "notBefore", strlen("notBefore") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1199:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "notAfter", strlen("notAfter") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1314:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->algorithm)->identifier.bv_len = strlen("algorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1330:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->subjectPublicKey)->identifier.bv_len = strlen("subjectPublicKey");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1402:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "algorithm", strlen("algorithm") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1420:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "subjectPublicKey", strlen("subjectPublicKey") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2256:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->a.rdnSequence)->identifier.bv_len = strlen("rdnSequence");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2318:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if( strncmp("rdnSequence",peek_head, strlen("rdnSequence")) == 0){
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2532:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->version)->identifier.bv_len = strlen("version");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2546:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->serialNumber)->identifier.bv_len = strlen("serialNumber");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2561:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->signature)->identifier.bv_len = strlen("signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2576:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->issuer)->identifier.bv_len = strlen("issuer");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2591:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->validity)->identifier.bv_len = strlen("validity");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2606:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->subject)->identifier.bv_len = strlen("subject");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2621:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->subjectPublicKeyInfo)->identifier.bv_len = strlen("subjectPublicKeyInfo");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2648:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->issuerUniqueIdentifier)->identifier.bv_len = strlen("issuerUniqueIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2672:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->subjectUniqueIdentifier)->identifier.bv_len = strlen("subjectUniqueIdentifier");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2704:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->extensions)->identifier.bv_len = strlen("extensions");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2724:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->version)->identifier.bv_len = strlen("version");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2783:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "version", strlen("version") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2805:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "serialNumber", strlen("serialNumber") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2823:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2841:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "issuer", strlen("issuer") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2859:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "validity", strlen("validity") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2877:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "subject", strlen("subject") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2895:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "subjectPublicKeyInfo", strlen("subjectPublicKeyInfo") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2913:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "issuerUniqueIdentifier", strlen("issuerUniqueIdentifier") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2931:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "subjectUniqueIdentifier", strlen("subjectUniqueIdentifier") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2949:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "extensions", strlen("extensions") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3075:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->toBeSigned)->identifier.bv_len = strlen("toBeSigned");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3090:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->signatureAlgorithm)->identifier.bv_len = strlen("signatureAlgorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3106:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->signature)->identifier.bv_len = strlen("signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3178:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "toBeSigned", strlen("toBeSigned") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3196:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "signatureAlgorithm", strlen("signatureAlgorithm") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3214:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:1216:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strLen = strlen ( peek_head );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:1767:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strLen = strlen ( oid );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2036:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	strLen = strlen( ch_oid );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2107:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	oid.octetLen = strlen ( oid.octs );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:124:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->userCertificate)->identifier.bv_len = strlen("userCertificate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:142:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->revocationDate)->identifier.bv_len = strlen("revocationDate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:168:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->crlEntryExtensions)->identifier.bv_len = strlen("crlEntryExtensions");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:240:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "userCertificate", strlen("userCertificate") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:258:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "revocationDate", strlen("revocationDate") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:276:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "crlEntryExtensions", strlen("crlEntryExtensions") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:695:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->version)->identifier.bv_len = strlen("version");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:707:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->signature)->identifier.bv_len = strlen("signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:722:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->issuer)->identifier.bv_len = strlen("issuer");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:740:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->thisUpdate)->identifier.bv_len = strlen("thisUpdate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:758:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->nextUpdate)->identifier.bv_len = strlen("nextUpdate");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:770:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->revokedCertificates)->identifier.bv_len = strlen("revokedCertificates");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:805:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->crlExtensions)->identifier.bv_len = strlen("crlExtensions");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:879:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "version", strlen("version") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:897:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:915:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "issuer", strlen("issuer") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:933:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "thisUpdate", strlen("thisUpdate") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:951:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "nextUpdate", strlen("nextUpdate") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:969:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "revokedCertificates", strlen("revokedCertificates") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:987:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "crlExtensions", strlen("crlExtensions") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1116:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->tbsCertList)->identifier.bv_len = strlen("tbsCertList");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1131:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(k->signatureAlgorithm)->identifier.bv_len = strlen("signatureAlgorithm");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1147:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(&k->signature)->identifier.bv_len = strlen("signature");
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1222:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "tbsCertList", strlen("tbsCertList") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1240:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "signatureAlgorithm", strlen("signatureAlgorithm") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1258:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) {
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:67:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	type.bv_len = strlen ( aliasing_at_name );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:73:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	type.bv_len = strlen ( aliased_at_name );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:79:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	type.bv_len = strlen ( mr_name);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:84:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	type.bv_len = strlen ( component_filter );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:142:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_equality);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:148:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_approx);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:155:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_ordering);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:162:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_substr);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:190:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				mr_name.bv_len = strlen( tmp );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:210:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	odm = RetrieveOidDecoderMappingbyOid( oid, strlen(oid) );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:394:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( strncmp( mr->smr_mrule.mr_oid, DN_MATCH_OID, strlen(DN_MATCH_OID) ) != 0 )
data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:402:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if( strncmp( mr->smr_mrule.mr_oid, RDN_MATCH_OID, strlen(RDN_MATCH_OID) ) != 0 )
data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:345:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			AC_MEMCPY( next, next + 1, strlen( next + 1 ) + 1 );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:351:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    next + 1, strlen( next + 1 ) + 1 );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:377:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen( buf ); \
data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:410:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				&& (p = line + strlen( line ) - 1)[ 0 ] == '\\'
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:146:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cbp.addr.bv_len = strlen(cbp.buf);,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c:83:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	WRITE_STRING_STRIPSPACE_LEN(fp,str,strlen(str))
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:146:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cbp.addr.bv_len = strlen(cbp.buf);,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/nslcd-prot.h:107:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    WRITE_INT32(fp, strlen(str));                                           \
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:270:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rv = read(fp->fd, fp->readbuffer.buffer + fp->readbuffer.start, len);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:315:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    rv = read(fp->fd, fp->readbuffer.buffer, len);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:894:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(addr.sun_path,NSLCD_SOCKET,sizeof(addr.sun_path));
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:302:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(pi.pwd.bv_val, ni->ni_pam_pwdmgr_pwd.bv_val,
data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:91:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buffer,date->bv_val,l);
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/argon2/pw-argon2.c:134:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		hash->bv_len = strlen( hash->bv_val );
data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:90:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error Define BYTE_ORDER to be equal to either LITTLE_ENDIAN or BIG_ENDIAN
data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:200:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( UcasePassword, passwd->bv_val, 14 );
data/openldap-2.4.56+dfsg/include/ac/dirent.h:22:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define NAMLEN(dirent) strlen((dirent)->d_name)
data/openldap-2.4.56+dfsg/include/ac/socket.h:140:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#	define tcp_read( s, buf, len)	read( s, buf, len )
data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:273:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ber_put_ostring( ber, str, strlen( str ), tag );
data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:143:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rc = ber_printf( ber, fmt, buf, strlen(buf) );
data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:558:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new->bv_len = len ? len : strlen( s );
data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:642:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( s ) + 1;
data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:493:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read( sbiod->sbiod_sb->sb_fd, buf, len );
data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:740:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read( sbiod->sbiod_sb->sb_fd, buf, len );
data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:799:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sbiod->sbiod_pvt = LBER_MALLOC( strlen( arg ) + 1 );
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:117:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, str, sizeof(buf) );
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:174:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (end && strlen(ss) > (rem=end-s2)) {
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:175:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(s2, ss, rem);
data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:189:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(ptr);
data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:241:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	slen = strlen( sep );
data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:245:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen( *v ) + slen;
data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:264:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( p, sep, slen );
data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:268:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( *v );
data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:269:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( p, *v, len );
data/openldap-2.4.56+dfsg/libraries/libldap/compare.c:152:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bvalue.bv_len = (value == NULL) ? 0 : strlen( value );
data/openldap-2.4.56+dfsg/libraries/libldap/compare.c:194:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bvalue.bv_len = (value == NULL) ? 0 : strlen( value );
data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:833:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen( props[i] );
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:148:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(s);
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:162:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		    strcpy(dn + loc, ",");
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:276:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    request = LDAP_MALLOC(strlen(domain) + sizeof("_ldap._tcp."));
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:364:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(hostent_head[hostent_count].hostname, host, MAXHOST-1);
data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:393:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buflen = strlen(hostent_head[i].hostname) + STRLENOF(":65535 ");
data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c:84:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = fgets( buf, sizeof( buf ), stdin ) ? strlen( buf ) : 0;
data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:678:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( str );
data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:917:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( str );
data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:1649:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == len );
data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:1724:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == len );
data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:1816:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == len );
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:540:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		svc_principal_size = strlen(givenstr) + 1;
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:545:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		svc_principal_size = STRLENOF("ldap/") + strlen(dnsHostName) + 1;
data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:550:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		svc_principal_size = STRLENOF("ldap/") + strlen(host) + 1;
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:192:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = &start[strlen(start)-1];
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:336:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		path = LDAP_MALLOC(strlen(home) + strlen(file) + sizeof( LDAP_DIRSEP "."));
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:336:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		path = LDAP_MALLOC(strlen(home) + strlen(file) + sizeof( LDAP_DIRSEP "."));
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:376:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, prefix, MAX_LDAP_ENV_PREFIX_LEN);
data/openldap-2.4.56+dfsg/libraries/libldap/init.c:378:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(buf);
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:396:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( name );
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:548:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		namelen = strlen(name);
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:735:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nlen = ( name != NULL ) ? strlen( name ) : 0;
data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:846:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen( line );
data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:261:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		(void)read(s, &ch, 1);
data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:152:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		(void)read(s, &ch, 1);
data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:334:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( strlen(path) > (sizeof( server.sun_path ) - 1) ) {
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1172:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ber_len_t len = srv->lud_dn ? strlen( srv->lud_dn ) : 0;
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1374:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( *errstrp );
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1430:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ber_len_t len = srv->lud_dn ? strlen( srv->lud_dn ) : 0;
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1493:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*referralsp = (char *)LDAP_MALLOC( strlen( s ) + LDAP_REF_STR_LEN
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1498:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    strlen( *referralsp ) + strlen( s ) + 2 );
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1498:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    strlen( *referralsp ) + strlen( s ) + 2 );
data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1509:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat( *referralsp, "\n" );
data/openldap-2.4.56+dfsg/libraries/libldap/sbind.c:75:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cred.bv_len = strlen( passwd );
data/openldap-2.4.56+dfsg/libraries/libldap/sbind.c:107:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cred.bv_len = strlen( passwd );
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:166:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int l = strlen(s);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:191:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(&ss->val[ss->pos], s, l);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1047:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(res,p,q-p);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1074:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(res,p,q-p);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1153:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(res,start,len);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2129:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(at->at_oid, savepos, len);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2502:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(oc->oc_oid, savepos, len);
data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2783:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(cr->cr_oid, savepos, len);
data/openldap-2.4.56+dfsg/libraries/libldap/sortctrl.c:144:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy((*key)->attributeType, attrStart, attrLen);
data/openldap-2.4.56+dfsg/libraries/libldap/sortctrl.c:155:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy((*key)->orderingRule, oidStart, oidLen);
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:67:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	line[ strlen( line ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/libraries/libldap/test.c:217:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    strlen( tmp.mod_values[i] );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:163:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			rc = read( fd, buf->data, st.st_size );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:554:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len1 = strlen(name);
data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:673:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( !len1 ) len1 = strlen( name );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:520:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (ciphers && (strlen(ciphers))) {
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:569:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			while (c && (strlen(c))) {
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:927:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		phrase[strlen((char*)phrase)-1] = 0;
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:1286:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	PK11_SETATTRS( attrs[2], CKA_LABEL, (unsigned char *) filename, strlen( filename ) + 1 );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:1412:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	PK11_SETATTRS( attrs[2], CKA_LABEL, (unsigned char *)filename, strlen( filename ) + 1 );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2722:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nlen = strlen( name );
data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:641:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nlen = strlen(name);
data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:956:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return tlso_bio_write( b, str, strlen( str ) );
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:601:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len += strlen( u->lud_scheme ) + STRLENOF( "://" );
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:842:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		p = &url[strlen(url)-1];
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1429:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size += strlen(ludp->lud_host) + 1;		/* host and space */
data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1446:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			p += strlen(ludp->lud_host);
data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c:389:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wcsize = strlen(utf8str) + 1;
data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c:466:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	wcsize = strlen(mbstr) + 1;
data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:594:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( name, hp->h_name, namelen );
data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:604:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( name, hp->h_name, namelen );
data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:736:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( *src ) + 1;
data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:777:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	name_len = strlen( src->h_name ) + 1;
data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:781:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			total_alias_len += strlen( *p ) + 1;
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4186:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fname->mn_len = strlen(path);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9365:18:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
	my.mc_wbuf[0] = memalign(env->me_os_psize, MDB_WBUF*2);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9785:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:184:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(stdin);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:209:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char *)c1);
data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:229:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen((char *)c1);
data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c:64:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			rc = read( fd, buf, nbytes );
data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c:109:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ( (c = getc(fi)) != EOF && c != '\n' && c != '\r' )
data/openldap-2.4.56+dfsg/libraries/liblutil/getpeereid.c:162:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			rlen = read(fd, &rname, rlen);
data/openldap-2.4.56+dfsg/libraries/liblutil/md5.c:322:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		lutil_MD5Update (&context, argv[j], strlen (argv[j]));
data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:98:87:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( RegSetValueEx(hKey, "EventMessageFile", 0, REG_EXPAND_SZ, lpszBinaryPathName, strlen(lpszBinaryPathName) + 1) != ERROR_SUCCESS)
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:479:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert( strlen(b64->bv_val) == b64->bv_len );
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:862:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( UcasePassword, cred->bv_val, 14 );
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:890:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( storedPasswordHash, passwd->bv_val, 32 );
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1158:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( UcasePassword, passwd->bv_val, 14 );
data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1227:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash->bv_len = strlen( hash->bv_val );
data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:167:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			? strlen( interact->result ) : 0;
data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:182:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		interact->len = strlen(input); 
data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:205:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		interact->len = strlen( interact->result );
data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:64:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		endargv = Argv[ Argc-1 ] + strlen( Argv[ Argc-1 ] );
data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:69:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen( buf );
data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:269:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((num = read(fd, buffer, sizeof(buffer))) > 0)
data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:80:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name[ strlen( name ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:91:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name[ strlen( name ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:100:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name[ strlen( name ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:76:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name[ strlen( name ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:87:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name[ strlen( name ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:96:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name[ strlen( name ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:83:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen( progname );
data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:394:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(path);
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:292:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen( s );
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:298:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, s, len );
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:308:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen( buf );
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:323:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	uuidlen = strlen( uuidstr );
data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:328:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( buf, uuidstr, len );
data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:179:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				l = strlen( p ) - 2;
data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:186:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				l = strlen( p );
data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:389:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		val->bv_len = strlen( val->bv_val );
data/openldap-2.4.56+dfsg/libraries/librewrite/map.c:388:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				val->bv_len = strlen( val->bv_val );
data/openldap-2.4.56+dfsg/libraries/librewrite/params.c:50:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		var->lv_value.bv_len = strlen( value );
data/openldap-2.4.56+dfsg/libraries/librewrite/subst.c:64:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			AC_MEMCPY((char *)p, &p[ 1 ], strlen( p ) );
data/openldap-2.4.56+dfsg/libraries/librewrite/subst.c:164:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			AC_MEMCPY( &p[ 1 ], &p[ 2 ], strlen( &p[ 1 ] ) );
data/openldap-2.4.56+dfsg/libraries/librewrite/var.c:130:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( value );
data/openldap-2.4.56+dfsg/libraries/librewrite/var.c:225:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	var->lv_value.bv_len = strlen( value );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:200:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			AC_MEMCPY( p + 3, p + 1, strlen( p + 1 ) + 1 );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:281:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int l = strlen( pwd->pw_gecos );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:321:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			blen = strlen( buf );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:345:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				val->bv_len = strlen( p );
data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:430:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		val->bv_len = strlen( val->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2297:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( src );
data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2557:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t n = strlen( s );
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:135:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( str );
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:413:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						     : strlen( desc.ad_tags.bv_val ));
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:715:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( str );
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:772:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(desc->ad_cname.bv_val, bv->bv_val, bv->bv_len);
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:811:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy( ad->ad_cname.bv_val, bv->bv_val, bv->bv_len+1 );
data/openldap-2.4.56+dfsg/servers/slapd/ad.c:1179:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lcur = line + strlen( line );
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:264:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		size = read (info->al_fd, 
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:288:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (slot_data->al_appname, (char *)slotbuf+32, ALOCK_MAX_APPNAME-1);
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:314:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy ((char *)slotbuf+32, slot_data->al_appname, ALOCK_MAX_APPNAME-1);
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:398:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (slot_data.al_appname, appname, ALOCK_MAX_APPNAME-1);
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:401:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	filename = ber_memcalloc (1, strlen (envdir) + strlen ("/alock") + 1);
data/openldap-2.4.56+dfsg/servers/slapd/alock.c:401:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	filename = ber_memcalloc (1, strlen (envdir) + strlen ("/alock") + 1);
data/openldap-2.4.56+dfsg/servers/slapd/at.c:115:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( name );
data/openldap-2.4.56+dfsg/servers/slapd/at.c:685:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sat->sat_cname.bv_len = strlen( cname );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:697:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( strlen( m ) != STRLENOF("-rwxrwxrwx") ) {
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:814:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( c->value_string );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:927:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i = strlen(c->argv[1]);
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:402:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( fname );
data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:406:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pathlen = strlen( path );
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c:96:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		url.bv_len = STRLENOF( "ldap://" ) + strlen( hosts[i] );
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:105:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		url.bv_len = STRLENOF( "ldap://" ) + strlen(hosts[i]);
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:140:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bv.bv_len = strlen( refdn );
data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:198:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				bv.bv_len = strlen( bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:1975:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ber_len_t oidlen = strlen( ctrls[i]->ldctl_oid );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/chain.c:2124:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				= STRLENOF( "cn=" ) + strlen( li->li_uri );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/chain.c:2132:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				= STRLENOF( "cn=Operations on " ) + strlen( li->li_uri );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:636:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = (int) strlen( ptr );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:308:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ul.bv_len = strlen( ul.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:509:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = ptr ? ptr - bv.bv_val : strlen(bv.bv_val);
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:643:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				bv.bv_len = strlen( bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/search.c:559:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				match.bv_len = strlen( match.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:437:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					while ( len && (res = read( fd, ptr, len )) ) {
data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:841:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fname_len = strlen( dir->d_name );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:501:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( strlen( m ) != STRLENOF("-rwxrwxrwx") ) {
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:568:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( c->value_string );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:485:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( fname );
data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:489:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pathlen = strlen( path );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1406:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			bv.bv_len = strlen( mt->mt_uri ) + 3 + mt->mt_psuffix.bv_len;
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2773:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen( argv[ 0 ] );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:3234:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen( s )
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:3264:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( p );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:652:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fstr->bv_len = strlen( fstr->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c:77:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			res->bv_len = strlen( res->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c:172:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( res->bv_val, dn->bv_val, diff );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:248:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( buf );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:330:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			bv.bv_len = strlen( buf );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2276:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mi->mi_startTime.bv_len = strlen( tmbuf );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2321:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			bv.bv_len = strlen( bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2352:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int 		len = strlen( monitor_subsys[ i ]->mss_name );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/rww.c:217:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( buf );
data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c:209:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( tmbuf );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp:275:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bva = ndb_str2bvarray( c->argv[2], strlen( c->argv[2] ), ',', NULL );
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:626:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
					if ( myop->equal( EID_COLUMN, eid )) {
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:629:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
					if ( myop->equal( VID_COLUMN, i )) {
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1128:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		if ( myop->equal( i+RDN_COLUMN, rdns->nr_buf[i] ))
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1132:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		if ( myop->equal( i+RDN_COLUMN, dummy ))
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1406:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
					if ( myop[i]->equal( j+RDN_COLUMN, NA->rdns->nr_buf[j] ))
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1410:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
					if ( myop[i]->equal( j+RDN_COLUMN, dummy ))
data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:387:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
			ixop->equal( EID_COLUMN, eid );
data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:290:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pwlen = strlen( pw->pw_name );
data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:343:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy( buf, val.bv_val, i );
data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:351:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		val.bv_len = strlen( val.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-shell/config.c:121:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bv.bv_len = strlen( bv.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:82:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( line );
data/openldap-2.4.56+dfsg/servers/slapd/back-sock/extended.c:61:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen(b64.bv_val) == b64.bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:88:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( line );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:204:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			col_len = strlen( row.cols[ i ] );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:315:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					bv.bv_len = strlen( ba->ba_name );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:318:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							bv.bv_len += strlen( ba->ba_argv[i] ) + 3;
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:498:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ber_str2bv( c->argv[ 1 ], strlen( c->argv[ 1 ] ) + 1, 1,
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:512:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( strlen( s ) == 1 ) {
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:113:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for ((j=0, i = strlen(dnP)-1); i > -1; (j++, i--)) {
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:76:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			|| dest->bb_val.bv_len == strlen( dest->bb_val.bv_val ) );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:90:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cslen = strlen( cstr );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:145:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			|| dest->bb_val.bv_len == strlen( dest->bb_val.bv_val ) );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:182:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cslen = strlen( cstr );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:361:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ( pos == NULL || ( ( e = pos[ strlen( s ) ] ) != '\0' && e != ',' ) ) {
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:412:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			real_end = start + strlen( start );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:416:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			AC_MEMCPY( real_end, real_end + 1, strlen( real_end ) );
data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:531:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	uuid.bv_len = strlen( uuidbuf );
data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:131:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen (rs->sr_matched);
data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:199:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ber_len_t oidlen = strlen( rs->sr_ctrls[k]->ldctl_oid );
data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:617:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
									ber_len_t oidlen = strlen( gs.ctrls[c]->ldctl_oid );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1898:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					len = strlen( c->argv[2] );
data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:6635:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( c->value_dn.bv_val + c->value_dn.bv_len, bv.bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/component.c:472:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cav->cav_ptr += strlen("content");
data/openldap-2.4.56+dfsg/servers/slapd/component.c:667:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cr_len = strlen ( cr_ptr );
data/openldap-2.4.56+dfsg/servers/slapd/component.c:879:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( cav_cur_len( cav ) >= strlen( str ) &&
data/openldap-2.4.56+dfsg/servers/slapd/component.c:880:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncmp( cav->cav_ptr, str, strlen( str ) ) == 0 )
data/openldap-2.4.56+dfsg/servers/slapd/component.c:892:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( cav_cur_len( cav ) >= strlen( str ) &&
data/openldap-2.4.56+dfsg/servers/slapd/component.c:893:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncmp( cav->cav_ptr, str, strlen( str ) ) == 0 )
data/openldap-2.4.56+dfsg/servers/slapd/component.c:895:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cav->cav_ptr += strlen( str );
data/openldap-2.4.56+dfsg/servers/slapd/config.c:1010:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			bv.bv_len = strlen( str );
data/openldap-2.4.56+dfsg/servers/slapd/config.c:2189:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			AC_MEMCPY( next, next + 1, strlen( next + 1 ) + 1 );
data/openldap-2.4.56+dfsg/servers/slapd/config.c:2195:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					    next + 1, strlen( next + 1 ) + 1 );
data/openldap-2.4.56+dfsg/servers/slapd/config.c:2222:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen( buf ); \
data/openldap-2.4.56+dfsg/servers/slapd/config.c:2264:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				&& ( p = line + strlen( line ) - 1 )[0] == '\\'
data/openldap-2.4.56+dfsg/servers/slapd/controls.c:441:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vals[0].bv_len = strlen( sc->sc_oid );
data/openldap-2.4.56+dfsg/servers/slapd/controls.c:1955:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	st_pos = strlen( op->o_log_prefix );
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:66:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( crname );
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:129:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cir->cir_name.bv_len = strlen( scr->scr_oid );
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:149:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cir->cir_name.bv_len = strlen( *names );
data/openldap-2.4.56+dfsg/servers/slapd/cr.c:492:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nval.bv_len = strlen(cr->scr_oid);
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1129:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			switch (strlen(value)) {
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1199:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( strlen(host) >
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1564:17:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
				old_umask = umask( 0 );
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1570:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
				umask( old_umask );
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1588:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l.sl_name.bv_len = strlen(path) + STRLENOF("PATH=");
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1610:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l.sl_name.bv_len = strlen( l.sl_name.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1621:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l.sl_name.bv_len = strlen(s) + sizeof("IP=[]:65535");
data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1625:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l.sl_name.bv_len = strlen( l.sl_name.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:166:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert( strlen( in->bv_val ) == in->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:204:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert( strlen( in->bv_val ) == in->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:441:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == val->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:499:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == val->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:557:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == val->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:616:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == val->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:676:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == val->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/dn.c:734:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		assert( strlen( val->bv_val ) == val->bv_len );
data/openldap-2.4.56+dfsg/servers/slapd/extended.c:288:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		oidm.bv_len = strlen( oidm.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/main.c:567:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				opt.bv_len = strlen( optarg );
data/openldap-2.4.56+dfsg/servers/slapd/main.c:670:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l = strlen( optarg );
data/openldap-2.4.56+dfsg/servers/slapd/main.c:936:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if ( read( waitfds[0], buf, 1 ) != 1 )
data/openldap-2.4.56+dfsg/servers/slapd/module.c:179:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(file_name));
data/openldap-2.4.56+dfsg/servers/slapd/mr.c:70:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( mrname );
data/openldap-2.4.56+dfsg/servers/slapd/mr.c:116:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		mir->mir_name.bv_len = strlen( smr->smr_oid );
data/openldap-2.4.56+dfsg/servers/slapd/mr.c:132:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mir->mir_name.bv_len = strlen( *names );
data/openldap-2.4.56+dfsg/servers/slapd/mr.c:249:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	smr->smr_oidlen = strlen( mr->mr_oid );
data/openldap-2.4.56+dfsg/servers/slapd/mr.c:512:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nval.bv_len = strlen(mr->smr_oid);
data/openldap-2.4.56+dfsg/servers/slapd/mr.c:543:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nval.bv_len = strlen(mru->smru_oid);
data/openldap-2.4.56+dfsg/servers/slapd/oc.c:172:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( ocname );
data/openldap-2.4.56+dfsg/servers/slapd/oc.c:649:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			oir->oir_name.bv_len = strlen( *names );
data/openldap-2.4.56+dfsg/servers/slapd/oc.c:756:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	soc->soc_cname.bv_len = strlen( soc->soc_cname.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:59:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int suflen = strlen(oid + pos);
data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:155:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	om->som_oid.bv_len = strlen( om->som_oid.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2449:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy( normalized->bv_val + len-1, "Z" );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:192:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				bv.bv_len += strlen(tstr);
data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:396:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					ber_len_t len = strlen( ap.lud->lud_filter );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:784:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tempstr.bv_val = ch_malloc( strlen( lud->lud_filter ) + 1 );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1826:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	op->ors_filterstr.bv_len = strlen(filter_str);
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:592:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( pp->pwdCheckModule, a->a_vals[0].bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:894:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nlen = strlen(str);
data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:1226:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			rdi.rdi_line.bv_len += strlen( c->argv[ i ] );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2019:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int	len = strlen( argv[ 0 ] );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:267:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	res = ch_calloc( sizeof( char ), strlen( s )
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:296:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen( p );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmdn.c:174:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			mdn.bv_len = strlen( mdn.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:841:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fstr->bv_len = strlen( fstr->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2136:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(val); \
data/openldap-2.4.56+dfsg/servers/slapd/referral.c:52:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bvin.bv_len = strlen( refDN );
data/openldap-2.4.56+dfsg/servers/slapd/referral.c:113:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy( muck.bv_val, ntargetDN.bv_val,
data/openldap-2.4.56+dfsg/servers/slapd/referral.c:242:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			jv->bv_len = strlen( jv->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/result.c:71:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen( text );
data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:330:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		val.bv_len = strlen( val.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:342:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			val.bv_len = strlen( val.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:968:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		flen = strlen( lud->lud_filter ) + 1;
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1054:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		rc = strlen( filter );
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1131:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(SASL_CONFIGPATH) + 1 /* colon */ +
data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1132:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(sasl_default_configpath) + 1 /* \0 */;
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:318:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( buf, in->bv_val, sizeof( buf ) );
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:626:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( buf, val->bv_val, sizeof( buf ) );
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:839:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		normalized->bv_len = strlen( normalized->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1056:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( buf, uri->bv_val, sizeof( buf ) );
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1436:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bva[i].bv_len = idx.bv_len + strlen( SaslRegexp[i].sr_match ) +
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1437:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			strlen( SaslRegexp[i].sr_replace ) + 5;
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1486:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( out->bv_val+insert, rep + off[n-1] + 2, len);
data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1494:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy( out->bv_val+insert, saslname + str[i].rm_so, len );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2044:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for ( c = nval->bv_val, i = 0;  i < count; i++, c += strlen(c) + 1 ) {
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2153:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen( c );
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2213:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(c);
data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5704:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy( normalized->bv_val + len-1, "Z" );
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:160:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    line[ strlen( line ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:171:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	line[ strlen( line ) - 1 ] = '\0';
data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:316:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			val.bv_len = strlen( val.bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:298:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	leakfilename = malloc( strlen( progname ) + STRLENOF( ".leak" ) + 1 );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c:425:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pTmpExtOp->ext_oid.bv_len = strlen( pTmpOIDs[i] );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c:735:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			bv.bv_len += strlen(argv[j]);
data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:83:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( fmt[ strlen( fmt ) - 1 ] != '\n' ) {
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:141:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sdn->dn.bv_len = strlen( dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:156:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sdn->dn.bv_len = strlen( dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:182:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sdn->ndn.bv_len = strlen( ndn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:197:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sdn->ndn.bv_len = strlen( ndn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:403:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bv.bv_len = strlen( dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:584:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(type) + 1 + strlen( value );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:584:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(type) + 1 + strlen( value );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:857:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = ( value != NULL ) ? strlen( bv.bv_val ) : 0;
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:1119:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pb->pb_op->ors_filterstr.bv_len = strlen((char *)value);
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:1157:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				an[j].an_name.bv_len = strlen( attrs[i] );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:1193:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pb->pb_op->ore_reqoid.bv_len = strlen((char *)value);
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:178:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dn.bv_len = strlen( ldn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:406:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( value );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:427:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bv.bv_len = strlen(value);
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:549:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mod.sm_type.bv_len = strlen( type );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:611:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mod.sm_type.bv_len = strlen( type );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:679:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	val.bv_len = strlen( value );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:691:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	val.bv_len = strlen( value );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:801:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bdn.bv_len = strlen( dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:819:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bdn.bv_len = strlen( dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:841:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bdn.bv_len = strlen( dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:844:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bsuffix.bv_len = strlen( suffix );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:879:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assertedParentDN.bv_len = strlen( parentdn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:888:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	childDN.bv_len = strlen( childdn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:927:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dn.bv_len = strlen( _dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:960:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ndn.bv_len = strlen( ldn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:994:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dn.bv_len = strlen( ldn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:1109:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return strlen( s );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:1402:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			an[j].an_name.bv_len = strlen( attrs[i] );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2320:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( s );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2341:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	v->bv_len = strlen( s );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2409:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	slapi_value_set( value, (void *)strVal, strlen( strVal ) );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2776:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					mod->sml_values[i].bv_len = strlen( lmod->mod_values[i] );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3136:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	parent_dn.bv_len = strlen( dn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3139:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newrdn.bv_len = strlen( rdn );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3254:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bv.bv_len = strlen( uniqueid );
data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3269:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size += strlen( ldaphost );
data/openldap-2.4.56+dfsg/servers/slapd/slappasswd.c:253:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		passwd.bv_len = strlen(passwd.bv_val);
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:1863:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sdn->bv_len = strlen( sdn->bv_val );
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5359:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if ( strlen(s) == 1 && *s == '*' ) {
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5363:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if ( strlen(s) == 1 && *s == '+' ) {
data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5856:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ( WHATSLEFT <= STRLENOF( " " ATTRSSTR "=\":include:" "\"" ) + strlen( si->si_anfile ) ) return;
data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:200:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ssyn->ssyn_oidlen = strlen(syn->syn_oid);
data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:358:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nval.bv_len = strlen(syn->ssyn_oid);
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:60:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen( backend );
data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:173:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		line_len = strlen( line );
data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:125:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			passwd.bv_len = strlen( optarg );
data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:302:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			addmodifyop( mods, LDAP_MOD_ADD, line, value, strlen( value ));
data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c:119:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			passwd.bv_len = strlen( optarg );
data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:120:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			passwd.bv_len = strlen( optarg );
data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:230:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			passwd.bv_len = strlen( optarg );
data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:151:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			passwd.bv_len = strlen( optarg );
data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:160:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			passwd.bv_len = strlen( optarg );
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:80:26:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
#define	ArgDup(x) strdup(strcat(strcat(strcpy(argbuf,"\""),x),"\""))
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:80:40:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
#define	ArgDup(x) strdup(strcat(strcat(strcpy(argbuf,"\""),x),"\""))
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:357:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			memset( optarg, '*', strlen( optarg ) );
data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:405:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		} else if ( !strncasecmp( file->d_name, TADDFILE, strlen( TADDFILE ))

ANALYSIS SUMMARY:

Hits = 2355
Lines analyzed = 401428 in approximately 9.66 seconds (41559 lines/second)
Physical Source Lines of Code (SLOC) = 300002
Hits@level = [0] 2558 [1] 581 [2] 1341 [3]  48 [4] 382 [5]   3
Hits@level+ = [0+] 4913 [1+] 2355 [2+] 1774 [3+] 433 [4+] 385 [5+]   3
Hits/KSLOC@level+ = [0+] 16.3766 [1+] 7.84995 [2+] 5.91329 [3+] 1.44332 [4+] 1.28332 [5+] 0.00999993
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.