Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/openmx-3.8.5+dfsg1/source/unit2xyz.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_CentGreen.c
Examining data/openmx-3.8.5+dfsg1/source/MD_pac.c
Examining data/openmx-3.8.5+dfsg1/source/Make_FracCoord.c
Examining data/openmx-3.8.5+dfsg1/source/PrintMemory_Fix.c
Examining data/openmx-3.8.5+dfsg1/source/PhiF.c
Examining data/openmx-3.8.5+dfsg1/source/XC_Ceperly_Alder.c
Examining data/openmx-3.8.5+dfsg1/source/xyz2spherical.c
Examining data/openmx-3.8.5+dfsg1/source/exx_index.c
Examining data/openmx-3.8.5+dfsg1/source/test_mpi4.c
Examining data/openmx-3.8.5+dfsg1/source/Total_Energy.c
Examining data/openmx-3.8.5+dfsg1/source/exx_xc.h
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_CentOverlap.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_CentGreenLesser.c
Examining data/openmx-3.8.5+dfsg1/source/Free_Arrays.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstedc3.c
Examining data/openmx-3.8.5+dfsg1/source/Overlap_Band.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c
Examining data/openmx-3.8.5+dfsg1/source/Mulliken_Charge.c
Examining data/openmx-3.8.5+dfsg1/source/FT_NLP.c
Examining data/openmx-3.8.5+dfsg1/source/EigenBand_lapack.c
Examining data/openmx-3.8.5+dfsg1/source/Voronoi_Orbital_Moment.c
Examining data/openmx-3.8.5+dfsg1/source/expao.c
Examining data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c
Examining data/openmx-3.8.5+dfsg1/source/neb.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstegr3.c
Examining data/openmx-3.8.5+dfsg1/source/Nonlocal_RadialF.c
Examining data/openmx-3.8.5+dfsg1/source/read_scfout.h
Examining data/openmx-3.8.5+dfsg1/source/Band_DFT_Col_ScaLAPACK.c
Examining data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Deallocate_RestartFile.c
Examining data/openmx-3.8.5+dfsg1/source/analysis_example.c
Examining data/openmx-3.8.5+dfsg1/source/mpi_multi_world.c
Examining data/openmx-3.8.5+dfsg1/source/DFTDvdW_init.c
Examining data/openmx-3.8.5+dfsg1/source/Hamiltonian_Band.c
Examining data/openmx-3.8.5+dfsg1/source/Cutoff.c
Examining data/openmx-3.8.5+dfsg1/source/Maketest.c
Examining data/openmx-3.8.5+dfsg1/source/io_tester.c
Examining data/openmx-3.8.5+dfsg1/source/Force.c
Examining data/openmx-3.8.5+dfsg1/source/exx_file_overlap.h
Examining data/openmx-3.8.5+dfsg1/source/Mixing_DM.c
Examining data/openmx-3.8.5+dfsg1/source/FT_PAO.c
Examining data/openmx-3.8.5+dfsg1/source/cube2xsf.c
Examining data/openmx-3.8.5+dfsg1/source/truncation.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_SurfGreen.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Print.c
Examining data/openmx-3.8.5+dfsg1/source/Find_CGrids.c
Examining data/openmx-3.8.5+dfsg1/source/zero_fermi.c
Examining data/openmx-3.8.5+dfsg1/source/test_openmp2.c
Examining data/openmx-3.8.5+dfsg1/source/Eigen_PHH.c
Examining data/openmx-3.8.5+dfsg1/source/cellopt.c
Examining data/openmx-3.8.5+dfsg1/source/iterout.c
Examining data/openmx-3.8.5+dfsg1/source/Gauss_Legendre.c
Examining data/openmx-3.8.5+dfsg1/source/Smoothing_Func.c
Examining data/openmx-3.8.5+dfsg1/source/Eigen_lapack.c
Examining data/openmx-3.8.5+dfsg1/source/Cont_Matrix4.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstevx1.c
Examining data/openmx-3.8.5+dfsg1/source/Set_Allocate_Atom2CPU.c
Examining data/openmx-3.8.5+dfsg1/source/Voronoi_Charge.c
Examining data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c
Examining data/openmx-3.8.5+dfsg1/source/exx_vector.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Functions.c
Examining data/openmx-3.8.5+dfsg1/source/Set_ProExpn_VNA.c
Examining data/openmx-3.8.5+dfsg1/source/exx_debug.h
Examining data/openmx-3.8.5+dfsg1/source/Set_Orbitals_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/tran_variables.h
Examining data/openmx-3.8.5+dfsg1/source/KumoF.c
Examining data/openmx-3.8.5+dfsg1/source/test_mpi.c
Examining data/openmx-3.8.5+dfsg1/source/AngularF.c
Examining data/openmx-3.8.5+dfsg1/source/Cont_Matrix0.c
Examining data/openmx-3.8.5+dfsg1/source/VNAF.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_GridBound.c
Examining data/openmx-3.8.5+dfsg1/source/exx_xc.c
Examining data/openmx-3.8.5+dfsg1/source/Inputtools.h
Examining data/openmx-3.8.5+dfsg1/source/add_gcube.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Output_Trans_HS.c
Examining data/openmx-3.8.5+dfsg1/source/exx_index.h
Examining data/openmx-3.8.5+dfsg1/source/test_mpi2.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstevx5.c
Examining data/openmx-3.8.5+dfsg1/source/Eigen_lapack3.c
Examining data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c
Examining data/openmx-3.8.5+dfsg1/source/XC_EX.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_CentOverlap_NC.c
Examining data/openmx-3.8.5+dfsg1/source/Dr_VNAF.c
Examining data/openmx-3.8.5+dfsg1/source/Set_Density_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/Tetrahedron_Blochl.c
Examining data/openmx-3.8.5+dfsg1/source/find_Emin_withS.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_DFT_NC.c
Examining data/openmx-3.8.5+dfsg1/source/find_Emin.c
Examining data/openmx-3.8.5+dfsg1/source/Mixing_H.c
Examining data/openmx-3.8.5+dfsg1/source/BentNT.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Deallocate_Electrode_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/Allocate_Arrays.c
Examining data/openmx-3.8.5+dfsg1/source/Pot_NeutralAtom.c
Examining data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c
Examining data/openmx-3.8.5+dfsg1/source/Lapack_LU_inverse.c
Examining data/openmx-3.8.5+dfsg1/source/dampingF.c
Examining data/openmx-3.8.5+dfsg1/source/Gaunt.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstegr2.c
Examining data/openmx-3.8.5+dfsg1/source/Hamiltonian_Cluster_NC.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_Value.c
Examining data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c
Examining data/openmx-3.8.5+dfsg1/source/Init_List_YOUSO.c
Examining data/openmx-3.8.5+dfsg1/source/rot.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Output_HKS_Write_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/jx.c
Examining data/openmx-3.8.5+dfsg1/source/Hamiltonian_Cluster_SO.c
Examining data/openmx-3.8.5+dfsg1/source/Contract_Hamiltonian.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_SelfEnergy.c
Examining data/openmx-3.8.5+dfsg1/source/diff_gcube.c
Examining data/openmx-3.8.5+dfsg1/source/Mio_tester.c
Examining data/openmx-3.8.5+dfsg1/source/LU_inverse.c
Examining data/openmx-3.8.5+dfsg1/source/Set_Aden_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/Initial_CntCoes2.c
Examining data/openmx-3.8.5+dfsg1/source/Poisson.c
Examining data/openmx-3.8.5+dfsg1/source/MTRAN_EigenChannel.c
Examining data/openmx-3.8.5+dfsg1/source/tran_prototypes.h
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstedc1.c
Examining data/openmx-3.8.5+dfsg1/source/Initial_CntCoes.c
Examining data/openmx-3.8.5+dfsg1/source/bandgnu13.c
Examining data/openmx-3.8.5+dfsg1/source/Stress.c
Examining data/openmx-3.8.5+dfsg1/source/Get_Orbitals.c
Examining data/openmx-3.8.5+dfsg1/source/OutData_Binary.c
Examining data/openmx-3.8.5+dfsg1/source/GR_Pulay_DM.c
Examining data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c
Examining data/openmx-3.8.5+dfsg1/source/Get_Cnt_dOrbitals.c
Examining data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_adjust_Ngrid.c
Examining data/openmx-3.8.5+dfsg1/source/exx_step2.h
Examining data/openmx-3.8.5+dfsg1/source/md2axsf.c
Examining data/openmx-3.8.5+dfsg1/source/Inputtools.c
Examining data/openmx-3.8.5+dfsg1/source/bin2txt.c
Examining data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c
Examining data/openmx-3.8.5+dfsg1/source/exx_interface_openmx.h
Examining data/openmx-3.8.5+dfsg1/source/exx.h
Examining data/openmx-3.8.5+dfsg1/source/DosMain.c
Examining data/openmx-3.8.5+dfsg1/source/Cont_Matrix1.c
Examining data/openmx-3.8.5+dfsg1/source/Get_OneD_HS_Col.c
Examining data/openmx-3.8.5+dfsg1/source/rmmpi.c
Examining data/openmx-3.8.5+dfsg1/source/Set_Initial_DM.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_CurrentDensity.c
Examining data/openmx-3.8.5+dfsg1/source/analysis_example_original.c
Examining data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c
Examining data/openmx-3.8.5+dfsg1/source/Set_Vpot.c
Examining data/openmx-3.8.5+dfsg1/source/Band_DFT_NonCol.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Output_HKS.c
Examining data/openmx-3.8.5+dfsg1/source/ADIIS_Mixing_DM.c
Examining data/openmx-3.8.5+dfsg1/source/deri_dampingF.c
Examining data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c
Examining data/openmx-3.8.5+dfsg1/source/Timetool.c
Examining data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c
Examining data/openmx-3.8.5+dfsg1/source/Bench_MatMul.c
Examining data/openmx-3.8.5+dfsg1/source/Eigen_lapack2.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_Hopping_G.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Allocate_NC.c
Examining data/openmx-3.8.5+dfsg1/source/init.c
Examining data/openmx-3.8.5+dfsg1/source/Force_test.c
Examining data/openmx-3.8.5+dfsg1/source/f77func.h
Examining data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_Rhok.c
Examining data/openmx-3.8.5+dfsg1/source/polB.c
Examining data/openmx-3.8.5+dfsg1/source/Poisson_ESM.c
Examining data/openmx-3.8.5+dfsg1/source/Set_Nonlocal.c
Examining data/openmx-3.8.5+dfsg1/source/XC_PW92C.c
Examining data/openmx-3.8.5+dfsg1/source/Get_Cnt_Orbitals.c
Examining data/openmx-3.8.5+dfsg1/source/openmx_common.h
Examining data/openmx-3.8.5+dfsg1/source/Set_Hamiltonian.c
Examining data/openmx-3.8.5+dfsg1/source/Eigen_PReHH.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Distribute_Node.c
Examining data/openmx-3.8.5+dfsg1/source/QuickSort.c
Examining data/openmx-3.8.5+dfsg1/source/openmx.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstevx3.c
Examining data/openmx-3.8.5+dfsg1/source/Nonlocal_Basis.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/exx_step1.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_prototypes.h
Examining data/openmx-3.8.5+dfsg1/source/PrintMemory.c
Examining data/openmx-3.8.5+dfsg1/source/SCF2File.c
Examining data/openmx-3.8.5+dfsg1/source/exx_log.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_SurfGreen_Sanvito.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dsteqr1.c
Examining data/openmx-3.8.5+dfsg1/source/test_openmp3.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstedc2.c
Examining data/openmx-3.8.5+dfsg1/source/exx_step1.h
Examining data/openmx-3.8.5+dfsg1/source/FT_ProductPAO.c
Examining data/openmx-3.8.5+dfsg1/source/exx_file_overlap.c
Examining data/openmx-3.8.5+dfsg1/source/Hamiltonian_Cluster.c
Examining data/openmx-3.8.5+dfsg1/source/exx_step2.c
Examining data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c
Examining data/openmx-3.8.5+dfsg1/source/zero_cfrac.c
Examining data/openmx-3.8.5+dfsg1/source/Dr_RadialF.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Check_Region_Lead.c
Examining data/openmx-3.8.5+dfsg1/source/Runtest.c
Examining data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Add_Density_Lead.c
Examining data/openmx-3.8.5+dfsg1/source/exx_vector.h
Examining data/openmx-3.8.5+dfsg1/source/Spherical_Bessel.c
Examining data/openmx-3.8.5+dfsg1/source/check_lead.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_SurfOverlap.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_Electrode_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/Overlap_Cluster.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Allocate.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Calc_OneTransmission.c
Examining data/openmx-3.8.5+dfsg1/source/ReLU_inverse.c
Examining data/openmx-3.8.5+dfsg1/source/Make_Comm_Worlds.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c
Examining data/openmx-3.8.5+dfsg1/source/Dr_KumoF.c
Examining data/openmx-3.8.5+dfsg1/source/exx_file_eri.h
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstevx4.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c
Examining data/openmx-3.8.5+dfsg1/source/neb_check.c
Examining data/openmx-3.8.5+dfsg1/source/VH_AtomF.c
Examining data/openmx-3.8.5+dfsg1/source/Simple_Mixing_DM.c
Examining data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_DM.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Credit.c
Examining data/openmx-3.8.5+dfsg1/source/DFTD3vdW_init.c
Examining data/openmx-3.8.5+dfsg1/source/openmx_common.c
Examining data/openmx-3.8.5+dfsg1/source/Output_Energy_Decomposition.c
Examining data/openmx-3.8.5+dfsg1/source/read_scfout.c
Examining data/openmx-3.8.5+dfsg1/source/Force_HNL.c
Examining data/openmx-3.8.5+dfsg1/source/Opt_Contraction.c
Examining data/openmx-3.8.5+dfsg1/source/Band_DFT_Col.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c
Examining data/openmx-3.8.5+dfsg1/source/intensity_map.c
Examining data/openmx-3.8.5+dfsg1/source/mimic_sse.h
Examining data/openmx-3.8.5+dfsg1/source/diff_geo.c
Examining data/openmx-3.8.5+dfsg1/source/Krylov.c
Examining data/openmx-3.8.5+dfsg1/source/FT_VNA.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_SurfOverlap_NC.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Apply_Bias2e.c
Examining data/openmx-3.8.5+dfsg1/source/EulerAngle_Spin.c
Examining data/openmx-3.8.5+dfsg1/source/outputfile1.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_sf.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_ll.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_gtbl.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_def.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/eri_sbt.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/log/eri_fsbt.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/log/eri_logfsbt.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/log/eri_fsbt.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/log/eri_logfsbt.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/linear/eri_linfsbt.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/linear/eri_linfsbt.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/sbt/eri_sbt.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_sf.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_interpolate.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_interpolate.h
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_gtbl.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/test/test.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/demo/demo.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_test4.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_test3.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_test1.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_test2.c
Examining data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.h
Examining data/openmx-3.8.5+dfsg1/source/exx_interface_openmx.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Read.c
Examining data/openmx-3.8.5+dfsg1/source/Output_CompTime.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_IntegPath.c
Examining data/openmx-3.8.5+dfsg1/source/find_Emin0.c
Examining data/openmx-3.8.5+dfsg1/source/Stress_test.c
Examining data/openmx-3.8.5+dfsg1/source/Fuzzy_Weight.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstegr1.c
Examining data/openmx-3.8.5+dfsg1/source/exx_def_openmx.h
Examining data/openmx-3.8.5+dfsg1/source/RadialF.c
Examining data/openmx-3.8.5+dfsg1/source/pdb2pao.c
Examining data/openmx-3.8.5+dfsg1/source/iterout_md.c
Examining data/openmx-3.8.5+dfsg1/source/FT_ProExpn_VNA.c
Examining data/openmx-3.8.5+dfsg1/source/mimic_sse.c
Examining data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Input_std.c
Examining data/openmx-3.8.5+dfsg1/source/Mio_tester2.c
Examining data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c
Examining data/openmx-3.8.5+dfsg1/source/Hamiltonian_Cluster_Hs.c
Examining data/openmx-3.8.5+dfsg1/source/Dr_VH_AtomF.c
Examining data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c
Examining data/openmx-3.8.5+dfsg1/source/exx_rhox.h
Examining data/openmx-3.8.5+dfsg1/source/TRAN_DFT.c
Examining data/openmx-3.8.5+dfsg1/source/Set_OLP_Kin.c
Examining data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c
Examining data/openmx-3.8.5+dfsg1/source/Get_dOrbitals.c
Examining data/openmx-3.8.5+dfsg1/source/Contract_iHNL.c
Examining data/openmx-3.8.5+dfsg1/source/File_CntCoes.c
Examining data/openmx-3.8.5+dfsg1/source/RF_BesselF.c
Examining data/openmx-3.8.5+dfsg1/source/malloc_multidimarray.c
Examining data/openmx-3.8.5+dfsg1/source/Cont_Matrix3.c
Examining data/openmx-3.8.5+dfsg1/source/Eff_Hub_Pot.c
Examining data/openmx-3.8.5+dfsg1/source/BroadCast_ReMatrix.c
Examining data/openmx-3.8.5+dfsg1/source/find_Emin2.c
Examining data/openmx-3.8.5+dfsg1/source/Cont_Matrix2.c
Examining data/openmx-3.8.5+dfsg1/source/test_mpi3.c
Examining data/openmx-3.8.5+dfsg1/source/init_alloc_first.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Add_ADensity_Lead.c
Examining data/openmx-3.8.5+dfsg1/source/exx_file_eri.c
Examining data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ON2.c
Examining data/openmx-3.8.5+dfsg1/source/mpao.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Check_Region.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c
Examining data/openmx-3.8.5+dfsg1/source/mpi_multi_world2.c
Examining data/openmx-3.8.5+dfsg1/source/Hamiltonian_Band_NC.c
Examining data/openmx-3.8.5+dfsg1/source/test_openmp.c
Examining data/openmx-3.8.5+dfsg1/source/Kerker_Mixing_Rhok.c
Examining data/openmx-3.8.5+dfsg1/source/NBO_Cluster.c
Examining data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c
Examining data/openmx-3.8.5+dfsg1/source/EC.c
Examining data/openmx-3.8.5+dfsg1/source/DFT.c
Examining data/openmx-3.8.5+dfsg1/source/exx_rhox.c
Examining data/openmx-3.8.5+dfsg1/source/frac2xyz.c
Examining data/openmx-3.8.5+dfsg1/source/mpi_non_blocking.c
Examining data/openmx-3.8.5+dfsg1/source/exx_log.h
Examining data/openmx-3.8.5+dfsg1/source/OutData.c
Examining data/openmx-3.8.5+dfsg1/source/exx_debug.c
Examining data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c
Examining data/openmx-3.8.5+dfsg1/source/dtime.c
Examining data/openmx-3.8.5+dfsg1/source/BroadCast_ComplexMatrix.c
Examining data/openmx-3.8.5+dfsg1/source/readfile.c
Examining data/openmx-3.8.5+dfsg1/source/NBO_Krylov.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_RestartFile.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Poisson.c
Examining data/openmx-3.8.5+dfsg1/source/esp.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Check_Input.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c
Examining data/openmx-3.8.5+dfsg1/source/Set_XC_Grid.c
Examining data/openmx-3.8.5+dfsg1/source/TRAN_Set_MP.c
Examining data/openmx-3.8.5+dfsg1/source/XC_CA_LSDA.c
Examining data/openmx-3.8.5+dfsg1/source/neb_run.c
Examining data/openmx-3.8.5+dfsg1/source/exx.c
Examining data/openmx-3.8.5+dfsg1/source/lapack_dstevx2.c
Examining data/openmx-3.8.5+dfsg1/source/XC_PBE.c
Examining data/openmx-3.8.5+dfsg1/source/Input_std.c
Examining data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c

FINAL RESULTS:

data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:228:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* Atom= */
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:231:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* L= */
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:234:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* Mul= */
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:237:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* p= */
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:580:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s1,str1);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:581:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s2,str2);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:657:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf); 
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:697:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:735:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:769:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ret,defval);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:772:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:779:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ret,val_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:809:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:846:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret[i],defval[i]);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:850:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:856:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",ret[i])!=1) {goto ERROR;}
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:895:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:901:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:942:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:951:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:985:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:1006:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1049:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1114:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_ev,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1195:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_fermi,"%s%s.FermiSurf%d.bxsf",filepath,filename,spin);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2429:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2500:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_ev,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2560:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_fermi,"%s%s.FermiSurf.bxsf",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3300:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3315:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev,"%s%s.Dos.vec%d",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3928:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_ev0,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3935:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_ev,"%s%s.Dos.vec%d",filepath,filename,ID);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3966:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_ev,"%s%s.Dos.vec%d",filepath,filename,ID);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4008:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_fermi,"%s%s.FermiSurf%d.bxsf",filepath,filename,spin);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4811:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4826:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev,"%s%s.Dos.vec%d",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5532:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_ev0,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5539:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_ev,"%s%s.Dos.vec%d",filepath,filename,ID);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5568:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_ev,"%s%s.Dos.vec%d",filepath,filename,ID);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5608:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_fermi,"%s%s.FermiSurf.bxsf",filepath,filename);
data/openmx-3.8.5+dfsg1/source/DFT.c:2930:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s_SCF_keywords",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:2997:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:3003:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev, "%s%s.Dos.vec%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:3129:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:3135:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev, "%s%s.Dos.vec%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:838:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:892:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev, "%s%s.Dos.vec%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:1862:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:1922:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev, "%s%s.Dos.vec%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/DosMain.c:341:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(r0,c+1);
data/openmx-3.8.5+dfsg1/source/DosMain.c:344:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(r0,s0);
data/openmx-3.8.5+dfsg1/source/DosMain.c:380:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.DOS.Histgram",basename);
data/openmx-3.8.5+dfsg1/source/DosMain.c:501:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.DOS.Gaussian",basename);
data/openmx-3.8.5+dfsg1/source/DosMain.c:681:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.DOS.Gaussian",basename);
data/openmx-3.8.5+dfsg1/source/DosMain.c:850:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"DOS.%s",extension);
data/openmx-3.8.5+dfsg1/source/DosMain.c:853:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.DOS.%s",basename,extension);
data/openmx-3.8.5+dfsg1/source/DosMain.c:1000:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.DOS.Tetrahedron",basename);
data/openmx-3.8.5+dfsg1/source/DosMain.c:1277:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file_Dos,"%s.%s.atom%d.%s%d",basename,extension,pdos_atoms[iatom],Lname[L],M+1);
data/openmx-3.8.5+dfsg1/source/DosMain.c:1377:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.%s.atom%d",basename,extension,pdos_atoms[iatom]);
data/openmx-3.8.5+dfsg1/source/DosMain.c:1627:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file_Dos,"%s.%s.atom%d.%s%d",basename,extension,pdos_atoms[iatom],
data/openmx-3.8.5+dfsg1/source/DosMain.c:1725:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.%s.atom%d",basename,extension,pdos_atoms[iatom]);
data/openmx-3.8.5+dfsg1/source/DosMain.c:1868:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(file_Dos,extension);
data/openmx-3.8.5+dfsg1/source/DosMain.c:1871:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.%s",basename,extension);
data/openmx-3.8.5+dfsg1/source/DosMain.c:2067:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file_Dos,"%s.%s.atom%d.%s%d",basename,extension,pdos_atoms[iatom],
data/openmx-3.8.5+dfsg1/source/DosMain.c:2172:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.%s.atom%d",basename,extension,pdos_atoms[iatom]);
data/openmx-3.8.5+dfsg1/source/DosMain.c:2378:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file_Dos,"%s.PDOS.%s.atom%d.%s%d",
data/openmx-3.8.5+dfsg1/source/DosMain.c:2480:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_Dos,"%s.PDOS.%s.atom%d",basename,extension,pdos_atoms[iatom]);
data/openmx-3.8.5+dfsg1/source/DosMain.c:3273:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf2,buf);
data/openmx-3.8.5+dfsg1/source/EC.c:5523:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/EC.c:5529:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev, "%s%s.Dos.vec%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/EC.c:5655:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/EC.c:5661:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev, "%s%s.Dos.vec%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/FT_NLP.c:80:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileFT,"%s%s_rst/%s.ftnlp",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_NLP.c:245:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileFT,"%s%s_rst/%s.ftnlp",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_PAO.c:83:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileFT,"%s%s_rst/%s.ftpao",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_PAO.c:239:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"%s%s_rst",filepath,filename);
data/openmx-3.8.5+dfsg1/source/FT_PAO.c:242:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileFT,"%s%s_rst/%s.ftpao",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_ProExpn_VNA.c:90:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileFT,"%s%s_rst/%s.ftPEvna",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_ProExpn_VNA.c:264:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileFT,"%s%s_rst/%s.ftPEvna",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_ProductPAO.c:93:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileFT,"%s%s_rst/%s.ftProPAO",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_ProductPAO.c:327:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileFT,"%s%s_rst/%s.ftProPAO",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_VNA.c:88:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileFT,"%s%s_rst/%s.ftCvna",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/FT_VNA.c:227:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileFT,"%s%s_rst/%s.ftCvna",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:66:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileCC,"%s%s.ccs%i",filepath,filename,Gc_AN);
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:125:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileCC,"%s%s.ccs%i",filepath,filename,Gc_AN);
data/openmx-3.8.5+dfsg1/source/Force_test.c:87:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Force_test.c:90:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Force_test.c:99:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(operate,"rm %s",fname2);
data/openmx-3.8.5+dfsg1/source/Force_test.c:100:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(operate);
data/openmx-3.8.5+dfsg1/source/Force_test.c:177:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp0,"%s",fname_dat);
data/openmx-3.8.5+dfsg1/source/Force_test.c:182:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"./openmx %s -forcetest2 %i ",fname_dat,force_flag);
data/openmx-3.8.5+dfsg1/source/Force_test.c:198:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmp_argv,argv[3]); 
data/openmx-3.8.5+dfsg1/source/Force_test.c:201:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(str[0],"%s",tp);
data/openmx-3.8.5+dfsg1/source/Force_test.c:207:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(str[p],"%s",tp); 
data/openmx-3.8.5+dfsg1/source/Force_test.c:212:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"%s %s %s %s %s %s %s -forcetest2 %i",
data/openmx-3.8.5+dfsg1/source/Force_test.c:217:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/Force_test.c:229:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Force_test.c:232:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:1838:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname,"%s%s.kpt",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2196:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.eigen",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2376:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.eigen",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2377:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname2,"%s%s.eig",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2453:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname4,"%s%s.win",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2755:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname,"%s%s.mmn",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2823:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.mmn",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:3046:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname,"%s%s.amn",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:4666:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.amn",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:7940:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s.wfinfo",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:9051:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.HWR",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:9170:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.Wannier_Band",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:10130:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.mlwf%i_%i_r.cube",
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:10221:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.mlwf%i_%i_i.cube", 
data/openmx-3.8.5+dfsg1/source/Input_std.c:210:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(buf,"%s %s %s %lf",SpeName[i],SpeBasis[i],SpeVPS[i],&Spe_AtomicMass[i]);
data/openmx-3.8.5+dfsg1/source/Input_std.c:765:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",Species);
data/openmx-3.8.5+dfsg1/source/Input_std.c:769:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          fscanf(fp,"%s %lf", buf, &SO_factor[j][l]) ;
data/openmx-3.8.5+dfsg1/source/Input_std.c:801:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp,"%s",Species);
data/openmx-3.8.5+dfsg1/source/Input_std.c:1207:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/Input_std.c:1278:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/Input_std.c:1921:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",Species);
data/openmx-3.8.5+dfsg1/source/Input_std.c:1926:6:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	    fscanf(fp,"%s %lf", buf, &Hub_U_Basis[j][l][mul]) ;
data/openmx-3.8.5+dfsg1/source/Input_std.c:1995:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_check,"%s%s_rst/%s.crst_check",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/Input_std.c:2084:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        fscanf(fp,"%d %lf %lf %lf %lf %lf %lf %s %s",
data/openmx-3.8.5+dfsg1/source/Input_std.c:2569:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        fscanf(fp,"%s %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/Input_std.c:2872:4:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  fscanf(fp,"%s %lf %lf %lf  %lf %lf %lf  %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/Input_std.c:2926:4:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  fscanf(fp,"%s %lf %lf %lf  %lf %lf %lf  %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/Input_std.c:3136:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_check,"%s%s.mmn",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Input_std.c:3431:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fileCD,"%s%s_rst/%s.crst%i_%i_%i",filepath,filename,filename,spin,ID,i);
data/openmx-3.8.5+dfsg1/source/Input_std.c:3457:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileCD,"%s%s_rst/%s.crst%i_%i_%i",filepath,filename,filename,spin,myid,i);
data/openmx-3.8.5+dfsg1/source/Input_std.c:4495:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(DirPAO,"%s/PAO/",DFT_DATA_PATH);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:99:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s1,str1);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:100:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s2,str2);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:176:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf); 
data/openmx-3.8.5+dfsg1/source/Inputtools.c:216:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:254:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:288:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ret,defval);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:291:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:298:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ret,val_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:329:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:371:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret[i],defval[i]);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:375:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:381:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",ret[i])!=1) {goto ERROR;}
data/openmx-3.8.5+dfsg1/source/Inputtools.c:420:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:426:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/source/Inputtools.c:467:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:476:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/source/Inputtools.c:510:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:531:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/Krylov.c:5204:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Krylov.c:5210:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_ev, "%s%s.Dos.vec%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:235:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:570:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:648:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:720:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.SD1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:808:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:938:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.SD1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:994:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.SD1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1208:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1585:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.SD1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1629:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.RF1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1835:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.RF1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1889:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.RF1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2009:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.RF1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2061:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.DIIS1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2181:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.DIIS1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2234:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.BFGS1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2353:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.BFGS1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2403:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.EF1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2523:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.EF1",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2751:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3202:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3826:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4533:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4926:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.EF2",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5134:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5549:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt.EF2",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5721:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6142:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6295:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6536:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6732:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6932:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7035:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7152:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7229:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.ene",filepath,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7336:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7408:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_name,"%s%s_rst/%s.rst4gopt",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/Make_FracCoord.c:43:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname1,"%s%s.frac",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:88:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname1,"%s#",file);
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:392:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname1,"%s#",file);
data/openmx-3.8.5+dfsg1/source/Maketest.c:88:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(operate,"ls %s/*.dat > ls_dat000000",dir);
data/openmx-3.8.5+dfsg1/source/Maketest.c:89:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Maketest.c:92:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Maketest.c:107:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp0,"%s",fname_dat);
data/openmx-3.8.5+dfsg1/source/Maketest.c:109:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      if      (argc==2)  sprintf(operate,"./openmx %s",fname_dat);
data/openmx-3.8.5+dfsg1/source/Maketest.c:110:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      else if (argc==3)  sprintf(operate,"%s %s",argv[2],fname_dat);
data/openmx-3.8.5+dfsg1/source/Maketest.c:112:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/Maketest.c:117:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"cp %s.out %s/",fname_dat2,dir);
data/openmx-3.8.5+dfsg1/source/Maketest.c:118:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/Maketest.c:132:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Maketest.c:135:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:69:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:72:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:81:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(operate,"rm %s",fname2);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:82:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:101:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp0,"%s",fname_dat);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:106:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"./openmx %s -mltest2",fname_dat);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:122:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmp_argv,argv[2]); 
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:125:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(str[0],"%s",tp);  
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:132:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(str[p],"%s",tp);      
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:137:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"%s %s %s %s %s %s %s -mltest2",
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:141:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:150:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"cat ls_dat000004 >> %s",fname2);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:151:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:154:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:166:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:169:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:197:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(operate,"ps uxw > %s",fname0);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:198:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:213:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (fscanf(fp,"%s",tmpchar)!=EOF){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:313:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      if (fscanf(fp1,"%s",tmpchar)!=EOF){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:359:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(operate,"rm %s",fname0);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:360:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:362:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(operate,"rm %s",fname1);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:363:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:68:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.out",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:78:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname1,"%s%s.out",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:103:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname1,"%s%s.out",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:107:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname2,"%s%s.%s",filepath,filename,fexn[i]);
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:124:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fname,"%s%s.%s",filepath,filename,fexn[i]);
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:129:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(rm_operate,"%s",fname);
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:142:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"%s%s.ccs%i",filepath,filename,Gc_AN);
data/openmx-3.8.5+dfsg1/source/Mulliken_Charge.c:534:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_MC,"%s%s.MC",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:4811:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_DM_onsite,"%s%s.DM_onsite",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:5041:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_DM_onsite,"%s%s.DM_onsite",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:520:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_OM,"%s%s.OM",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:950:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_OM,"%s%s.OM",filepath,filename);
data/openmx-3.8.5+dfsg1/source/OutData.c:133:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname1,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/OutData.c:143:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fname1,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/OutData.c:146:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fname2,"%s%s.Dos.vec%i",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData.c:161:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fname2,"%s%s.Dos.vec%i",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData.c:169:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(operate,"cat %s%s.Dos.vec%i >  tmp1",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData.c:171:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(operate,"cat %s%s.Dos.vec%i >> tmp1",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData.c:173:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        system(operate);
data/openmx-3.8.5+dfsg1/source/OutData.c:175:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"%s%s.Dos.vec%i",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData.c:184:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"mv tmp1 %s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/OutData.c:185:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/OutData.c:222:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:223:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:224:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file3,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:225:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file4,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:226:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file11,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:232:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s%i",filepath,filename,file11,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:254:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s%i",filepath,filename,file1,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:283:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file2,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:298:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file3,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:313:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file4,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:333:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file10,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:350:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname,"%s%s%s",filepath,filename,file9);
data/openmx-3.8.5+dfsg1/source/OutData.c:394:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname,"%s%s%s",filepath,filename,file12);
data/openmx-3.8.5+dfsg1/source/OutData.c:455:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:461:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s%i",filepath,filename,file1,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:488:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:494:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s%i",filepath,filename,file1,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:529:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:530:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:636:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s%i",filepath,filename,file1,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:652:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file2,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:696:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:697:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:803:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s%i",filepath,filename,file1,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:819:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file2,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:1124:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.homo%i_%i_r%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:1126:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.homo%i_%i_i%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:1194:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.lumo%i_%i_r%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:1196:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.lumo%i_%i_i%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:1441:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(file1,"%s%s.NHO%i_%i%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:1519:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(file1,"%s%s.NBO-b%i_%i%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:1592:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(file1,"%s%s.NBO-a%i_%i%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:1722:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.homo%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:1740:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.homo%i_%i_i%s", 
data/openmx-3.8.5+dfsg1/source/OutData.c:1804:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.lumo%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:1822:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.lumo%i_%i_i%s", 
data/openmx-3.8.5+dfsg1/source/OutData.c:1965:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file1,"%s%s.homo%i_%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:1983:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file1,"%s%s.homo%i_%i_%i_i%s", 
data/openmx-3.8.5+dfsg1/source/OutData.c:2070:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	  sprintf(file1,"%s%s.lumo%i_%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:2089:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file1,"%s%s.lumo%i_%i_%i_i%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:2260:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(operate,"cat %s%s%s0 > %s%s%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:2262:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(operate);
data/openmx-3.8.5+dfsg1/source/OutData.c:2265:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"cat %s%s%s%i >> %s%s%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:2268:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/OutData.c:2309:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"%s%s%s%i",filepath,filename,fext,ID);
data/openmx-3.8.5+dfsg1/source/OutData.c:2431:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(operate,"cat %s%s%s0 > %s%s%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:2433:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(operate);
data/openmx-3.8.5+dfsg1/source/OutData.c:2436:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"cat %s%s%s%i >> %s%s%s",
data/openmx-3.8.5+dfsg1/source/OutData.c:2439:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/OutData.c:2444:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"%s%s%s%i",filepath,filename,fext,ID);
data/openmx-3.8.5+dfsg1/source/OutData.c:2489:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(DirPAO,"%s/PAO/",DFT_DATA_PATH);
data/openmx-3.8.5+dfsg1/source/OutData.c:2833:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fname2,"%s%s_%i%s",filepath,SpeName[wan],Gc_AN,ExtPAO);
data/openmx-3.8.5+dfsg1/source/OutData.c:3134:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:3135:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:3136:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file3,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData.c:3149:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s%i",filepath,filename,file1,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:3178:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file2,myid);
data/openmx-3.8.5+dfsg1/source/OutData.c:3193:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s%i",filepath,filename,file3,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:126:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(operate,"cat %s%s.Dos.vec%i >  tmp1",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:128:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(operate,"cat %s%s.Dos.vec%i >> tmp1",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:130:4:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	  system(operate);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:132:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(operate,"rm %s%s.Dos.vec%i",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:133:4:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	  system(operate);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:136:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(operate,"mv tmp1 %s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:137:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system(operate);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:145:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fname1,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:155:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:158:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname2,"%s%s.Dos.vec%i",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:169:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname2,"%s%s.Dos.vec%i",filepath,filename,i);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:209:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:210:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:211:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file3,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:212:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file4,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:213:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file11,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:219:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s_%0*i",filepath,filename,file11,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:245:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s_%0*i",filepath,filename,file1,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:278:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file2,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:297:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file3,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:316:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file4,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:340:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file10,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:362:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname,"%s%s%s",filepath,filename,file9);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:406:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname,"%s%s%s",filepath,filename,file12);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:469:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:475:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s_%0*i",filepath,filename,file1,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:508:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:514:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s_%0*i",filepath,filename,file1,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:556:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:557:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:663:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s_%0*i",filepath,filename,file1,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:683:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file2,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:733:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:734:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:840:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s_%0*i",filepath,filename,file1,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:860:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file2,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1188:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.homo%i_%i_r%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1190:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.homo%i_%i_i%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1259:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.lumo%i_%i_r%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1261:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	    sprintf(file1,"%s%s.lumo%i_%i_i%s",filepath,filename,spin,orbit,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1362:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.homo%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1380:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.homo%i_%i_i%s", 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1439:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.lumo%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1458:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file1,"%s%s.lumo%i_%i_i%s", 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1592:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file1,"%s%s.homo%i_%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1611:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file1,"%s%s.homo%i_%i_%i_i%s", 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1693:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  	  sprintf(file1,"%s%s.lumo%i_%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1713:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(file1,"%s%s.lumo%i_%i_%i_i%s",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1873:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"cat %s%s%s_* > %s%s%s",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1875:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1883:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate1,"%s%s%s",filepath,filename,fext);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1894:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(operate1,"%s%s%s",filepath,filename,fext);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1898:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(operate2,"%s%s%s_%0*i",filepath,filename,fext,digit,ID);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1911:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(operate,"rm %s%s%s_*",filepath,filename,fext);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1912:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(operate);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2059:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"cat %s%s%s_* > %s%s%s",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2061:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2069:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate1,"%s%s%s",filepath,filename,fext);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2080:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(operate1,"%s%s%s",filepath,filename,fext);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2084:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(operate2,"%s%s%s_%0*i",filepath,filename,fext,digit,ID);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2096:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(operate,"rm %s%s%s_*",filepath,filename,fext);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2097:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(operate);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2137:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(DirPAO,"%s/PAO/",DFT_DATA_PATH);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2478:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fname2,"%s%s_%i%s",filepath,SpeName[wan],Gc_AN,ExtPAO);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2699:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file1,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2700:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file2,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2701:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(file3,CUBE_EXTENSION);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2714:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s%s_%0*i",filepath,filename,file1,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2747:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file2,digit,myid);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2766:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s%s_%0*i",filepath,filename,file3,digit,myid);
data/openmx-3.8.5+dfsg1/source/Output_Energy_Decomposition.c:140:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_DecE,"%s%s.DecE",filepath,filename);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:386:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileHKS,"%s%s_rst/%s.rst%i",filepath,filename,filename,Gc_AN);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:613:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"%s%s_rst",filepath,filename);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:618:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"%s%s_rst/%s.rst%i",filepath,filename,filename,Gc_AN);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:633:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileHKS,"%s%s_rst/%s.rst%i",filepath,filename,filename,Gc_AN);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:763:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_check,"%s%s_rst/%s.crst_check",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:797:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileCD1,"%s%s_rst/%s.crst%i_%i_%i",filepath,filename,filename,spin,myid,i);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:798:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fileCD2,"%s%s_rst/%s.crst%i_%i_%i",filepath,filename,filename,spin,myid,i+1);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:808:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileCD0,"%s%s_rst/%s.crst%i_%i_0",filepath,filename,filename,spin,myid);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:848:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file_check,"%s%s_rst/%s.crst_check",filepath,filename,filename);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:869:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fileCD,"%s%s_rst/%s.crst%i_%i_%i",filepath,filename,filename,spin,myid,i);
data/openmx-3.8.5+dfsg1/source/Runtest.c:179:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fndat[Num_DatFiles].fn,"%s/%s",input_dir,entry->d_name);  
data/openmx-3.8.5+dfsg1/source/Runtest.c:197:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname2,"%s",output_file);
data/openmx-3.8.5+dfsg1/source/Runtest.c:203:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(operate,"%s",fname2);
data/openmx-3.8.5+dfsg1/source/Runtest.c:221:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname_dat,"%s",fndat[i].fn);
data/openmx-3.8.5+dfsg1/source/Runtest.c:243:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname_out1,"%s.out",fname_dat2);
data/openmx-3.8.5+dfsg1/source/Runtest.c:244:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname_out2,"%s/%s.out",input_dir,fname_dat2);
data/openmx-3.8.5+dfsg1/source/Runtest.c:278:4:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  fscanf(fp3,"%d %s %lf %lf %lf %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/Runtest.c:328:4:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  fscanf(fp3,"%d %s %lf %lf %lf %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/Runtest.c:467:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fileMemory,"%s%s.memory%i",filepath,filename,myid0);
data/openmx-3.8.5+dfsg1/source/SCF2File.c:152:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.scfout",filepath,filename);
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:301:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(DirPAO,"%s/PAO/",DFT_DATA_PATH);
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:302:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(DirVPS,"%s/VPS/",DFT_DATA_PATH);
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2221:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname1,"%s%s.cif",filepath,filename);
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2349:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname1,"%s%s.xyz",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:78:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(input_dir,"%s",argv[2]);
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:123:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fndat[Num_DatFiles].fn,"%s/%s",input_dir,entry->d_name);  
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:141:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname_dat,"%s",fndat[i].fn);
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:151:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        fscanf(fp,"%s %s %s",SN[k],SB[k],SV[k]);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:87:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:90:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:99:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(operate,"rm %s",fname2);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:100:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(operate);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:177:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp0,"%s",fname_dat);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:182:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"./openmx %s -stresstest2 %i",fname_dat,stress_flag);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:199:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmp_argv,argv[3]); 
data/openmx-3.8.5+dfsg1/source/Stress_test.c:202:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(str[0],"%s",tp);    
data/openmx-3.8.5+dfsg1/source/Stress_test.c:208:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(str[p],"%s",tp);        
data/openmx-3.8.5+dfsg1/source/Stress_test.c:213:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(operate,"%s %s %s %s %s %s %s -stresstest2 %i",
data/openmx-3.8.5+dfsg1/source/Stress_test.c:218:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      system(operate);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:231:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/Stress_test.c:234:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:784:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file1, "%s%s.curden1%s", filepath, filename, Out_Extention);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:788:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file1, "%s%s.scurden1%s", filepath, filename, Out_Extention);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:792:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file1, "%s%s.odcurden1_r%s", filepath, filename, Out_Extention);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:796:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file1, "%s%s.odcurden1_i%s", filepath, filename, Out_Extention);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:848:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.curden.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:852:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.scurden.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:856:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.odcurden_r.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:860:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.odcurden_i.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:922:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.curden.xsf.bin", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:926:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.scurden.xsf.bin", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:930:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.odcurden_r.xsf.bin", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:934:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.odcurden_i.xsf.bin", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1089:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.curden_atom.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1093:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.scurden_atom.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1097:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.odcurden_atom_r.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1101:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file1, "%s%s.odcurden_atom_i.xsf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1219:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file1, "%s%s.paranegf", filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:182:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname, "%s%s.traneval%i_%i_%i", filepath, filename, kloop, iw, ispin);
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:217:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname, "%s%s.tranevec%i_%i_%i", filepath, filename, kloop, iw, ispin);
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:495:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file1, "%s%s.tranec%i_%i_%i_%i_r%s",
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:527:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file1, "%s%s.tranec%i_%i_%i_%i_i%s",
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:580:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file1, "%s%s.paranegf",filepath, filename);
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:805:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:862:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_ev,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:1725:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_eig,"%s%s.Dos.val",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:1782:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_ev,"%s%s.Dos.vec",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:121:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:184:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:282:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:344:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",&j,Species,
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:403:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:464:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:114:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:176:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",&j,Species,
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:233:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:295:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:350:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:411:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:121:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:184:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:282:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:344:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",&j,Species,
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:403:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:464:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	  sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:886:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fnameout,"%s%s.tran%i_%i",filepath,filename,i2,i3);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:902:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(fnameout,"%s%s.tran%i_%i",filepath,filename,ii2,ii3);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:931:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fnameout,"%s%s.current",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:955:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fnameout,"%s%s.conductance",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:1420:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.%s",filepath,filename,ext);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:1423:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s",filepath,interpolate_filename1);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:1913:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s",filepath,interpolate_filename2);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:846:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fnameout,"%s%s.tran%i_%i",filepath,filename,i2,i3);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:874:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fnameout,"%s%s.current",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:898:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fnameout,"%s%s.conductance",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:1351:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s.%s",filepath,filename,ext);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:1354:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s",filepath,interpolate_filename1);
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:1928:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname,"%s%s",filepath,interpolate_filename2);
data/openmx-3.8.5+dfsg1/source/TRAN_Output_Trans_HS.c:230:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name,"%s%s.%s",filepath,filename,fname);
data/openmx-3.8.5+dfsg1/source/TRAN_Output_Trans_HS.c:792:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name,"%s%s.%s",filepath,filename,fname);
data/openmx-3.8.5+dfsg1/source/TRAN_RestartFile.c:544:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileHKS,"%s%s",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_RestartFile.c:548:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileHKS,"%s%s",filepath,filename);
data/openmx-3.8.5+dfsg1/source/TRAN_Set_IntegPath.c:139:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file,"%s%s.paranegf",filepath,filename);
data/openmx-3.8.5+dfsg1/source/Timetool.c:78:31:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      for (i=0;i<level;i++) { strcat(buf,tab); }
data/openmx-3.8.5+dfsg1/source/Timetool.c:79:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(buf,now->name);
data/openmx-3.8.5+dfsg1/source/Timetool.c:90:31:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      for (i=0;i<level;i++) { strcat(buf,tab); }
data/openmx-3.8.5+dfsg1/source/Timetool.c:91:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(buf,now->name);
data/openmx-3.8.5+dfsg1/source/Voronoi_Charge.c:221:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_VC,"%s%s.VC",filepath,filename);
data/openmx-3.8.5+dfsg1/source/add_gcube.c:64:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp1,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/add_gcube.c:65:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp1,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/add_gcube.c:120:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp2,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/add_gcube.c:121:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp2,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:171:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%d %lf %lf %lf  %lf %lf %lf  %s %s",
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:294:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fnamedat1[spin],argv[1]);
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:297:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fnamedat1[spin],"%s%s%d",fnamedat1[spin],".BANDDAT",spin+1);
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:367:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fname,argv[1]);
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:373:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s",fname,".GNUBAND");
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:401:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ticsname,kname[ik][1]);
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:405:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ticsname,kname[ik][1]);
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:408:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(ticsname,"%s,%s",kname[ik-1][2],kname[ik][1]);  
data/openmx-3.8.5+dfsg1/source/bin2txt.c:149:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(clist,"rm %s",fname1);
data/openmx-3.8.5+dfsg1/source/bin2txt.c:150:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(clist);
data/openmx-3.8.5+dfsg1/source/bin2txt.c:231:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(clist,"rm %s",fname1);
data/openmx-3.8.5+dfsg1/source/bin2txt.c:232:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(clist);
data/openmx-3.8.5+dfsg1/source/bin2txt.c:290:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(clist,"rm %s",fname1);
data/openmx-3.8.5+dfsg1/source/bin2txt.c:291:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(clist);
data/openmx-3.8.5+dfsg1/source/check_lead.c:74:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname2,"%s_NEGF1",argv[1]);
data/openmx-3.8.5+dfsg1/source/check_lead.c:527:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(DirPAO,"%s/PAO/",DFT_DATA_PATH);
data/openmx-3.8.5+dfsg1/source/check_lead.c:591:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp,"%s %s %s",SpeName[i],SpeBasis[i],SpeVPS[i]);
data/openmx-3.8.5+dfsg1/source/check_lead.c:724:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        fscanf(fp,"%i %s %lf %lf %lf %lf %lf",&j,&Species,
data/openmx-3.8.5+dfsg1/source/check_lead.c:756:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        fscanf(fp,"%i %s %lf %lf %lf %lf %lf",&j,&Species,
data/openmx-3.8.5+dfsg1/source/check_lead.c:790:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        fscanf(fp,"%i %s %lf %lf %lf %lf %lf",&j,&Species,
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:162:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(clist, "rm %s", fname1);
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:294:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(clist, "rm %s", fname1);
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:64:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp1,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:65:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp1,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:120:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp2,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:121:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp2,"%s",ctmp);
data/openmx-3.8.5+dfsg1/source/diff_geo.c:138:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file1,"%s",argv[1]);  
data/openmx-3.8.5+dfsg1/source/diff_geo.c:139:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file2,"%s",argv[2]);  
data/openmx-3.8.5+dfsg1/source/diff_geo.c:463:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp,"%s %lf %lf %lf %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/diff_geo.c:490:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp,"%s %lf %lf %lf %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/esp.c:188:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file[1],"%s.vhart.cube",argv[1]);  
data/openmx-3.8.5+dfsg1/source/esp.c:189:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file[2],"%s.LESP",argv[1]);
data/openmx-3.8.5+dfsg1/source/esp.c:206:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file[0],"%s.out",argv[1]);  
data/openmx-3.8.5+dfsg1/source/esp.c:207:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(file[1],"%s.vhart.cube",argv[1]);  
data/openmx-3.8.5+dfsg1/source/esp.c:775:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s",ctmp1);
data/openmx-3.8.5+dfsg1/source/esp.c:776:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s",ctmp1);
data/openmx-3.8.5+dfsg1/source/esp.c:906:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s",ctmp1);
data/openmx-3.8.5+dfsg1/source/esp.c:907:5:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    fscanf(fp,"%s",ctmp1);
data/openmx-3.8.5+dfsg1/source/esp.c:974:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp,"%s",buf);
data/openmx-3.8.5+dfsg1/source/esp.c:975:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp,"%s",buf);
data/openmx-3.8.5+dfsg1/source/esp.c:976:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp,"%s %lf %lf %lf",buf,&Ref_DipMx,&Ref_DipMy,&Ref_DipMz);
data/openmx-3.8.5+dfsg1/source/expao.c:408:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s1,str1);
data/openmx-3.8.5+dfsg1/source/expao.c:409:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s2,str2);
data/openmx-3.8.5+dfsg1/source/expao.c:485:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf); 
data/openmx-3.8.5+dfsg1/source/expao.c:525:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:563:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:597:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ret,defval);
data/openmx-3.8.5+dfsg1/source/expao.c:600:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:607:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ret,val_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:637:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:674:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret[i],defval[i]);
data/openmx-3.8.5+dfsg1/source/expao.c:678:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:684:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",ret[i])!=1) {goto ERROR;}
data/openmx-3.8.5+dfsg1/source/expao.c:723:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:729:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/source/expao.c:770:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:779:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/source/expao.c:813:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/expao.c:834:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/exx_log.c:62:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, fmt, argp );
data/openmx-3.8.5+dfsg1/source/exx_log.c:82:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, argp );
data/openmx-3.8.5+dfsg1/source/exx_log.c:183:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(fp_log, fmt, argp );
data/openmx-3.8.5+dfsg1/source/exx_step1.c:92:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(path_cache, "%s/exxovlp.dat", EXX_CacheDir(exx));
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:41:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    scanf("%lf  %s %lf %lf %lf",&za0,&Name,&za1,&za2,&za3);
data/openmx-3.8.5+dfsg1/source/iterout.c:170:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fileXYZ,"%s2",fileSDRC);
data/openmx-3.8.5+dfsg1/source/iterout_md.c:73:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileEvsLC,"%s%s.EvsLC",filepath,filename);
data/openmx-3.8.5+dfsg1/source/iterout_md.c:99:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileEvsLC,"%s%s.DF",filepath,filename);
data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_def.h:25:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  #define TRACE  ( msg )              fprintf(stderr, msg)
data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_def.h:26:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  #define TRACE1 ( msg , arg)         fprintf(stderr, msg, arg )
data/openmx-3.8.5+dfsg1/source/liberi-091216/source/eri_def.h:27:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  #define TRACE2 ( msg , arg1, arg2 ) fprintf(stderr, msg, arg1, arg2)
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:129:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:133:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:138:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:143:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:148:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:153:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:196:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:202:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      fscanf(fp, "%s", buffer); /* ln(r) */
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:203:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp, "%s", buffer); /* r */
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:206:13:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
        n = fscanf(fp, "%s", buffer);
data/openmx-3.8.5+dfsg1/source/md2axsf.c:78:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /* atomnum */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:80:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /* time= */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:81:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /* 0.0000 */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:82:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /* (fs) */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:83:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /* Energy= */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:84:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /* -8.20219 */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:85:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /* (Hartree) */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:86:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp1,"%s",read_str);  /*  Cell_Vectors= */         
data/openmx-3.8.5+dfsg1/source/md2axsf.c:113:6:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  	  fscanf(fp1,"%s",read_str); 
data/openmx-3.8.5+dfsg1/source/mpao.c:228:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* Atom= */
data/openmx-3.8.5+dfsg1/source/mpao.c:231:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* L= */
data/openmx-3.8.5+dfsg1/source/mpao.c:234:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* Mul= */
data/openmx-3.8.5+dfsg1/source/mpao.c:237:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(fp,"%s",str1);   /* p= */
data/openmx-3.8.5+dfsg1/source/mpao.c:576:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s1,str1);
data/openmx-3.8.5+dfsg1/source/mpao.c:577:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s2,str2);
data/openmx-3.8.5+dfsg1/source/mpao.c:653:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf); 
data/openmx-3.8.5+dfsg1/source/mpao.c:693:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:731:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:765:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ret,defval);
data/openmx-3.8.5+dfsg1/source/mpao.c:768:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:775:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ret,val_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:805:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    nread=sscanf(buf,"%s %s",key_inbuf,val_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:842:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ret[i],defval[i]);
data/openmx-3.8.5+dfsg1/source/mpao.c:846:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:852:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",ret[i])!=1) {goto ERROR;}
data/openmx-3.8.5+dfsg1/source/mpao.c:891:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:897:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/source/mpao.c:938:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:947:6:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if (sscanf(c,"%s",buf)!=1) goto ERROR;
data/openmx-3.8.5+dfsg1/source/mpao.c:981:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/mpao.c:1002:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  sscanf(buf,"%s",key_inbuf);
data/openmx-3.8.5+dfsg1/source/neb.c:147:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname_original,"%s",argv[1]);
data/openmx-3.8.5+dfsg1/source/neb.c:238:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_neb_utot,"%s%s_0_rst/%s.neb.utot",filepath,system_name,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:270:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,index_images);
data/openmx-3.8.5+dfsg1/source/neb.c:316:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,index_images);
data/openmx-3.8.5+dfsg1/source/neb.c:323:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,index_images);
data/openmx-3.8.5+dfsg1/source/neb.c:333:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(file_neb_utot,"%s%s_0_rst/%s.neb.utot",filepath,system_name,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:370:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,myworld1+1);
data/openmx-3.8.5+dfsg1/source/neb.c:432:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(fname1,"%s_%i",fname_original,p);
data/openmx-3.8.5+dfsg1/source/neb.c:575:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(file_neb_utot,"%s%s_0_rst/%s.neb.utot",filepath,system_name,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:607:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,index_images);
data/openmx-3.8.5+dfsg1/source/neb.c:651:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(file_neb_utot,"%s%s_0_rst/%s.neb.utot",filepath,system_name,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:708:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(fname1,"%s_%i",fname_original,myworld3+1+(h-1)*numprocs);
data/openmx-3.8.5+dfsg1/source/neb.c:711:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(fname1,"%s_%i",fname_original,myworld1+1+(h-1)*numprocs);
data/openmx-3.8.5+dfsg1/source/neb.c:947:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_neb_utot,"%s%s_0_rst/%s.neb.utot",filepath,system_name,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:981:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,index_images);
data/openmx-3.8.5+dfsg1/source/neb.c:1000:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fname1,"%s_%i",fname_original,index_images);
data/openmx-3.8.5+dfsg1/source/neb.c:1044:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file_neb_utot,"%s%s_0_rst/%s.neb.utot",filepath,system_name,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:1105:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,myworld3+1+(h-1)*PN);
data/openmx-3.8.5+dfsg1/source/neb.c:1108:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(fname1,"%s_%i",fname_original,myworld1+1+(h-1)*PN);
data/openmx-3.8.5+dfsg1/source/neb.c:1311:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fname1,"%s#",fname_original);
data/openmx-3.8.5+dfsg1/source/neb.c:1661:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileOPT,"%s%s.neb.opt",filepath,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:1694:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(fileE,"%s%s.neb.ene",filepath,system_name);
data/openmx-3.8.5+dfsg1/source/neb.c:2444:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fname1,"%s_%i",file,p);
data/openmx-3.8.5+dfsg1/source/neb.c:2637:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(system_name,"%s",filename);
data/openmx-3.8.5+dfsg1/source/neb.c:2728:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/neb.c:2747:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/neb.c:2865:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %lf %lf %lf %lf %d %s",
data/openmx-3.8.5+dfsg1/source/neb.c:2884:2:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	sscanf(buf,"%i %s %lf %lf %lf %lf %lf %s",
data/openmx-3.8.5+dfsg1/source/neb.c:3003:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
          fscanf(fp,"%i %s %lf %lf %lf %lf %lf",
data/openmx-3.8.5+dfsg1/source/neb_run.c:73:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fileMemory,"%s%s.memory%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/neb_run.c:130:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(SpeName_NEB[i],"%s",SpeName[i]);
data/openmx-3.8.5+dfsg1/source/openmx.c:450:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fileMemory,"%s%s.memory%i",filepath,filename,myid);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:183:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(list_pao[num_pao-1], pao);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:265:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pao, NameAtoms[ir][i][1]);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:732:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(names[0], pdb);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:733:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(names[1], pao);
data/openmx-3.8.5+dfsg1/source/rmmpi.c:18:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/rmmpi.c:29:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        system(operate);
data/openmx-3.8.5+dfsg1/source/rmmpi.c:40:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system(operate);
data/openmx-3.8.5+dfsg1/source/truncation.c:4107:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file_UCell,"%s%s.UCell",filepath,filename);
data/openmx-3.8.5+dfsg1/source/truncation.c:4363:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(file_UCell,"%s%s.UCell",filepath,filename);
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:54:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    scanf("%lf  %s %lf %lf %lf",&za0,&Name,&za1,&za2,&za3);
data/openmx-3.8.5+dfsg1/source/exx_log.c:37:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  env = getenv("HOSTNAME");
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str1[100];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[200],file2[200],file3[200];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[3000];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st1[3000];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:219:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file1,"<Contraction.coefficients%i",num);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:220:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file2,"Contraction.coefficients%i>",num);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:295:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file1,"<pseudo.atomic.orbitals.L=%i",L);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:296:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file2,"pseudo.atomic.orbitals.L=%i>",L);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:390:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp1 = fopen(argv[3],"w");
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:395:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp3 = fopen(argv[1],"r");
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:421:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp2 = fopen(argv[2],"r");
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:513:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp=fpnest[nestlevel]=fopen(fname, "r");
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:578:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s1[500],s2[500];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:644:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:647:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *strval[SIZE_LOGICAL_DEFAULT]={"on","yes","true",".true.","ok","off","no","false",".false.","ng"};
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:725:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:727:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:763:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:765:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:802:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:838:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:840:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:883:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:885:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:932:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:977:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE] ;
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:978:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:998:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:999:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/ADIIS_Mixing_DM.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/ADIIS_Mixing_DM.c:520:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(nanchar,"%8.4f",alR[SCFi]);
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col.c:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col.c:2736:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".EV");
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col.c:2739:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_EV = fopen(file_EV,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col_ScaLAPACK.c:176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col_ScaLAPACK.c:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col_ScaLAPACK.c:2740:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".EV");
data/openmx-3.8.5+dfsg1/source/Band_DFT_Col_ScaLAPACK.c:2743:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_EV = fopen(file_EV,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_ev[YOUSO10],file_eig[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1051:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1115:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_fermi[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1197:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp=fopen(file_fermi,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1496:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_ev[YOUSO10],file_eig[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1498:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:1499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2431:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2501:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_fermi[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2562:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp=fopen(file_fermi,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2830:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_ev[YOUSO10],file_eig[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2831:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_ev0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2833:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:2834:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3301:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3316:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3929:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev0=fopen(file_ev0,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3939:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fp_ev=fopen(file_ev,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:3980:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_fermi[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4010:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp=fopen(file_fermi,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4295:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_ev[YOUSO10],file_ev0[YOUSO10],file_eig[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4298:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4812:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:4827:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5533:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev0=fopen(file_ev0,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5543:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fp_ev=fopen(file_ev,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5582:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_fermi[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_Dosout.c:5610:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp=fopen(file_fermi,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:624:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".EV");
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:627:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_EV = fopen(file_EV,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:903:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:904:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:905:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:907:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:1559:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".EV");
data/openmx-3.8.5+dfsg1/source/Band_DFT_MO.c:1562:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_EV = fopen(file_EV,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_NonCol.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_NonCol.c:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_NonCol.c:2691:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".EV");
data/openmx-3.8.5+dfsg1/source/Band_DFT_NonCol.c:2694:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_EV = fopen(file_EV,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Band[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:589:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_Band,".Band");
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:592:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_Band = fopen(file_Band,"w"))==NULL) {
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:750:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:751:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Band[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:1208:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_Band,".Band");
data/openmx-3.8.5+dfsg1/source/Band_DFT_kpath.c:1211:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_Band = fopen(file_Band,"w"))==NULL) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:40:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:55:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:70:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double Cluster_DFT(char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10] = ".EV";
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:1251:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_EV = fopen(file_EV,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:1480:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				    char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:1520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:1521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:1522:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10] = ".EV";
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:1524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2408:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_EV = fopen(file_EV,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2638:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2658:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_eig,".Dos.val");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2660:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2664:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_ev,".Dos.vec");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2666:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2890:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2910:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_eig,".Dos.val");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2912:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2916:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_ev,".Dos.vec");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT.c:2918:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_opt[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf3[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:184:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_eig,".Dos.val");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:186:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:195:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_ev,".Dos.vec");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:197:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:209:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_opt,".optical");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:211:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (fp_opt=fopen(file_opt,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:849:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:851:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:852:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:924:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_eig,".Dos.val");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:926:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:935:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_ev,".Dos.vec");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_Dosout.c:937:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ON2.c:132:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double Cluster_DFT_ON2(char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ON2.c:4559:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ON2.c:4632:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(nanchar,"%8.4f",stepw);
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ON2.c:4733:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(nanchar,"%8.4f",Trial_ChemP0);
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ON2.c:4899:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(nanchar,"%8.4f",Trial_ChemP0);
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ON2.c:4965:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(nanchar,"%8.4f",Trial_ChemP0);
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:38:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:63:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:80:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:112:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:226:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:227:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10] = ".EV";
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:1190:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_EV = fopen(file_EV,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:1410:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				    char *mode,
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:1451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:1452:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:1453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10] = ".EV";
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:1455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2339:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_EV = fopen(file_EV,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2569:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2589:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_eig,".Dos.val");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2591:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2595:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_ev,".Dos.vec");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2597:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2821:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2841:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_eig,".Dos.val");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2843:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2847:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_ev,".Dos.vec");
data/openmx-3.8.5+dfsg1/source/Cluster_DFT_ScaLAPACK.c:2849:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DFT.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_DFTSCF[YOUSO10] = ".DFTSCF";
data/openmx-3.8.5+dfsg1/source/DFT.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_OrbOpt[YOUSO10] = ".OrbOpt";
data/openmx-3.8.5+dfsg1/source/DFT.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[200];
data/openmx-3.8.5+dfsg1/source/DFT.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/DFT.c:2927:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DFT.c:2932:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_DM.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_DM.c:459:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(nanchar,"%8.4f",alden[SCFi]);
data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_Rhok.c:145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_Rhok.c:428:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(nanchar,"%8.4f",alden[SCFi]);
data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_Rhok.c:886:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/DIIS_Mixing_Rhok.c:1225:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(nanchar,"%8.4f",alden[SCFi]);
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:26:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double DC_Col(char *mode,
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:33:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double DC_NonCol(char *mode,
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:47:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double Divide_Conquer(char *mode,
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:93:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double DC_Col(char *mode,
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:1466:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double DC_NonCol(char *mode,
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:2981:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:2998:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:3004:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:3113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:3130:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Divide_Conquer.c:3136:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:841:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w")) != NULL ) {
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:894:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w")) != NULL ) {
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:1056:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:1058:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:1059:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:1865:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w")) != NULL ) {
data/openmx-3.8.5+dfsg1/source/Divide_Conquer_Dosout.c:1924:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w")) != NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:97:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void input_file_eg(char *file_eg,
data/openmx-3.8.5+dfsg1/source/DosMain.c:105:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void input_file_ev( char *file_ev, int mode, int NonCol, int Max_tnoA, 
data/openmx-3.8.5+dfsg1/source/DosMain.c:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char basename[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:377:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_Dos,"DOS.Histgram");
data/openmx-3.8.5+dfsg1/source/DosMain.c:382:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_Dos=fopen(file_Dos,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:487:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:498:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_Dos,"DOS.Gaussian");
data/openmx-3.8.5+dfsg1/source/DosMain.c:503:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_Dos=fopen(file_Dos,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:665:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:667:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:678:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_Dos,"DOS.Gaussian");
data/openmx-3.8.5+dfsg1/source/DosMain.c:683:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_Dos=fopen(file_Dos,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:837:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:839:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:855:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_Dos=fopen(file_Dos,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:984:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:986:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:997:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_Dos,"DOS.Tetrahedron");
data/openmx-3.8.5+dfsg1/source/DosMain.c:1002:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_Dos=fopen(file_Dos,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:1174:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *Lname[5]={"s","p","d","f","g"};
data/openmx-3.8.5+dfsg1/source/DosMain.c:1177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:1179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:1278:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:1379:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:1532:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *Lname[5]={"s","p","d","f","g"};
data/openmx-3.8.5+dfsg1/source/DosMain.c:1535:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:1537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:1629:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:1726:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:1844:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *Lname[5]={"s","p","d","f","g"};
data/openmx-3.8.5+dfsg1/source/DosMain.c:1852:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:1854:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:1874:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_Dos=fopen(file_Dos,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:2069:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:2173:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:2312:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *Lname[5]={"s","p","d","f","g"};
data/openmx-3.8.5+dfsg1/source/DosMain.c:2315:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_Dos[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:2317:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:2382:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:2481:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_Dos=fopen(file_Dos,"w")) ==NULL )  {
data/openmx-3.8.5+dfsg1/source/DosMain.c:2641:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void input_file_eg(char *file_eg,
data/openmx-3.8.5+dfsg1/source/DosMain.c:2932:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void input_file_ev( char *file_ev, int mode, int NonCol, int Max_tnoA, 
data/openmx-3.8.5+dfsg1/source/DosMain.c:2945:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keyword[YOUSO10];
data/openmx-3.8.5+dfsg1/source/DosMain.c:2946:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/DosMain.c:2973:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(keyword,"<AN%dAN%d",GA_AN+1,spin);
data/openmx-3.8.5+dfsg1/source/DosMain.c:2997:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	    sprintf(keyword,"AN%dAN%d>",GA_AN+1,spin);
data/openmx-3.8.5+dfsg1/source/DosMain.c:3026:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(keyword,"<AN%d",GA_AN+1);
data/openmx-3.8.5+dfsg1/source/DosMain.c:3055:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(keyword,"AN%d>",GA_AN+1);
data/openmx-3.8.5+dfsg1/source/DosMain.c:3080:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp=fopen(file_ev,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:3225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000],buf2[1000],*c;
data/openmx-3.8.5+dfsg1/source/EC.c:26:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double EC_Col(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:33:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double EC_Col2(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:40:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double EC_Col3(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:47:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double DC_NonCol(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:61:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double EC(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:111:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double EC_Col3(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:1534:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double EC_Col2(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:2761:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double EC_Col(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:3992:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double DC_NonCol(char *mode,
data/openmx-3.8.5+dfsg1/source/EC.c:5507:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/EC.c:5524:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/EC.c:5530:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/EC.c:5639:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/EC.c:5656:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/EC.c:5662:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/FT_NLP.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileFT[YOUSO10];
data/openmx-3.8.5+dfsg1/source/FT_NLP.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/FT_NLP.c:82:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileFT,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_NLP.c:247:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fileFT,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_PAO.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileFT[YOUSO10];
data/openmx-3.8.5+dfsg1/source/FT_PAO.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/FT_PAO.c:85:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileFT,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_PAO.c:244:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fileFT,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_ProExpn_VNA.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileFT[YOUSO10];
data/openmx-3.8.5+dfsg1/source/FT_ProExpn_VNA.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/FT_ProExpn_VNA.c:92:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileFT,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_ProExpn_VNA.c:266:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fileFT,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_ProductPAO.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileFT[YOUSO10];
data/openmx-3.8.5+dfsg1/source/FT_ProductPAO.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/FT_ProductPAO.c:95:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileFT,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_ProductPAO.c:329:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fileFT,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_VNA.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileFT[YOUSO10];
data/openmx-3.8.5+dfsg1/source/FT_VNA.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/FT_VNA.c:90:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileFT,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/FT_VNA.c:229:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fileFT,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCC[YOUSO10];
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:68:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileCC,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCC[YOUSO10];
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/File_CntCoes.c:127:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileCC,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Force_test.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ftmp[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[800];
data/openmx-3.8.5+dfsg1/source/Force_test.c:86:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"ls force_example/*.dat > ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Force_test.c:89:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"wc ls_dat000000 > ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Force_test.c:92:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname0,"ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Force_test.c:93:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname1,"ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Force_test.c:94:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname2,"forcetest.result");
data/openmx-3.8.5+dfsg1/source/Force_test.c:96:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(fname2, "r");   
data/openmx-3.8.5+dfsg1/source/Force_test.c:103:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp2 = fopen(fname2,"w")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Force_test.c:164:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ((fp0 = fopen(fname0,"r")) != NULL) &&
data/openmx-3.8.5+dfsg1/source/Force_test.c:165:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       ((fp1 = fopen(fname1,"r")) != NULL) )
data/openmx-3.8.5+dfsg1/source/Force_test.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[10][300];
data/openmx-3.8.5+dfsg1/source/Force_test.c:189:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_argv[300];
data/openmx-3.8.5+dfsg1/source/Force_test.c:228:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Force_test.c:231:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Force_test.c:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Force_test.c:339:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname1,"forcetest.result");
data/openmx-3.8.5+dfsg1/source/Force_test.c:341:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp1 = fopen(fname1,"a")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:1232:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:1268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:1269:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:1270:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname3[300];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:1271:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname4[300];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:1839:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fpkpt=fopen(fname,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2199:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fptmp=fopen(fname,"rt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2379:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fptmp=fopen(fname,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2383:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fptmp2=fopen(fname2,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2458:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fpwn90=fopen(fname4,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2756:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen(fname,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:2826:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fp=fopen(fname,"rt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:3048:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen(fname,"rt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:4614:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:4667:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fp=fopen(fname,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:7936:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:7941:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if((fp=fopen(fname,"w"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:8906:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:9053:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fpBand=fopen(fname,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:9172:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if((fpBand=fopen(fname,"wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:9960:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:9961:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:10133:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Generate_Wannier.c:10224:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:554:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("sc.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:564:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("bcc.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:574:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("fcc.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:584:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("hP.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:594:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("tP.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:604:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("tI.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:614:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("hR.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:625:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("oP.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:635:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("oI.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:645:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("oF.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:655:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("oC.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:665:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("mP.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:675:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("mB.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:686:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("aP.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:692:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fp=fopen("sym.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:980:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fp=fopen("getgrp.dat","wt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:1014:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fp=fopen("vasp.dat","rt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Generating_MP_Special_Kpt.c:1482:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fp=fopen("IBZKPT","rt"))==NULL){
data/openmx-3.8.5+dfsg1/source/Input_std.c:26:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int OrbPol2int(char OrbPol[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/Input_std.c:33:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Analyze_Wannier_Projectors(int p, char ctmp[YOUSO10], 
data/openmx-3.8.5+dfsg1/source/Input_std.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[40],Species[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Input_std.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char OrbPol[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Input_std.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/Input_std.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_check[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Input_std.c:1997:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_check,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/Input_std.c:2867:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctmp[200];
data/openmx-3.8.5+dfsg1/source/Input_std.c:2922:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctmp[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Input_std.c:3137:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_check = fopen(file_check,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/Input_std.c:3389:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Input_std.c:3434:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(fileCD,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/Input_std.c:3461:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(fileCD,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/Input_std.c:3572:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Analyze_Wannier_Projectors(int p, char ctmp[YOUSO10], 
data/openmx-3.8.5+dfsg1/source/Input_std.c:3604:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Name_Wannier_Projectors[100][30];
data/openmx-3.8.5+dfsg1/source/Input_std.c:3727:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  1], "px");         Num_Projectors[1]  = 1;  NumL[1][1]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3732:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  2], "py");         Num_Projectors[2]  = 1;  NumL[2][1]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3737:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  3], "pz");         Num_Projectors[3]  = 1;  NumL[3][1]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3742:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  4], "dz2");        Num_Projectors[4]  = 1;  NumL[4][2]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3747:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  5], "dx2-y2");     Num_Projectors[5]  = 1;  NumL[5][2]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3752:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  6], "dxy");        Num_Projectors[6]  = 1;  NumL[6][2]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3757:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  7], "dxz");        Num_Projectors[7]  = 1;  NumL[7][2]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3762:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  8], "dyz");        Num_Projectors[8]  = 1;  NumL[8][2]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3767:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[  9], "fz3");        Num_Projectors[9] = 1;  NumL[9][3]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3772:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 10], "fxz2");       Num_Projectors[10] = 1;  NumL[10][3]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3777:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 11], "fyz2");       Num_Projectors[11] = 1;  NumL[11][3]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3782:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 12], "fzx2");       Num_Projectors[12] = 1;  NumL[12][3]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3787:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 13], "fxyz");       Num_Projectors[13] = 1;  NumL[13][3]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3792:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 14], "fx3-3xy2");   Num_Projectors[14] = 1;  NumL[14][3]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3797:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 15], "f3yx2-y3");   Num_Projectors[15] = 1;  NumL[15][3]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3802:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 16], "sp");         Num_Projectors[16] = 2;  NumL[16][0]=1; NumL[16][1]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3809:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 17], "sp2");        Num_Projectors[17] = 3;  NumL[17][0]=1; NumL[17][1]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3827:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 18], "sp3");        Num_Projectors[18] = 4;  NumL[18][0]=1; NumL[18][1]=1;
data/openmx-3.8.5+dfsg1/source/Input_std.c:3854:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 19], "sp3dz2");      
data/openmx-3.8.5+dfsg1/source/Input_std.c:3898:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Wannier_Projectors[ 20], "sp3deg");   
data/openmx-3.8.5+dfsg1/source/Input_std.c:4062:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,cstr[YOUSO10*3];
data/openmx-3.8.5+dfsg1/source/Input_std.c:4136:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    Spe_Num_Basis[p][l] = atoi(cstr); /* corrected by t.ohwaki */
data/openmx-3.8.5+dfsg1/source/Input_std.c:4143:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    Spe_Num_Basis[p][l] = 10*tmp + atoi(cstr);  /* corrected by t.ohwaki */ 
data/openmx-3.8.5+dfsg1/source/Input_std.c:4150:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    Spe_Num_Basis[p][l] = 10*tmp + atoi(cstr);  /* corrected by t.ohwaki */ 
data/openmx-3.8.5+dfsg1/source/Input_std.c:4180:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            nlist[n] = atoi(cstr);
data/openmx-3.8.5+dfsg1/source/Input_std.c:4235:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Species2int(char Species[YOUSO10])
data/openmx-3.8.5+dfsg1/source/Input_std.c:4261:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int OrbPol2int(char OrbPol[YOUSO10])
data/openmx-3.8.5+dfsg1/source/Input_std.c:4264:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char opns[3][YOUSO10]={"OFF","ON","EX"};
data/openmx-3.8.5+dfsg1/source/Input_std.c:4483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FN_PAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Input_std.c:4484:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExtPAO[YOUSO10] = ".pao";
data/openmx-3.8.5+dfsg1/source/Input_std.c:4485:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char DirPAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Input_std.c:4489:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *unitstr[2]={"Ang.","a.u."};
data/openmx-3.8.5+dfsg1/source/Input_std.c:4504:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(FN_PAO,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/Inputtools.c:32:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp=fpnest[nestlevel]=fopen(fname, "r");
data/openmx-3.8.5+dfsg1/source/Inputtools.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s1[500],s2[500];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *strval[SIZE_LOGICAL_DEFAULT]={"on","yes","true",".true.","ok","off","no","false",".false.","ng"};
data/openmx-3.8.5+dfsg1/source/Inputtools.c:169:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:206:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:244:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:284:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:319:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:363:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/Inputtools.c:365:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:408:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/Inputtools.c:410:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/Inputtools.c:457:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:502:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE] ;
data/openmx-3.8.5+dfsg1/source/Inputtools.c:503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:523:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Inputtools.c:524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/Krylov.c:63:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double Krylov_Col(char *mode,
data/openmx-3.8.5+dfsg1/source/Krylov.c:78:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double Krylov_Col_trd(char *mode,
data/openmx-3.8.5+dfsg1/source/Krylov.c:114:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double Krylov(char *mode,
data/openmx-3.8.5+dfsg1/source/Krylov.c:166:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double Krylov_Col(char *mode,
data/openmx-3.8.5+dfsg1/source/Krylov.c:5184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Krylov.c:5205:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Krylov.c:5211:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Krylov.c:5264:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp_eig=fopen(file_eig,"w")) != NULL ) {
data/openmx-3.8.5+dfsg1/source/Krylov.c:5310:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static double Krylov_Col_trd(char *mode,
data/openmx-3.8.5+dfsg1/source/MD_pac.c:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:196:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:198:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:696:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:697:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:701:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:702:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:703:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:722:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:864:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fileSD,".SD");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:866:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_SD = fopen(fileSD,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:898:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:900:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:940:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:970:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:971:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:975:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:976:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:977:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:996:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1496:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fileSD,".SD");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1498:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_SD = fopen(fileSD,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1530:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1532:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1587:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1613:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1631:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1837:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1873:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:1891:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2011:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2045:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2063:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2183:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2236:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2355:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2405:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2525:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2565:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2566:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2568:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2569:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2909:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fileSD,".SD");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2911:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_SD = fopen(fileSD,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2941:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:2943:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3001:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3002:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3004:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3005:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3500:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fileSD,".SD");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3503:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_SD = fopen(fileSD,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3533:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3535:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3588:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3589:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3591:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:3592:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4241:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fileSD,".SD");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4244:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_SD = fopen(fileSD,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4274:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4276:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4348:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4350:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4804:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fileSD,".SD");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4806:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_SD = fopen(fileSD,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4836:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4838:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4902:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCoord[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4903:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4905:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4906:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4908:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:4928:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5477:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fileSD,".SD");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5479:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_SD = fopen(fileSD,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5509:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(fileCoord,".crd");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5511:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp_crd = fopen(fileCoord,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5551:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5634:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:5847:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6423:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:6665:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7326:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7340:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (fp = fopen(file_name,"wb")) != NULL ){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7410:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_name,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7476:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7477:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileabc[YOUSO10]="",dotabc[YOUSO10],iter_s[YOUSO10];
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7481:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(dotabc,".abc");
data/openmx-3.8.5+dfsg1/source/MD_pac.c:7485:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp_abc = fopen(fileabc,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Make_FracCoord.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_FracCoord.c:45:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[800];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st1[800];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rm_operate[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:89:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp1 = fopen(fname1,"w");
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:94:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp2 = fopen(file,"r");
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:368:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[800];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st1[800];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rm_operate[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:373:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:393:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp1 = fopen(fname1,"w");
data/openmx-3.8.5+dfsg1/source/Make_InputFile_with_FinalCoord.c:398:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp2 = fopen(file,"r");
data/openmx-3.8.5+dfsg1/source/Maketest.c:34:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fname0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Maketest.c:35:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Maketest.c:36:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fname_dat[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Maketest.c:37:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fname_dat2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Maketest.c:38:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char operate[800];
data/openmx-3.8.5+dfsg1/source/Maketest.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char namemode[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Maketest.c:54:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(namemode,"runtest");
data/openmx-3.8.5+dfsg1/source/Maketest.c:58:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(namemode,"runtestL");
data/openmx-3.8.5+dfsg1/source/Maketest.c:62:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(namemode,"runtestL2");
data/openmx-3.8.5+dfsg1/source/Maketest.c:66:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(namemode,"runtestG");
data/openmx-3.8.5+dfsg1/source/Maketest.c:70:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(namemode,"runtestC");
data/openmx-3.8.5+dfsg1/source/Maketest.c:74:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(namemode,"runtestWF");
data/openmx-3.8.5+dfsg1/source/Maketest.c:78:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(namemode,"runtestNEGF");
data/openmx-3.8.5+dfsg1/source/Maketest.c:91:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"wc ls_dat000000 > ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Maketest.c:94:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname0,"ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Maketest.c:95:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname1,"ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Maketest.c:97:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ((fp0 = fopen(fname0,"r")) != NULL) &&
data/openmx-3.8.5+dfsg1/source/Maketest.c:98:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       ((fp1 = fopen(fname1,"r")) != NULL) )
data/openmx-3.8.5+dfsg1/source/Maketest.c:131:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Maketest.c:134:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ftmp[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[800];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:68:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"ls ml_example/*.dat > ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:71:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"wc ls_dat000000 > ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:74:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname0,"ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:75:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname1,"ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:76:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname2,"mltest.result");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:78:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(fname2, "r");   
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:85:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ((fp0 = fopen(fname0,"r")) != NULL) &&
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:86:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       ((fp1 = fopen(fname1,"r")) != NULL) &&
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:87:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       ((fp2 = fopen(fname2,"a")) != NULL) )
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[10][300];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:113:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_argv[300];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:145:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (fp2 = fopen(fname2,"a")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:153:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(operate,"rm ls_dat000004");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:165:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:168:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:185:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpchar[300];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmpline[300];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[800];
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:193:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname0,"ls_dat000002");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:194:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname1,"ls_dat000003");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:195:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname2,"ls_dat000004");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:210:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp = fopen(fname0,"r")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:262:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp = fopen(fname0,"r")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:273:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if ( (fp1 = fopen(fname1,"w")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:303:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp1 = fopen(fname1,"r")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:336:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp2 = fopen(fname2,"w")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:347:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp2 = fopen(fname2,"a")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[800];
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rm_operate[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fexn[50][YOUSO10];
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:49:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[0],"UCell");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:50:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[1],"TRN");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:51:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[2],"rcn");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:52:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[3],"DFTSCF");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:53:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[4],"paranegf");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:54:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[5],"EV");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:55:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[6],"OrbOpt");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:56:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[7],"SD");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:57:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[8],"MC");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:58:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[9],"OM");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:59:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[10],"VC");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:60:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[11],"DM_onsite");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:61:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[12],"dpm");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:62:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[13],"DecE");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:63:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[14],"crd");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:64:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[15],"frac");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:65:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[16],"wfinfo");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:66:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fexn[17],"CompTime");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:69:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(fname, "r");   
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:79:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp1 = fopen(fname1,"a");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:93:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp2 = fopen(file,"r");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:104:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp1 = fopen(fname1,"a");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:108:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp2 = fopen(fname2,"r");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:125:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(fname, "r");   
data/openmx-3.8.5+dfsg1/source/Mio_tester.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/Mio_tester.c:86:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname,"IO_test.txt");
data/openmx-3.8.5+dfsg1/source/Mio_tester.c:87:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Mio_tester.c:119:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname,"IO_test%i.bry",i);
data/openmx-3.8.5+dfsg1/source/Mio_tester.c:121:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Mio_tester.c:139:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname,"IO_test%i.bry",i);
data/openmx-3.8.5+dfsg1/source/Mio_tester.c:141:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/Mio_tester2.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/Mio_tester2.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Mio_tester2.c:78:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname,"IO_test.txt");
data/openmx-3.8.5+dfsg1/source/Mio_tester2.c:79:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Mixing_H.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/Mixing_H.c:309:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(nanchar,"%8.4f",coes[m]);
data/openmx-3.8.5+dfsg1/source/Mixing_H.c:991:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/Mixing_H.c:1219:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(nanchar,"%8.4f",coes[m]);
data/openmx-3.8.5+dfsg1/source/Mixing_H.c:1741:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/Mixing_H.c:1995:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(nanchar,"%8.4f",coes[m]);
data/openmx-3.8.5+dfsg1/source/Mulliken_Charge.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Mulliken_Charge.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_MC[YOUSO10] = ".MC";
data/openmx-3.8.5+dfsg1/source/Mulliken_Charge.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Mulliken_Charge.c:536:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_MC = fopen(file_MC,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/NBO_Cluster.c:5458:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/NBO_Cluster.c:5459:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/NBO_Krylov.c:1928:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/NBO_Krylov.c:1929:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/NBO_Krylov.c:9339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/NBO_Krylov.c:9340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:4786:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[20][10];
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:4787:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:4788:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_DM_onsite[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:4790:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:4813:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_DM_onsite = fopen(file_DM_onsite,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:5013:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:5014:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:5015:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_DM_onsite[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:5018:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Occupation_Number_LDA_U.c:5043:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_DM_onsite = fopen(file_DM_onsite,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c:51:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c:84:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(buf,"ierange.spin=%d",spin);
data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c:119:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf,"<eig.spin=%d",spin);
data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c:129:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"<barJ.spin=%d.axis=%d",spin,iaxes+1);
data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c:150:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf,"<Eigenvalues");
data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OpticalConductivityMain.c:198:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp=fopen(fileout,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_OM[YOUSO10] = ".OM";
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:522:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_OM = fopen(file_OM,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:752:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[20][10];
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:753:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:754:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_OM[YOUSO10] = ".OM";
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Orbital_Moment.c:952:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_OM = fopen(file_OM,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[300];
data/openmx-3.8.5+dfsg1/source/OutData.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/OutData.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];         /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];         /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:134:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp1 = fopen(fname1,"ab");
data/openmx-3.8.5+dfsg1/source/OutData.c:144:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fp1 = fopen(fname1,"ab");
data/openmx-3.8.5+dfsg1/source/OutData.c:147:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fp2 = fopen(fname2,"rb");
data/openmx-3.8.5+dfsg1/source/OutData.c:205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:206:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".tden";
data/openmx-3.8.5+dfsg1/source/OutData.c:207:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".den0";
data/openmx-3.8.5+dfsg1/source/OutData.c:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file3[YOUSO10] = ".den1";
data/openmx-3.8.5+dfsg1/source/OutData.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file4[YOUSO10] = ".sden";
data/openmx-3.8.5+dfsg1/source/OutData.c:210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file9[YOUSO10] = ".nc.xsf";
data/openmx-3.8.5+dfsg1/source/OutData.c:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file10[YOUSO10] = ".ncsden.xsf";
data/openmx-3.8.5+dfsg1/source/OutData.c:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file12[YOUSO10] = ".nco.xsf";
data/openmx-3.8.5+dfsg1/source/OutData.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file11[YOUSO10] = ".dden";
data/openmx-3.8.5+dfsg1/source/OutData.c:214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:234:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:256:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:285:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:300:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:315:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:334:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:351:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:395:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:446:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:447:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".vhart";
data/openmx-3.8.5+dfsg1/source/OutData.c:462:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:479:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:480:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".vna";
data/openmx-3.8.5+dfsg1/source/OutData.c:496:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:517:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".vxc0";
data/openmx-3.8.5+dfsg1/source/OutData.c:519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".vxc1";
data/openmx-3.8.5+dfsg1/source/OutData.c:637:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:654:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:684:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".v0";
data/openmx-3.8.5+dfsg1/source/OutData.c:686:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".v1";
data/openmx-3.8.5+dfsg1/source/OutData.c:804:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:820:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:845:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".grid";
data/openmx-3.8.5+dfsg1/source/OutData.c:849:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:864:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:895:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filexyz[YOUSO10] = ".xyz";
data/openmx-3.8.5+dfsg1/source/OutData.c:896:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:911:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(filexyz,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:940:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filexsf[YOUSO10] = ".coord.xsf";
data/openmx-3.8.5+dfsg1/source/OutData.c:941:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:956:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(filexsf,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:993:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".bulk.xyz";
data/openmx-3.8.5+dfsg1/source/OutData.c:994:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:1012:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1058:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:1059:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:1128:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1199:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1245:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:1246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:1442:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1520:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1593:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1653:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:1654:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:1725:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1743:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1807:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1825:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1874:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:1968:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  	  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:1986:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:2073:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  	  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:2092:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  	  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:2202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300],operate1[300],operate2[300];
data/openmx-3.8.5+dfsg1/source/OutData.c:2204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:2328:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/OutData.c:2332:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:2465:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".oopt";
data/openmx-3.8.5+dfsg1/source/OutData.c:2466:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char DirPAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:2467:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExtPAO[YOUSO10] = ".pao";
data/openmx-3.8.5+dfsg1/source/OutData.c:2468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FN_PAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:2469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char EndLine[YOUSO10] = "<pseudo.atomic.orbitals.L=0";
data/openmx-3.8.5+dfsg1/source/OutData.c:2470:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:2471:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:2499:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:2834:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fp2 = fopen(fname2,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:2902:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(FN_PAO,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:3001:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:3083:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData.c:3123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData.c:3124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".pden";
data/openmx-3.8.5+dfsg1/source/OutData.c:3125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".pden0";
data/openmx-3.8.5+dfsg1/source/OutData.c:3126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file3[YOUSO10] = ".pden1";
data/openmx-3.8.5+dfsg1/source/OutData.c:3151:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:3180:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData.c:3195:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf1[fp_bsize];         /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf2[fp_bsize];         /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:146:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp1 = fopen(fname1,"ab");
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:156:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fp1 = fopen(fname1,"ab");
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:159:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fp2 = fopen(fname2,"rb");
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:191:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:192:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".tden";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".den0";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file3[YOUSO10] = ".den1";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file4[YOUSO10] = ".sden";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file9[YOUSO10] = ".nc.xsf";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file10[YOUSO10] = ".ncsden.xsf.bin";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file12[YOUSO10] = ".nco.xsf";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file11[YOUSO10] = ".dden";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:201:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:221:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:247:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:280:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:299:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:318:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:342:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:363:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:407:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:458:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:459:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".vhart";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:461:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:476:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:498:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".vna";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:516:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:542:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".vxc0";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".vxc1";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:544:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:664:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:685:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:719:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:720:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".v0";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:721:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".v1";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:723:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:841:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:861:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:890:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".grid.bin";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:894:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:911:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:961:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filexyz[YOUSO10] = ".xyz";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:962:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:977:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(filexyz,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1005:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filexsf[YOUSO10] = ".coord.xsf";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1006:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1021:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(filexsf,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1057:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".bulk.xyz";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1058:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1076:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1192:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1264:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1301:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1302:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1365:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1383:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1442:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1461:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1508:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1509:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1595:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  	  if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1614:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1696:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  	  if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1716:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  	  if ((fp = fopen(file1,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1761:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1765:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(clist," SYS1\n"); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1767:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(clist," SYS1\n"); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1771:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(clist," Absolute eigenvalue=%10.7f (Hartree)  Relative eigenvalue=%10.7f (Hartree)\n",
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1775:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(clist, " Chemical Potential=%10.7f (Hartree)\n",ChemP);
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1810:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300],operate1[300],operate2[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1884:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp1 = fopen(operate1, "rb");   
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1895:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp1 = fopen(operate1, "ab");   
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1899:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp2 = fopen(operate2,"rb");
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate1[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1932:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate2[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1933:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1954:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(clist,"CRYSTAL\n"); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1956:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(clist,"PRIMVEC\n"); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2070:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp1 = fopen(operate1, "rb");   
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2081:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp1 = fopen(operate1, "ab");   
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2085:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp2 = fopen(operate2,"rb");
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".oopt";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char DirPAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExtPAO[YOUSO10] = ".pao";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FN_PAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char EndLine[YOUSO10] = "<pseudo.atomic.orbitals.L=0";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2119:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2147:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2479:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fp2 = fopen(fname2,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2547:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(FN_PAO,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2686:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10] = ".pden";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2688:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file2[YOUSO10] = ".pden0";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file3[YOUSO10] = ".pden1";
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2691:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2716:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2749:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2768:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/Output_CompTime.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_CompTime[YOUSO10] = ".CompTime";
data/openmx-3.8.5+dfsg1/source/Output_CompTime.c:108:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_CompTime,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Output_Energy_Decomposition.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Output_Energy_Decomposition.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_DecE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Output_Energy_Decomposition.c:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Output_Energy_Decomposition.c:142:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_DecE = fopen(file_DecE,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Poisson_ESM.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/PrintMemory.c:44:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(filename,"w");
data/openmx-3.8.5+dfsg1/source/PrintMemory.c:59:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(filename,"a");
data/openmx-3.8.5+dfsg1/source/PrintMemory.c:70:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(filename,"a");
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nanchar[300];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:208:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(nanchar,"%8.4f",extpln_coes[i]);
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:358:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileHKS[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:388:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileHKS,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[1000];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:600:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileHKS[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:602:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:639:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fileHKS,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:747:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_check[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:748:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCD0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:749:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCD1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:750:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCD2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:765:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file_check,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:800:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fileCD1,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:810:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileCD0,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:837:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileCD[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:838:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_check[YOUSO10];
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:851:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file_check,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/RestartFileDFT.c:871:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(fileCD,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/Runtest.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ftmp[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[800];
data/openmx-3.8.5+dfsg1/source/Runtest.c:200:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(fname2, "r");   
data/openmx-3.8.5+dfsg1/source/Runtest.c:349:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (fp2 = fopen(fname2,"a")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Runtest.c:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10] = ".ene"; 
data/openmx-3.8.5+dfsg1/source/Runtest.c:418:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileDRC[YOUSO10] = ".md";
data/openmx-3.8.5+dfsg1/source/Runtest.c:419:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileMemory[YOUSO10]; 
data/openmx-3.8.5+dfsg1/source/Runtest.c:420:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileRestart[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Runtest.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[200];
data/openmx-3.8.5+dfsg1/source/SCF2File.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/SCF2File.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[300];
data/openmx-3.8.5+dfsg1/source/SCF2File.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/SCF2File.c:156:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/SCF2File.c:296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char strg[MAX_LINE_SIZE];
data/openmx-3.8.5+dfsg1/source/SCF2File.c:297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/SCF2File.c:810:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_inp = fopen(inputfile,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/SCF2File.c:830:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_inp = fopen(inputfile,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:283:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char DirPAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:284:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char DirVPS[YOUSO10];
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExtPAO[YOUSO10] = ".pao";
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExtVPS[YOUSO10] = ".vps";
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FN_PAO[YOUSO10];
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FN_VPS[YOUSO10];
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:289:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:322:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(FN_PAO,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:350:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(FN_PAO,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:390:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(FN_VPS,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:417:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(FN_VPS,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:483:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10],file2[YOUSO10],file3[YOUSO10];
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:567:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(file1,"<pseudo.atomic.orbitals.L=%i",L);
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:568:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(file2,"pseudo.atomic.orbitals.L=%i>",L);
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:615:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1939:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[  2], "He");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1940:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[  3], "Li");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1941:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[  4], "Be");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1947:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 10], "Ne");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1948:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 11], "Na");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1949:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 12], "Mg");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1950:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 13], "Al");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1951:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 14], "Si");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1954:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 17], "Cl");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1955:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 18], "Ar");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1957:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 20], "Ca");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1958:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 21], "Sc");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1959:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 22], "Ti");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1961:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 24], "Cr");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1962:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 25], "Mn");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1963:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 26], "Fe");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1964:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 27], "Co");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1965:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 28], "Ni");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1966:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 29], "Cu");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1967:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 30], "Zn");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1968:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 31], "Ga");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1969:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 32], "Ge");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1970:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 33], "As");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1971:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 34], "Se");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1972:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 35], "Br");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1973:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 36], "Kr");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1974:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 37], "Rb");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1975:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 38], "Sr");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1977:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 40], "Zr");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1978:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 41], "Nb");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1979:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 42], "Mo");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1980:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 43], "Tc");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1981:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 44], "Ru");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1982:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 45], "Rh");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1983:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 46], "Pd");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1984:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 47], "Ag");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1985:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 48], "Cd");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1986:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 49], "In");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1987:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 50], "Sn");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1988:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 51], "Sb");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1989:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 52], "Te");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1991:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 54], "Xe");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1992:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 55], "Cs");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1993:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 56], "Ba");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1994:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 57], "La");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1995:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 58], "Ce");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1996:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 59], "Pr");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1997:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 60], "Nd");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1998:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 61], "Pm");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1999:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 62], "Sm");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2000:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 63], "Eu");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2001:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 64], "Gd");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2002:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 65], "Tb");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2003:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 66], "Dy");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2004:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 67], "Ho");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2005:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 68], "Er");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2006:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 69], "Tm");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2007:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 70], "Yb");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2008:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 71], "Lu");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2009:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 72], "Hf");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2010:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 73], "Ta");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2012:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 75], "Re");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2013:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 76], "Os");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2014:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 77], "Ir");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2015:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 78], "Pt");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2016:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 79], "Au");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2017:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 80], "Hg");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2018:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 81], "Tl");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2019:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 82], "Pb");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2020:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 83], "Bi");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2021:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 84], "Po");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2022:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 85], "At");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2023:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 86], "Rn");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2024:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 87], "Fr");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2025:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 88], "Ra");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2026:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 89], "Ac");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2027:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 90], "Th");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2028:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 91], "Pa");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2030:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 93], "Np");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2031:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 94], "Pu");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2032:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 95], "Am");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2033:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 96], "Cm");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2034:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 97], "Bk");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2035:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 98], "Cf");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2036:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 99], "Es");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2037:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[100], "Fm");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2038:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[101], "Md");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2039:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[102], "No");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2040:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[103], "Lr");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2270:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2351:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname1,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SN[30][YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SB[30][YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char SV[30][YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ftmp[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input_dir[300];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,cstr[YOUSO10*3];
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:226:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Spe_Num_Basis[p][l]  = atoi(cstr);
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:227:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Spe_Num_CBasis[p][l] = atoi(cstr);
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:233:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Spe_Num_CBasis[p][l] = atoi(cstr);   
data/openmx-3.8.5+dfsg1/source/Stress_test.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname0[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_dat2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_out2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ftmp[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char operate[1000];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:86:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"ls stress_example/*.dat > ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:89:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"wc ls_dat000000 > ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:92:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname0,"ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:93:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname1,"ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:94:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname2,"stresstest.result");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:96:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(fname2, "r");   
data/openmx-3.8.5+dfsg1/source/Stress_test.c:103:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp2 = fopen(fname2,"w")) != NULL ){
data/openmx-3.8.5+dfsg1/source/Stress_test.c:164:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ((fp0 = fopen(fname0,"r")) != NULL) &&
data/openmx-3.8.5+dfsg1/source/Stress_test.c:165:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       ((fp1 = fopen(fname1,"r")) != NULL) )
data/openmx-3.8.5+dfsg1/source/Stress_test.c:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[10][300];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:190:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmp_argv[300];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:230:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000000");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:233:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm ls_dat000001");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Stress_test.c:441:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(fname1,"stresstest.result");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:443:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp1 = fopen(fname1,"a")) != NULL ){
data/openmx-3.8.5+dfsg1/source/TRAN_Apply_Bias2e.c:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:699:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:702:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (ispin == 0) sprintf(clist, " Charge Current Density \n");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:703:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  else sprintf(clist, " Spin Current Density \n");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:706:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(clist, " The component parallel to the a-axis \n");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:760:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10], Out_Extention[YOUSO10], write_mode[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:763:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:773:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(Out_Extention, ".cube.bin");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:774:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(write_mode, "wb");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:777:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(Out_Extention, ".cube");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:800:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(file1, write_mode)) != NULL){
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:841:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:864:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1, "w")) != NULL){
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:913:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:914:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:938:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1, "wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:940:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(clist, "CRYSTAL\n");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:942:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(clist, "PRIMVEC\n");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1082:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1105:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1, "w")) != NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:1221:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1, "a")) != NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_Calc_SurfGreen_Sanvito.c:371:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char BWORK[n];
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:73:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(clist, " Transmission of this channel : %10.6f \n", eigentrans);
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:78:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(clist,
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:82:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(clist,
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:87:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(clist,
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL + 1][2 * (Supported_MaxL + 1) + 1];
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:189:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp_EV = fopen(fname, "w")) == NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:219:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp_EV = fopen(fname, "w")) == NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10], Out_Extention[YOUSO10], write_mode[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:424:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:487:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(Out_Extention, ".cube.bin");
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:488:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(write_mode, "wb");
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:491:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(Out_Extention, ".cube");
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:500:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1, write_mode)) != NULL){
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:531:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1, write_mode)) != NULL){
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:575:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:582:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(file1, "a")) != NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_Check_Input.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Check_Input.c:32:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Species[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Check_Region.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *regionstr[2]={"region L","region R"};
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:791:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:807:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:864:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:1711:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char file_eig[YOUSO10],file_ev[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:1727:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_eig=fopen(file_eig,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_DFT_Dosout.c:1784:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp_ev=fopen(file_ev,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:26:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int OrbPol2int(char OrbPol[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Species[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char OrbPol[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:26:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int OrbPol2int(char OrbPol[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Species[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char OrbPol[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms0.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:26:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int OrbPol2int(char OrbPol[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Species[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char OrbPol[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Input_std_Atoms2.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:111:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char interpolate_filename1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:112:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char interpolate_filename2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filepath[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:293:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:315:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:334:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:364:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           char *position, 
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fnameout[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:1412:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:1431:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (  (fp=fopen(fname,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:1915:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (  (fp=fopen(fname,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:2694:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:2713:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fp =fopen(fname,"w") )== NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:2820:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fp =fopen(fname,"w") )== NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:2914:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:3049:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( ( fp =fopen(fname,"w") )== NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:3121:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:3140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:3146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:3495:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void MTRAN_Set_SurfOverlap(char *position, 
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis.c:3532:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:112:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char interpolate_filename1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:113:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char interpolate_filename2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filepath[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:120:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:295:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:315:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:333:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:362:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                           char *position, 
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:452:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fnameout[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:1343:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:1362:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (  (fp=fopen(fname,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:1930:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (  (fp=fopen(fname,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:2782:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:2801:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fp =fopen(fname,"w") )== NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:2906:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( ( fp =fopen(fname,"w") )== NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:3000:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:3121:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( ( fp =fopen(fname,"w") )== NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:3193:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 char *fname,
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:3212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:3218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:3563:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void MTRAN_Set_SurfOverlap(char *position, 
data/openmx-3.8.5+dfsg1/source/TRAN_Main_Analysis_NC.c:3606:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Output_HKS.c:121:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp=fopen(fileHKS,"w"))==NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_Output_Trans_HS.c:214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Output_Trans_HS.c:232:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp=fopen(name,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Output_Trans_HS.c:776:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Output_Trans_HS.c:794:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp=fopen(name,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Print.c:130:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp=fopen(name,"w"))==NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_Print.c:161:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp=fopen(name,"w"))==NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:20:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(filename,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:40:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:56:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp=fopen(filename,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:84:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:98:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp=fopen(filename,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:125:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:139:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp=fopen(filename,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:169:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filenamer,
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:170:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filenamei,
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:184:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp=fopen(filenamer,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:212:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp=fopen(filenamei,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:241:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:256:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp=fopen(filename,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Print_Grid.c:301:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp=fopen(filename,"w");
data/openmx-3.8.5+dfsg1/source/TRAN_Read.c:17:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[LEN];
data/openmx-3.8.5+dfsg1/source/TRAN_Read.c:19:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if  (   (fp=fopen(str,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_Read.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[LEN];
data/openmx-3.8.5+dfsg1/source/TRAN_Read.c:63:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if  (   (fp=fopen(str,"r"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/TRAN_RestartFile.c:143:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp=fopen(fileHKS,"r"))==NULL) {
data/openmx-3.8.5+dfsg1/source/TRAN_RestartFile.c:524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileHKS[YOUSO10];
data/openmx-3.8.5+dfsg1/source/TRAN_Set_IntegPath.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/TRAN_Set_IntegPath.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Set_IntegPath.c:141:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fp = fopen(file,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/TRAN_Set_SurfOverlap.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[100];
data/openmx-3.8.5+dfsg1/source/TRAN_Set_SurfOverlap_NC.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[100];
data/openmx-3.8.5+dfsg1/source/Timetool.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[200];
data/openmx-3.8.5+dfsg1/source/Total_Energy.c:1484:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_DPM[YOUSO10] = ".dpm";
data/openmx-3.8.5+dfsg1/source/Total_Energy.c:1486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Total_Energy.c:2088:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_DPM = fopen(file_DPM,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:372:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".EV");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:374:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_EV = fopen(file_EV,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:452:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".unfold_totup");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:455:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_EV = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:461:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".unfold_orbup");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:463:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_EV1 = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:472:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".unfold_totup");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:474:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_EV = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:479:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".unfold_orbup");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:481:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_EV1 = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:486:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".unfold_totdn");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:488:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_EV2 = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:493:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(file_EV,".unfold_orbdn");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:495:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_EV3 = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:509:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".unfold_plotexample");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:511:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp_EV0 = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1294:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Angular[Supported_MaxL+1][2*(Supported_MaxL+1)+1];
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1295:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *Name_Multiple[20];
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1296:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_EV[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1300:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1606:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".EV");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1608:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_EV = fopen(file_EV,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1683:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".unfold_tot");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1685:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp_EV = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1690:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".unfold_orb");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1692:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp_EV1 = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1705:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(file_EV,".unfold_plotexample");
data/openmx-3.8.5+dfsg1/source/Unfolding_Bands.c:1707:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp_EV0 = fopen(file_EV,"w");
data/openmx-3.8.5+dfsg1/source/Voronoi_Charge.c:39:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_VC[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Voronoi_Charge.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/Voronoi_Charge.c:223:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_VC = fopen(file_VC,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/Voronoi_Orbital_Moment.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_VOM[YOUSO10];
data/openmx-3.8.5+dfsg1/source/Voronoi_Orbital_Moment.c:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/add_gcube.c:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ctmp[100];
data/openmx-3.8.5+dfsg1/source/add_gcube.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000],buf2[1000],*c;
data/openmx-3.8.5+dfsg1/source/add_gcube.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/add_gcube.c:56:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/add_gcube.c:116:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp2 = fopen(argv[2],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/add_gcube.c:254:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(argv[3],"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:81:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *Unitname0[MUNIT]={"eV","Hartree"};
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[200],fnamedat1[3][200],*pos_dot,ticsname[200];
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:118:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp=fopen(argv[1],"r") ) ==0 ) {
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:300:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fp=fopen(fnamedat1[spin],"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/bandgnu13.c:374:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fp=fopen(fname,"w"))==NULL ) {
data/openmx-3.8.5+dfsg1/source/bin2txt.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/bin2txt.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/bin2txt.c:76:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(fname1,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/bin2txt.c:78:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp2 = fopen(fname2,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/bin2txt.c:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/bin2txt.c:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/bin2txt.c:176:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(fname1,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/bin2txt.c:178:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp2 = fopen(fname2,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/bin2txt.c:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/bin2txt.c:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/bin2txt.c:258:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(fname1,"rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/bin2txt.c:260:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp2 = fopen(fname2,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/cellopt.c:31:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[40];
data/openmx-3.8.5+dfsg1/source/cellopt.c:54:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fileE[YOUSO10] = ".ene"; 
data/openmx-3.8.5+dfsg1/source/cellopt.c:55:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fileDRC[YOUSO10] = ".md";
data/openmx-3.8.5+dfsg1/source/cellopt.c:256:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fileE[YOUSO10] = ".ene"; 
data/openmx-3.8.5+dfsg1/source/cellopt.c:257:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fileDRC[YOUSO10] = ".md";
data/openmx-3.8.5+dfsg1/source/check_lead.c:13:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int Species2int(char Species[asize10]);
data/openmx-3.8.5+dfsg1/source/check_lead.c:14:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int SEQ(char str1[asize10], char str2[asize10]);
data/openmx-3.8.5+dfsg1/source/check_lead.c:14:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int SEQ(char str1[asize10], char str2[asize10]);
data/openmx-3.8.5+dfsg1/source/check_lead.c:15:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void fnjoint2(char name1[asize10], char name2[asize10],
data/openmx-3.8.5+dfsg1/source/check_lead.c:15:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void fnjoint2(char name1[asize10], char name2[asize10],
data/openmx-3.8.5+dfsg1/source/check_lead.c:16:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     char name3[asize10], char name4[asize10]);
data/openmx-3.8.5+dfsg1/source/check_lead.c:16:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     char name3[asize10], char name4[asize10]);
data/openmx-3.8.5+dfsg1/source/check_lead.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[asize10];
data/openmx-3.8.5+dfsg1/source/check_lead.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command0[3*asize10];
data/openmx-3.8.5+dfsg1/source/check_lead.c:80:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp2 = fopen(fname2,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/check_lead.c:81:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/check_lead.c:505:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/check_lead.c:506:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Species[20];
data/openmx-3.8.5+dfsg1/source/check_lead.c:509:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char DirPAO[asize10];
data/openmx-3.8.5+dfsg1/source/check_lead.c:510:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExtPAO[asize10] = ".pao";
data/openmx-3.8.5+dfsg1/source/check_lead.c:511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char FN_PAO[asize10];
data/openmx-3.8.5+dfsg1/source/check_lead.c:937:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(FN_PAO,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/check_lead.c:957:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c,cstr[asize10];
data/openmx-3.8.5+dfsg1/source/check_lead.c:993:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Spe_Num_Basis[p][l]  = atoi(cstr);
data/openmx-3.8.5+dfsg1/source/check_lead.c:994:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Spe_Num_CBasis[p][l] = atoi(cstr);
data/openmx-3.8.5+dfsg1/source/check_lead.c:1000:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          Spe_Num_CBasis[p][l] = atoi(cstr);   
data/openmx-3.8.5+dfsg1/source/check_lead.c:1029:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Species2int(char Species[asize10])
data/openmx-3.8.5+dfsg1/source/check_lead.c:1052:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int SEQ(char str1[asize10],
data/openmx-3.8.5+dfsg1/source/check_lead.c:1053:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char str2[asize10])
data/openmx-3.8.5+dfsg1/source/check_lead.c:1074:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint2(char name1[asize10], char name2[asize10],
data/openmx-3.8.5+dfsg1/source/check_lead.c:1074:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint2(char name1[asize10], char name2[asize10],
data/openmx-3.8.5+dfsg1/source/check_lead.c:1075:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char name3[asize10], char name4[asize10])
data/openmx-3.8.5+dfsg1/source/check_lead.c:1075:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char name3[asize10], char name4[asize10])
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:62:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(&fname2[i],".xsf");
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:64:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(fname1, "r")) != NULL){
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:66:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp2 = fopen(fname2, "w")) != NULL){
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:178:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clist[300];
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[300];
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:185:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(&fname2[i], ".xsf");
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:187:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(fname1, "rb")) != NULL){
data/openmx-3.8.5+dfsg1/source/cube2xsf.c:189:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp2 = fopen(fname2, "w")) != NULL){
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ctmp[100];
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000],buf2[1000],*c;
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:56:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:116:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp2 = fopen(argv[2],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/diff_gcube.c:254:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(argv[3],"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/diff_geo.c:34:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void read_xyzfiles(char file1[100], char file2[100]);
data/openmx-3.8.5+dfsg1/source/diff_geo.c:34:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void read_xyzfiles(char file1[100], char file2[100]);
data/openmx-3.8.5+dfsg1/source/diff_geo.c:51:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char file1[100];
data/openmx-3.8.5+dfsg1/source/diff_geo.c:52:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char file2[100];
data/openmx-3.8.5+dfsg1/source/diff_geo.c:436:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void read_xyzfiles(char file1[100], char file2[100])
data/openmx-3.8.5+dfsg1/source/diff_geo.c:436:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void read_xyzfiles(char file1[100], char file2[100])
data/openmx-3.8.5+dfsg1/source/diff_geo.c:440:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char stmp[20];
data/openmx-3.8.5+dfsg1/source/diff_geo.c:442:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/diff_geo.c:445:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file1,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/diff_geo.c:477:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file2,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/diff_geo.c:822:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fname[100];
data/openmx-3.8.5+dfsg1/source/diff_geo.c:824:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/diff_geo.c:826:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname,"dgeo_vec.xsf");
data/openmx-3.8.5+dfsg1/source/diff_geo.c:828:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/esp.c:58:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Species2int(char Species[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/esp.c:59:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/esp.c:59:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/esp.c:89:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char file[20][100];
data/openmx-3.8.5+dfsg1/source/esp.c:90:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/esp.c:158:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      Modified_MK = atoi(argv[c_i+1]);
data/openmx-3.8.5+dfsg1/source/esp.c:259:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ctmp1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/esp.c:261:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/esp.c:265:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/esp.c:766:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ctmp1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/esp.c:767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/esp.c:769:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/esp.c:897:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char ctmp1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/esp.c:898:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fp_buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/esp.c:900:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(file,"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/esp.c:962:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20],Species[20];
data/openmx-3.8.5+dfsg1/source/esp.c:963:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/esp.c:1077:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Species2int(char Species[YOUSO10])
data/openmx-3.8.5+dfsg1/source/esp.c:1102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10])
data/openmx-3.8.5+dfsg1/source/esp.c:1102:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10])
data/openmx-3.8.5+dfsg1/source/expao.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/openmx-3.8.5+dfsg1/source/expao.c:83:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[200],file2[200],file3[200];
data/openmx-3.8.5+dfsg1/source/expao.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[3000];
data/openmx-3.8.5+dfsg1/source/expao.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st1[3000];
data/openmx-3.8.5+dfsg1/source/expao.c:117:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file1,"<pseudo.atomic.orbitals.L=%i",L);
data/openmx-3.8.5+dfsg1/source/expao.c:118:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file2,"pseudo.atomic.orbitals.L=%i>",L);
data/openmx-3.8.5+dfsg1/source/expao.c:184:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file1,"<pseudo.atomic.orbitals.L=%i",L);
data/openmx-3.8.5+dfsg1/source/expao.c:185:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file2,"pseudo.atomic.orbitals.L=%i>",L);
data/openmx-3.8.5+dfsg1/source/expao.c:237:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp1 = fopen(argv[3],"w");
data/openmx-3.8.5+dfsg1/source/expao.c:242:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp2 = fopen(argv[1],"r");
data/openmx-3.8.5+dfsg1/source/expao.c:341:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp=fpnest[nestlevel]=fopen(fname, "r");
data/openmx-3.8.5+dfsg1/source/expao.c:406:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s1[500],s2[500];
data/openmx-3.8.5+dfsg1/source/expao.c:472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:475:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *strval[SIZE_LOGICAL_DEFAULT]={"on","yes","true",".true.","ok","off","no","false",".false.","ng"};
data/openmx-3.8.5+dfsg1/source/expao.c:478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:515:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:517:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:553:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:555:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:591:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:593:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:628:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:666:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/expao.c:668:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:711:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/expao.c:713:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:758:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/expao.c:760:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:805:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE] ;
data/openmx-3.8.5+dfsg1/source/expao.c:806:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:826:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/expao.c:827:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/exx.c:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path_cachedir[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx.c:53:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char g_exx_cachedir[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx.h:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char g_exx_cachedir[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:39:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "wb");
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:70:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "ab");
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:90:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "r+b");
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:115:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "rb");
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:144:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "rb");
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_file_eri.c:205:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "rb");
data/openmx-3.8.5+dfsg1/source/exx_file_overlap.c:52:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(path, "wb");
data/openmx-3.8.5+dfsg1/source/exx_file_overlap.c:105:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "rb");
data/openmx-3.8.5+dfsg1/source/exx_log.c:118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN], host[HOST_NAME_MAX];
data/openmx-3.8.5+dfsg1/source/exx_log.c:132:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(path, "log%03d.txt", myrank);
data/openmx-3.8.5+dfsg1/source/exx_log.c:135:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp_log = fopen(path, "wt");
data/openmx-3.8.5+dfsg1/source/exx_rhox.c:20:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_rhox.c:33:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "wb");
data/openmx-3.8.5+dfsg1/source/exx_rhox.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_rhox.c:96:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "rb");
data/openmx-3.8.5+dfsg1/source/exx_step1.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path_cache[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/exx_step2.c:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path_cache[EXX_PATHLEN];
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:24:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char Name[100];
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:126:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[100],char name2[100],char name3[100])
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:126:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[100],char name2[100],char name3[100])
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:126:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[100],char name2[100],char name3[100])
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:128:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char name4[100];
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:156:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[100],char name2[100])
data/openmx-3.8.5+dfsg1/source/frac2xyz.c:156:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[100],char name2[100])
data/openmx-3.8.5+dfsg1/source/intensity_map.c:93:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  column_index = atoi(argv[c_i+1]);
data/openmx-3.8.5+dfsg1/source/intensity_map.c:115:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/io_tester.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[300];
data/openmx-3.8.5+dfsg1/source/io_tester.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];   
data/openmx-3.8.5+dfsg1/source/io_tester.c:77:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname,"IO_test.txt1");
data/openmx-3.8.5+dfsg1/source/io_tester.c:78:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/io_tester.c:105:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname,"IO_test.txt2");
data/openmx-3.8.5+dfsg1/source/io_tester.c:106:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/io_tester.c:136:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname,"IO_test.txt3");
data/openmx-3.8.5+dfsg1/source/io_tester.c:137:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fname,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/iterout.c:18:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void iterout(int iter,double drctime,char filepath[YOUSO10],char filename[YOUSO10])
data/openmx-3.8.5+dfsg1/source/iterout.c:18:61:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void iterout(int iter,double drctime,char filepath[YOUSO10],char filename[YOUSO10])
data/openmx-3.8.5+dfsg1/source/iterout.c:23:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileXYZ[YOUSO10];
data/openmx-3.8.5+dfsg1/source/iterout.c:24:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileSDRC[YOUSO10] = ".md";
data/openmx-3.8.5+dfsg1/source/iterout.c:26:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/iterout.c:43:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileSDRC,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/iterout.c:171:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fileXYZ,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/iterout_md.c:16:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void iterout_md(int iter, double drctime, char fileSE[YOUSO10])
data/openmx-3.8.5+dfsg1/source/iterout_md.c:21:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/iterout_md.c:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileEvsLC[YOUSO10];  
data/openmx-3.8.5+dfsg1/source/iterout_md.c:24:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(fileSE,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/iterout_md.c:75:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileEvsLC,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/iterout_md.c:101:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fileEvsLC,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/jx.c:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFFER_SIZE], headline[256], pao_name[256];
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:122:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(path, "r");
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:139:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (EOF != n) ngrid = atoi(buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:144:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (EOF != n) lmax = atoi(buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:149:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if (EOF != n) mul = atoi(buffer);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:194:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(headline, "<pseudo.atomic.orbitals.L=%d", l);
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_test3.c:27:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *card[12] = {
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_test3.c:32:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char xyz[3] = "xyz";
data/openmx-3.8.5+dfsg1/source/md2axsf.c:23:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Atom_Symbol[105][4];
data/openmx-3.8.5+dfsg1/source/md2axsf.c:26:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Atomic_Number(char species[4]);
data/openmx-3.8.5+dfsg1/source/md2axsf.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char read_str[strsize];
data/openmx-3.8.5+dfsg1/source/md2axsf.c:41:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/md2axsf.c:56:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp1 = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/md2axsf.c:69:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp0 = fopen(argv[2],"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/md2axsf.c:74:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp1 = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/md2axsf.c:150:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Atomic_Number(char species[4])
data/openmx-3.8.5+dfsg1/source/md2axsf.c:174:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[  2], "He");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:175:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[  3], "Li");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:176:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[  4], "Be");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:182:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 10], "Ne");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:183:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 11], "Na");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:184:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 12], "Mg");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:185:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 13], "Al");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:186:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 14], "Si");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:189:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 17], "Cl");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:190:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 18], "Ar");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:192:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 20], "Ca");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:193:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 21], "Sc");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:194:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 22], "Ti");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:196:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 24], "Cr");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:197:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 25], "Mn");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:198:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 26], "Fe");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:199:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 27], "Co");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:200:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 28], "Ni");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:201:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 29], "Cu");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:202:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 30], "Zn");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:203:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 31], "Ga");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:204:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 32], "Ge");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:205:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 33], "As");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:206:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 34], "Se");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:207:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 35], "Br");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:208:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 36], "Kr");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:209:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 37], "Rb");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:210:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 38], "Sr");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:212:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 40], "Zr");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:213:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 41], "Nb");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:214:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 42], "Mo");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:215:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 43], "Tc");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:216:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 44], "Ru");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:217:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 45], "Rh");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:218:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 46], "Pd");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:219:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 47], "Ag");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:220:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 48], "Cd");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:221:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 49], "In");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:222:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 50], "Sn");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:223:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 51], "Sb");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:224:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 52], "Te");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:226:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 54], "Xe");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:227:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 55], "Cs");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:228:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 56], "Ba");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:229:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 57], "La");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:230:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 58], "Ce");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:231:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 59], "Pr");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:232:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 60], "Nd");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:233:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 61], "Pm");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:234:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 62], "Sm");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:235:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 63], "Eu");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:236:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 64], "Gd");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:237:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 65], "Tb");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:238:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 66], "Dy");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:239:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 67], "Ho");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:240:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 68], "Er");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:241:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 69], "Tm");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:242:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 70], "Yb");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:243:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 71], "Lu");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:244:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 72], "Hf");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:245:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 73], "Ta");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:247:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 75], "Re");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:248:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 76], "Os");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:249:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 77], "Ir");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:250:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 78], "Pt");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:251:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 79], "Au");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:252:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 80], "Hg");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:253:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 81], "Tl");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:254:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 82], "Pb");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:255:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 83], "Bi");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:256:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 84], "Po");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:257:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 85], "At");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:258:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 86], "Rn");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:259:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 87], "Fr");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:260:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 88], "Ra");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:261:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 89], "Ac");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:262:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 90], "Th");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:263:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 91], "Pa");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:265:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 93], "Np");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:266:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 94], "Pu");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:267:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 95], "Am");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:268:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 96], "Cm");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:269:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 97], "Bk");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:270:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 98], "Cf");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:271:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[ 99], "Es");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:272:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[100], "Fm");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:273:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[101], "Md");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:274:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[102], "No");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:275:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Atom_Symbol[103], "Lr");
data/openmx-3.8.5+dfsg1/source/mpao.c:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str1[100];
data/openmx-3.8.5+dfsg1/source/mpao.c:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/openmx-3.8.5+dfsg1/source/mpao.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file1[200],file2[200],file3[200];
data/openmx-3.8.5+dfsg1/source/mpao.c:188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[3000];
data/openmx-3.8.5+dfsg1/source/mpao.c:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st1[3000];
data/openmx-3.8.5+dfsg1/source/mpao.c:219:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file1,"<Contraction.coefficients%i",num);
data/openmx-3.8.5+dfsg1/source/mpao.c:220:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file2,"Contraction.coefficients%i>",num);
data/openmx-3.8.5+dfsg1/source/mpao.c:293:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file1,"<pseudo.atomic.orbitals.L=%i",L);
data/openmx-3.8.5+dfsg1/source/mpao.c:294:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(file2,"pseudo.atomic.orbitals.L=%i>",L);
data/openmx-3.8.5+dfsg1/source/mpao.c:386:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp1 = fopen(argv[3],"w");
data/openmx-3.8.5+dfsg1/source/mpao.c:391:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp3 = fopen(argv[1],"r");
data/openmx-3.8.5+dfsg1/source/mpao.c:417:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp2 = fopen(argv[2],"r");
data/openmx-3.8.5+dfsg1/source/mpao.c:509:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp=fpnest[nestlevel]=fopen(fname, "r");
data/openmx-3.8.5+dfsg1/source/mpao.c:574:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s1[500],s2[500];
data/openmx-3.8.5+dfsg1/source/mpao.c:640:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:643:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *strval[SIZE_LOGICAL_DEFAULT]={"on","yes","true",".true.","ok","off","no","false",".false.","ng"};
data/openmx-3.8.5+dfsg1/source/mpao.c:646:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:683:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:685:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:721:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:723:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:759:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:761:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:796:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:798:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE],val_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:834:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/mpao.c:836:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:879:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/mpao.c:881:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:926:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE], *c;
data/openmx-3.8.5+dfsg1/source/mpao.c:928:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:973:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE] ;
data/openmx-3.8.5+dfsg1/source/mpao.c:974:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:994:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/mpao.c:995:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key_inbuf[BUFSIZE];
data/openmx-3.8.5+dfsg1/source/neb.c:49:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void Make_XYZ_File(char fname[YOUSO10], double ***neb_atom_coordinates);
data/openmx-3.8.5+dfsg1/source/neb.c:50:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void Generate_Restart_File(char fname[YOUSO10], double ***neb_atom_coordinates);
data/openmx-3.8.5+dfsg1/source/neb.c:64:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char fileXYZ[YOUSO10] = ".neb.xyz"; 
data/openmx-3.8.5+dfsg1/source/neb.c:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char system_name[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname_original[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_neb_utot[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:240:43:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (Scf_RestartFromFile==1 && (fp = fopen(file_neb_utot,"rb"))!=NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:335:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file_neb_utot,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:577:43:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (Scf_RestartFromFile==1 && (fp = fopen(file_neb_utot,"rb"))!=NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:653:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ((fp = fopen(file_neb_utot,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:949:41:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (Scf_RestartFromFile==1 && (fp = fopen(file_neb_utot,"rb"))!=NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:1046:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fp = fopen(file_neb_utot,"wb")) != NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:1279:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Generate_Restart_File(char fname_original[YOUSO10], double ***neb_atom_coordinates)
data/openmx-3.8.5+dfsg1/source/neb.c:1286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[800];
data/openmx-3.8.5+dfsg1/source/neb.c:1287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st1[800];
data/openmx-3.8.5+dfsg1/source/neb.c:1288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rm_operate[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:1289:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:1290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:1291:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keyword[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:1312:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp1 = fopen(fname1,"w");
data/openmx-3.8.5+dfsg1/source/neb.c:1317:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp2 = fopen(fname_original,"r");
data/openmx-3.8.5+dfsg1/source/neb.c:1430:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(keyword,"<neb%i.atoms.speciesandcoordinates",p);
data/openmx-3.8.5+dfsg1/source/neb.c:1472:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp2 = fopen(fname_original,"r");
data/openmx-3.8.5+dfsg1/source/neb.c:1540:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Make_XYZ_File(char fname[YOUSO10], double ***neb_atom_coordinates)
data/openmx-3.8.5+dfsg1/source/neb.c:1545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_neb_utot[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:1553:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(fname,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:1597:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileOPT[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:1599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileE[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:1663:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_OPT = fopen(fileOPT,"a")) != NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:1696:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_E = fopen(fileE,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/neb.c:2403:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[800];
data/openmx-3.8.5+dfsg1/source/neb.c:2404:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st1[800];
data/openmx-3.8.5+dfsg1/source/neb.c:2405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rm_operate[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:2406:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:2407:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname1[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:2408:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname2[YOUSO10];
data/openmx-3.8.5+dfsg1/source/neb.c:2445:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp1 = fopen(fname1,"w");
data/openmx-3.8.5+dfsg1/source/neb.c:2450:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp2 = fopen(file,"r");
data/openmx-3.8.5+dfsg1/source/neb.c:2617:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Species[100];
data/openmx-3.8.5+dfsg1/source/neb.c:2618:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char OrbPol[100];
data/openmx-3.8.5+dfsg1/source/neb.c:2619:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXBUF];
data/openmx-3.8.5+dfsg1/source/neb.c:2620:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char keyword[YOUSO10];  
data/openmx-3.8.5+dfsg1/source/neb.c:2622:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[40];
data/openmx-3.8.5+dfsg1/source/neb.c:2997:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(keyword,"<NEB%d.Atoms.SpeciesAndCoordinates",p);
data/openmx-3.8.5+dfsg1/source/neb.c:3011:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(keyword,"NEB%d.Atoms.SpeciesAndCoordinates>",p);
data/openmx-3.8.5+dfsg1/source/neb_check.c:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[40];
data/openmx-3.8.5+dfsg1/source/neb_run.c:33:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fileMemory[YOUSO10]; 
data/openmx-3.8.5+dfsg1/source/openmx.c:79:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char fileMemory[YOUSO10]; 
data/openmx-3.8.5+dfsg1/source/openmx.c:141:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    openmp_threads_num = atoi(argv[ip+1]);
data/openmx-3.8.5+dfsg1/source/openmx.c:497:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    force_flag = atoi(argv[ip+1]);
data/openmx-3.8.5+dfsg1/source/openmx.c:536:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    stress_flag = atoi(argv[ip+1]);
data/openmx-3.8.5+dfsg1/source/openmx_common.c:347:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[YOUSO10],char name2[YOUSO10],char name3[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:347:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[YOUSO10],char name2[YOUSO10],char name3[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:347:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[YOUSO10],char name2[YOUSO10],char name3[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:349:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name4[YOUSO10];
data/openmx-3.8.5+dfsg1/source/openmx_common.c:377:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint2(char name1[YOUSO10], char name2[YOUSO10],
data/openmx-3.8.5+dfsg1/source/openmx_common.c:377:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint2(char name1[YOUSO10], char name2[YOUSO10],
data/openmx-3.8.5+dfsg1/source/openmx_common.c:378:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char name3[YOUSO10], char name4[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:378:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char name3[YOUSO10], char name4[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:407:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[YOUSO10],char name2[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:407:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[YOUSO10],char name2[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:424:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.c:424:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10])
data/openmx-3.8.5+dfsg1/source/openmx_common.h:1:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char Version_OpenMX[30] = "3.8.5"; /* version of OpenMX */ 
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2380:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Atom_Symbol[YOUSO14][4];
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2487:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char filename[YOUSO10],filepath[YOUSO10],command[YOUSO10];
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2488:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char DFT_DATA_PATH[YOUSO10];
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2735:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double EC(char *mode,
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2744:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double Divide_Conquer(char *mode,
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2753:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double Krylov(char *mode,
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2912:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                   char *mode,
data/openmx-3.8.5+dfsg1/source/openmx_common.h:2942:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
double Cluster_DFT_ON2(char *mode,
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3086:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int Species2int(char Species[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3088:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3088:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int SEQ(char str1[YOUSO10], char str2[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3091:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void iterout(int iter,double drctime,char fileE[YOUSO10],char fileDRC[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3091:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void iterout(int iter,double drctime,char fileE[YOUSO10],char fileDRC[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3092:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void iterout_md(int iter,double drctime,char fileSE[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3094:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 int Cnt_Now, int SCF_iter, char fname[YOUSO10],
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3145:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[YOUSO10],char name2[YOUSO10],char name3[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3145:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[YOUSO10],char name2[YOUSO10],char name3[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3145:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[YOUSO10],char name2[YOUSO10],char name3[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3146:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint2(char name1[YOUSO10], char name2[YOUSO10],
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3146:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint2(char name1[YOUSO10], char name2[YOUSO10],
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3147:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char name3[YOUSO10], char name4[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3147:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char name3[YOUSO10], char name4[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3148:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[YOUSO10],char name2[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/openmx_common.h:3148:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[YOUSO10],char name2[YOUSO10]);
data/openmx-3.8.5+dfsg1/source/outputfile1.c:9:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 int Cnt_Now, int SCF_iter, char fname[YOUSO10], 
data/openmx-3.8.5+dfsg1/source/outputfile1.c:14:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/outputfile1.c:22:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(fname, "a");   
data/openmx-3.8.5+dfsg1/source/outputfile1.c:52:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(fname, "a");   
data/openmx-3.8.5+dfsg1/source/outputfile1.c:119:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(fname, "a");   
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:23:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void pdb2pao(char pao[asize1],
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:24:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char res[asize1], char atom[asize1]);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:24:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char res[asize1], char atom[asize1]);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:25:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void strcpy2(char names[2][asize2],
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:26:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char pdb[asize2], char pao[asize2]);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:26:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
             char pdb[asize2], char pao[asize2]);
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Name_Residues[asize1][asize2];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char NameAtoms[30][asize1][2][asize2];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char st[300],buffer[asize1];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer0[asize1],buffer1[asize1];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char res[asize1],res1[asize1];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char atom[asize1],pao[asize1];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[asize1],y[asize1],z[asize1];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char list_pao[100][asize1];
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:56:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp=fopen(argv[1],"r"))!=NULL){
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:61:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        rnum = atoi(buffer);  
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:78:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp=fopen(argv[1],"r"))!=NULL){
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:102:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	cres = atoi(buffer0);  
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:106:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy(pao, "HNA");          
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:109:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy(pao, "NA");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:114:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy(pao, "OC");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:117:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	  strcpy(pao, "CC");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:192:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(buffer0, "-s2p1");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:193:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(buffer1, "-s2p2d1");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:235:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void pdb2pao(char pao[asize1], char res[asize1], char atom[asize1])
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:235:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void pdb2pao(char pao[asize1], char res[asize1], char atom[asize1])
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:235:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void pdb2pao(char pao[asize1], char res[asize1], char atom[asize1])
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:286:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[0], "GLY");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:301:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[1], "ALA");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:318:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[2], "VAL");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:339:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[3], "LEU");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:362:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[4], "ILE");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:385:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[5], "PRO");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:406:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[6], "PHE");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:435:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[7], "MET");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:457:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[8], "TRP");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:489:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[9], "CYS");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:496:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[10], "LYS");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:521:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[11], "ARG");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:549:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[12], "HIS");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:577:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[13], "ASP");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:597:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[14], "GLU");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:619:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[15], "ASN");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:640:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[16], "GLN");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:663:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[17], "SER");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:682:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[18], "THR");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:703:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(Name_Residues[19], "TYR");
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:730:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void strcpy2(char names[2][asize2], char pdb[asize2], char pao[asize2])
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:730:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void strcpy2(char names[2][asize2], char pdb[asize2], char pao[asize2])
data/openmx-3.8.5+dfsg1/source/pdb2pao.c:730:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void strcpy2(char names[2][asize2], char pdb[asize2], char pao[asize2])
data/openmx-3.8.5+dfsg1/source/polB.c:111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/read_scfout.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/read_scfout.c:29:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/read_scfout.c:53:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char makeinp[100];
data/openmx-3.8.5+dfsg1/source/read_scfout.c:54:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char strg[MAX_LINE_SIZE];
data/openmx-3.8.5+dfsg1/source/read_scfout.c:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/read_scfout.c:549:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(makeinp,"temporal_12345.input");
data/openmx-3.8.5+dfsg1/source/read_scfout.c:551:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp_makeinp = fopen(makeinp,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/readfile.c:27:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileMemory[YOUSO10]; 
data/openmx-3.8.5+dfsg1/source/readfile.c:28:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/readfile.c:39:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(argv[1],"r")) != NULL){
data/openmx-3.8.5+dfsg1/source/rmmpi.c:13:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char st[300],buffer[800];
data/openmx-3.8.5+dfsg1/source/rmmpi.c:14:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char operate[800];
data/openmx-3.8.5+dfsg1/source/rmmpi.c:17:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"ps aux > rmmpi_tmp");
data/openmx-3.8.5+dfsg1/source/rmmpi.c:20:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp=fopen("rmmpi_tmp","r"))!=NULL){
data/openmx-3.8.5+dfsg1/source/rmmpi.c:25:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pid = atoi(buffer);  
data/openmx-3.8.5+dfsg1/source/rmmpi.c:28:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(operate,"kill -9 %2d",pid);
data/openmx-3.8.5+dfsg1/source/rmmpi.c:39:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(operate,"rm rmmpi_tmp");
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:344:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char *filename,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:345:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char *filepath,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:512:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:523:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:533:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:543:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filenamer,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:544:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filenamei,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:554:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *filename,
data/openmx-3.8.5+dfsg1/source/tran_prototypes.h:656:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char **str,
data/openmx-3.8.5+dfsg1/source/tran_variables.h:19:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char TRAN_hksoutfilename[YOUSO10];
data/openmx-3.8.5+dfsg1/source/tran_variables.h:20:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char TRAN_hksfilename[2][YOUSO10];
data/openmx-3.8.5+dfsg1/source/truncation.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_TRN[YOUSO10] = ".TRN";
data/openmx-3.8.5+dfsg1/source/truncation.c:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/truncation.c:3167:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp_TRN = fopen(file_TRN,"w")) != NULL){
data/openmx-3.8.5+dfsg1/source/truncation.c:3547:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *s_vec[20];
data/openmx-3.8.5+dfsg1/source/truncation.c:3918:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_UCell[YOUSO10];
data/openmx-3.8.5+dfsg1/source/truncation.c:3920:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[fp_bsize];          /* setvbuf */
data/openmx-3.8.5+dfsg1/source/truncation.c:4108:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fp = fopen(file_UCell, "w");
data/openmx-3.8.5+dfsg1/source/truncation.c:4364:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(file_UCell, "a");
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:24:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char Name[100];
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:139:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[100],char name2[100],char name3[100])
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:139:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[100],char name2[100],char name3[100])
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:139:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void fnjoint(char name1[100],char name2[100],char name3[100])
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:141:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char name4[100];
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:169:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[100],char name2[100])
data/openmx-3.8.5+dfsg1/source/unit2xyz.c:169:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void chcp(char name1[100],char name2[100])
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:551:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:857:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(ret[i]);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:903:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/DFT_DATA13/PAO/mpao.c:953:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/source/DosMain.c:348:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(r0)==0 ) { return  NULL; }
data/openmx-3.8.5+dfsg1/source/DosMain.c:376:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(basename)==0) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:497:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(basename)==0) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:677:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(basename)==0) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:849:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(basename)==0) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:996:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(basename)==0) {
data/openmx-3.8.5+dfsg1/source/DosMain.c:1867:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(basename)==0) {
data/openmx-3.8.5+dfsg1/source/Force_test.c:191:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[0],"");
data/openmx-3.8.5+dfsg1/source/Force_test.c:192:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[1],"");
data/openmx-3.8.5+dfsg1/source/Force_test.c:193:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[2],"");
data/openmx-3.8.5+dfsg1/source/Force_test.c:194:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[3],"");
data/openmx-3.8.5+dfsg1/source/Force_test.c:195:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[4],"");
data/openmx-3.8.5+dfsg1/source/Force_test.c:196:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[5],"");
data/openmx-3.8.5+dfsg1/source/Input_std.c:3722:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Name_Wannier_Projectors[  0], "s");          Num_Projectors[0]  = 1;  NumL[0][0]=1; 
data/openmx-3.8.5+dfsg1/source/Input_std.c:3955:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Name_Wannier_Projectors[ 21], "p");   
data/openmx-3.8.5+dfsg1/source/Input_std.c:3968:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Name_Wannier_Projectors[ 22], "d");     
data/openmx-3.8.5+dfsg1/source/Input_std.c:3985:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Name_Wannier_Projectors[ 23], "f");     
data/openmx-3.8.5+dfsg1/source/Input_std.c:4070:3:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
  sprintf(SpeBasisName[p],"");
data/openmx-3.8.5+dfsg1/source/Inputtools.c:70:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:382:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(ret[i]);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:428:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/source/Inputtools.c:478:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:115:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[0],"");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:116:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[1],"");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:117:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[2],"");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:118:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[3],"");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:119:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[4],"");
data/openmx-3.8.5+dfsg1/source/Memory_Leak_test.c:120:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[5],"");
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:95:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:95:35:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:111:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/Merge_LogFile.c:111:37:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData.c:150:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData.c:150:39:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData.c:2907:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	        command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:162:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:162:34:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    for (c=getc(fp2); c!=EOF; c=getc(fp2))  putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1902:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  for (c=getc(fp2); c!=EOF; c=getc(fp2)) putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:1902:32:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  for (c=getc(fp2); c!=EOF; c=getc(fp2)) putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2088:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  for (c=getc(fp2); c!=EOF; c=getc(fp2)) putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2088:32:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  for (c=getc(fp2); c!=EOF; c=getc(fp2)) putc(c,fp1); 
data/openmx-3.8.5+dfsg1/source/OutData_Binary.c:2552:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	        command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1937:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  0], "E");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1938:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  1], "H");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1942:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  5], "B");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1943:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  6], "C");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1944:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  7], "N");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1945:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  8], "O");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1946:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  9], "F");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1952:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 15], "P");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1953:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 16], "S");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1956:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 19], "K");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1960:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 23], "V");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1976:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 39], "Y");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:1990:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 53], "I");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2011:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 74], "W");
data/openmx-3.8.5+dfsg1/source/SetPara_DFT.c:2029:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 92], "U");
data/openmx-3.8.5+dfsg1/source/Show_DFT_DATA.c:187:3:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
  sprintf(SpeBasisName[p],"");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:192:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[0],"");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:193:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[1],"");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:194:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[2],"");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:195:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[3],"");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:196:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[4],"");
data/openmx-3.8.5+dfsg1/source/Stress_test.c:197:9:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
        sprintf(str[5],"");
data/openmx-3.8.5+dfsg1/source/TRAN_CDen_Main.c:778:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(write_mode, "w");
data/openmx-3.8.5+dfsg1/source/TRAN_Channel_Output.c:492:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(write_mode, "w");
data/openmx-3.8.5+dfsg1/source/Timetool.c:34:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 len=strlen(buf);
data/openmx-3.8.5+dfsg1/source/check_lead.c:86:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/check_lead.c:112:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/check_lead.c:151:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/check_lead.c:156:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/check_lead.c:192:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/check_lead.c:232:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/check_lead.c:237:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              command0[strlen(command0)-1] = '\0';
data/openmx-3.8.5+dfsg1/source/check_lead.c:1058:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = strlen(str1);
data/openmx-3.8.5+dfsg1/source/check_lead.c:1059:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = strlen(str2);
data/openmx-3.8.5+dfsg1/source/esp.c:1107:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = strlen(str1);
data/openmx-3.8.5+dfsg1/source/esp.c:1108:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = strlen(str2);
data/openmx-3.8.5+dfsg1/source/expao.c:379:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str);
data/openmx-3.8.5+dfsg1/source/expao.c:685:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(ret[i]);
data/openmx-3.8.5+dfsg1/source/expao.c:731:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/source/expao.c:781:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/source/exx.c:164:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(self->path_cachedir, cachedir, EXX_PATHLEN);
data/openmx-3.8.5+dfsg1/source/exx_log.c:38:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (env && strlen(env)) {
data/openmx-3.8.5+dfsg1/source/exx_log.c:39:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, env, length);
data/openmx-3.8.5+dfsg1/source/exx_log.c:44:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(name, "host-name-unknown", length);
data/openmx-3.8.5+dfsg1/source/intensity_map.c:122:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (( q=fgetc(fp1))=='\n') po = 1;
data/openmx-3.8.5+dfsg1/source/liberi-091216/test/selfcheck/demo_sub.c:134:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      if (EOF != n) strncpy(pao_name, buffer, 256);
data/openmx-3.8.5+dfsg1/source/md2axsf.c:172:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  0], "E");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:173:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  1], "H");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:177:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  5], "B");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:178:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  6], "C");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:179:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  7], "N");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:180:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  8], "O");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:181:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[  9], "F");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:187:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 15], "P");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:188:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 16], "S");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:191:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 19], "K");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:195:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 23], "V");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:211:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 39], "Y");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:225:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 53], "I");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:246:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 74], "W");
data/openmx-3.8.5+dfsg1/source/md2axsf.c:264:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(Atom_Symbol[ 92], "U");
data/openmx-3.8.5+dfsg1/source/mpao.c:547:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(str);
data/openmx-3.8.5+dfsg1/source/mpao.c:853:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(ret[i]);
data/openmx-3.8.5+dfsg1/source/mpao.c:899:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/source/mpao.c:949:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c=c+strlen(buf);
data/openmx-3.8.5+dfsg1/source/openmx_common.c:429:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = strlen(str1);
data/openmx-3.8.5+dfsg1/source/openmx_common.c:430:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = strlen(str2);

ANALYSIS SUMMARY:

Hits = 2594
Lines analyzed = 336474 in approximately 12.47 seconds (26987 lines/second)
Physical Source Lines of Code (SLOC) = 233405
Hits@level = [0] 8798 [1] 113 [2] 1840 [3]   1 [4] 640 [5]   0
Hits@level+ = [0+] 11392 [1+] 2594 [2+] 2481 [3+] 641 [4+] 640 [5+]   0
Hits/KSLOC@level+ = [0+] 48.8079 [1+] 11.1137 [2+] 10.6296 [3+] 2.7463 [4+] 2.74201 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.