Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/opensta-0~20191111gitc018cb2+dfsg/app/Main.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/ArcDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/ArnoldiDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/ArnoldiReduce.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DcalcAnalysisPt.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DmpCeff.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/DmpDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/GraphDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/GraphDelayCalc1.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/LumpedCapDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/NetCaps.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/RCDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/SimpleRCDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/dcalc/UnitDelayCalc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/Delay.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/DelayFloat.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/DelayNormal1.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/DelayNormal2.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/Graph.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/graph/GraphCmp.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/EquivCells.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/InternalPower.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LeakagePower.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Liberty.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyBuilder.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExt.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyParser.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyReader.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/LinearModel.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Sequential.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/TableModel.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/TimingArc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/TimingRole.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Transition.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Units.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/liberty/Wireload.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteNetwork.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/HpinDrvrLoad.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/NetworkCmp.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/PortDirection.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/ConcreteParasitics.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/EstimateParasitics.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/NullParasitics.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/Parasitics.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/ReduceParasitics.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefNamespace.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/Clock.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockGatingCheck.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockGroups.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockInsertion.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ClockLatency.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/CycleAccting.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/DataCheck.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/DeratingFactors.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/DisabledPorts.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/PinPair.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/PortDelay.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/PortExtCap.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/RiseFallMinMax.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/RiseFallValues.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/Sdc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/SdcCmdComment.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdf/ReportAnnotation.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Bfs.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckMaxSkews.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckMinPeriods.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckMinPulseWidths.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckSlewLimits.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/CheckTiming.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/ClkSkew.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Corner.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Crpr.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/FindRegister.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/GatedClk.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Genclks.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Levelize.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Path.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathAnalysisPt.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnd.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnumed.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathExpanded.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathGroup.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathRef.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertex.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertexRep.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Power.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Property.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/SearchPred.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Sim.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Sta.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/StaState.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/Tag.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/TagGroup.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/VertexVisitor.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/VisitPathEnds.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/VisitPathGroupVertices.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/WorstSlack.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/WritePathSpice.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Condition.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Debug.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/DispatchQueue.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Error.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Fuzzy.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Hash.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/MinMax.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Mutex.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/PatternMatch.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Pthread.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ReadWriteLock.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ReportStd.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ReportTcl.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Stats.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/StringSeq.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/StringSet.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/Thread.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ThreadException.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ThreadPool.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/ThreadWorker.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/util/TokenParser.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc
Examining data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogWriter.cc

FINAL RESULTS:

data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:207:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ptr, left);
data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc:166:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(token_, prev_token);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:163:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path_ptr, inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:274:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path_ptr, inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:277:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path_ptr, port_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:362:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path_ptr, inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:365:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path_ptr, net_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1492:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tail, d + 1);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1525:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(last, d + 1);
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:427:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(result, str.c_str());
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1285:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(result, str.c_str());
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1394:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(result, str.c_str());
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1748:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(result, str.c_str());
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:735:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(sdf_name, "%s%c%s", inst_path, sdf_divider_, port_name);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:759:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path_ptr, inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc:142:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(result, str.c_str());
data/opensta-0~20191111gitc018cb2+dfsg/search/Tag.cc:173:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(result, str.c_str());
data/opensta-0~20191111gitc018cb2+dfsg/search/WritePathSpice.cc:59:34:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    ...) __attribute__((format (printf, 2, 3)));
data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:60:34:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    ...) __attribute__((format (printf, 2, 3)));
data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:64:34:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    ...) __attribute__((format (printf, 2, 3)));
data/opensta-0~20191111gitc018cb2+dfsg/util/Debug.cc:97:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(what_cpy, what);
data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:34:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int length = vsnprintf(str, size, fmt, args);
data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:41:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    length = vsnprintf(buffer, size, fmt, args_copy2);
data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc:43:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(copy, str);
data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc:115:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(result, tmp);
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:103:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      return atoi(thread_arg);
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:242:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char code[4] = {s[0], s[1], s[2], '\0'};
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:243:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      char ch = atoi(code);
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:329:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *histin = fopen(".history_sta", "r");
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:350:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *histout = fopen(".history_sta", "w");
data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyParser.cc:61:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  LibertyLex_in = fopen(filename, "r");
data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyParser.cc:515:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *stream = fopen(filename, "r" );
data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc:365:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char bus_brkts_left[2]{bus_brkt_left, '\0'};
data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc:366:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char bus_brkts_right[2]{bus_brkt_right, '\0'};
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:56:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char brkts_left[2] = {brkt_left, '\0'};
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:57:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char brkts_right[2] = {brkt_right, '\0'};
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:88:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	index = atoi(left + 1);
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:104:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char brkts_left[2] = {brkt_left, '\0'};
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:105:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char brkts_right[2] = {brkt_right, '\0'};
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:142:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  from = atoi(left + 1);
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:143:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  to = atoi(range + 1);
data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:302:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int i = atoi(index + 1);
data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:312:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int index = atoi(name + 1);
data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:540:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      int id = atoi(id_str);
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:343:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  stream_ = fopen(filename, "w");
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:83:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		      const char *sdf_check,
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:162:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(delay_format_, "%%.%df", digits);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:595:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			  const char *sdf_check,
data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:304:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  case LatchEnableState::open: {
data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:465:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  state = LatchEnableState::open;
data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:477:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  state = LatchEnableState::open;
data/opensta-0~20191111gitc018cb2+dfsg/search/Latches.cc:491:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    state = LatchEnableState::open;
data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertex.cc:284:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_arrivals, arrivals, arrival_count * sizeof(Arrival));
data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:97:64:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	|| sta_->latches()->latchDtoQState(edge) == LatchEnableState::open);
data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:190:64:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	|| sta_->latches()->latchDtoQState(edge) == LatchEnableState::open)
data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:2659:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_tag_groups, tag_groups_,
data/opensta-0~20191111gitc018cb2+dfsg/search/Search.cc:2888:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_tags, tags_, tag_capacity_ * sizeof(Tag*));
data/opensta-0~20191111gitc018cb2+dfsg/search/WritePathSpice.cc:316:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  spice_stream_.open(spice_filename_);
data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:216:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  spice_stream_.open(spice_filename_);
data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:155:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *status = fopen(proc_filename.c_str(), "r");
data/opensta-0~20191111gitc018cb2+dfsg/util/Machine.cc:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[line_length];
data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc:238:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  log_stream_ = fopen(filename, "w");
data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc:254:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  redirect_stream_ = fopen(filename, "w");
data/opensta-0~20191111gitc018cb2+dfsg/util/Report.cc:262:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  redirect_stream_ = fopen(filename, "a");
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:546:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char **net_names = new const char *[port_count];
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1432:17:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  size_t size = atol(tmp);
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value_digit_str[2];
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogWriter.cc:70:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *stream = fopen(filename, "w");
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:234:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length += strlen(init);
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:240:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t init_length = strlen(init);
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:315:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(text);
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:333:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ssize_t read;
data/opensta-0~20191111gitc018cb2+dfsg/app/StaMain.cc:335:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      line[strlen(line)-1] = 0;
data/opensta-0~20191111gitc018cb2+dfsg/dcalc/GraphDelayCalc1.cc:1657:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (!ClockSet::equal(clks, clks1)) {
data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:202:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t left_length = strlen(left);
data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:231:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(left) + 1 + strlen(right) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/liberty/FuncExpr.cc:231:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(left) + 1 + strlen(right) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc:130:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(func_);
data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyExpr.cc:140:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, func_, count);
data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyReader.cc:696:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  unsigned unit_str_length = strlen(unit_str);
data/opensta-0~20191111gitc018cb2+dfsg/liberty/LibertyReader.cc:829:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	&& strlen(bus_style) == 6
data/opensta-0~20191111gitc018cb2+dfsg/liberty/Units.cc:82:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return digits_ + (suffix_ ? strlen(suffix_) : 0) + 2;
data/opensta-0~20191111gitc018cb2+dfsg/network/ConcreteLibrary.cc:272:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bool bus_pattern = (pattern1[strlen(pattern1) - 1] == bus_brkt_right);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:154:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_length += strlen(name(inst)) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:164:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_ptr += strlen(inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:268:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t inst_name_length = strlen(inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:270:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t port_name_length = strlen(port_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:356:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t inst_name_length = strlen(inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:358:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t net_name_length = strlen(net_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:617:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      context_name_length = strlen(pathName(context)) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1487:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(first, path_name, d - path_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1490:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tail = new char[strlen(d)];
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1520:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(head, path_name, d - path_name);
data/opensta-0~20191111gitc018cb2+dfsg/network/Network.cc:1523:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    last = new char[strlen(d)];
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:34:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:71:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:85:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(bus_name, name, bus_name_len);
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:120:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/opensta-0~20191111gitc018cb2+dfsg/network/ParseBus.cc:138:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy(bus_name, name, bus_name_len);
data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:556:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *sdc_name = makeTmpString(strlen(sta_name) + 1);
data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:591:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  && bus_name[strlen(bus_name) - 1] == ']') {
data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:620:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  && bus_name[strlen(bus_name) - 1] == ']') {
data/opensta-0~20191111gitc018cb2+dfsg/network/SdcNetwork.cc:812:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  && bus_name[strlen(bus_name) - 1] == ']') {
data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc:68:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(new_str, str, length);
data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc:84:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t verilog_name_length = strlen(sta_name) + 3;
data/opensta-0~20191111gitc018cb2+dfsg/network/VerilogNamespace.cc:130:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t sta_name_length = strlen(verilog_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefNamespace.cc:28:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *trans_token = new char[strlen(token) + 1];
data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefNamespace.cc:69:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *trans_token = new char[strlen(token) + 1];
data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:207:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = static_cast<int>(strlen(buf));
data/opensta-0~20191111gitc018cb2+dfsg/parasitics/SpefReader.cc:219:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = strlen(buf);
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:220:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(type) + strlen(from_thru_to) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:220:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(type) + strlen(from_thru_to) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:333:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		|| from_->equal(from2))))
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:348:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	      || thru->equal(thru))))
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:362:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		|| to_->equal(to2))))
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1072:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
ExceptionFromTo::equal(ExceptionFromTo *from_to) const
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1074:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return PinSet::equal(from_to->pins_, pins_)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1075:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    && ClockSet::equal(from_to->clks_, clks_)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1076:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    && InstanceSet::equal(from_to->insts_, insts_)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1964:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
ExceptionThru::equal(ExceptionThru *thru) const
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1967:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return PinSet::equal(thru->pins_, pins_)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1968:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    && NetSet::equal(thru->nets_, nets_)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/ExceptionPath.cc:1969:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    && InstanceSet::equal(thru->insts_, insts_)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:153:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return drive1->equal(drive2)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:154:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    && drive1->equal(drive3)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:155:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    && drive1->equal(drive4);
data/opensta-0~20191111gitc018cb2+dfsg/sdc/InputDrive.cc:214:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
InputDriveCell::equal(InputDriveCell *drive) const
data/opensta-0~20191111gitc018cb2+dfsg/sdc/RiseFallMinMax.cc:207:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
RiseFallMinMax::equal(const RiseFallMinMax *values) const
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:319:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  instance_name_length_(strlen(sdc_network_->pathName(instance))),
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:370:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    time_str[strlen(time_str) - 1] = '\0';
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:640:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (early_values->equal(late_values))
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:685:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (src_rise->equal(src_fall)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1697:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	  && drive_rise_min->equal(drive_rise_max)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1698:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	  && drive_rise_min->equal(drive_fall_min)
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1699:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	  && drive_rise_min->equal(drive_fall_max))
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1705:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	    && drive_rise_min->equal(drive_rise_max))
data/opensta-0~20191111gitc018cb2+dfsg/sdc/WriteSdc.cc:1717:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	    && drive_fall_min->equal(drive_fall_max))
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:97:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return reader.read();
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:120:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return reader.read();
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:164:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
SdfReader::read()
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:861:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *p = &cond_port[strlen(cond_port) - 1];
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:951:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *unescaped = makeTmpString(strlen(token) + 1);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:1005:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = strlen(buf);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfReader.cc:1017:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = strlen(buf);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:203:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    time_str[strlen(time_str) - 1] = '\0';
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:734:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *sdf_name = makeTmpString(strlen(inst_path)+1+strlen(port_name)+1);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:734:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *sdf_name = makeTmpString(strlen(inst_path)+1+strlen(port_name)+1);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:750:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_length += strlen(sdfName(inst)) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:760:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path_ptr += strlen(inst_name);
data/opensta-0~20191111gitc018cb2+dfsg/sdf/SdfWriter.cc:774:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *sdf_name = makeTmpString(strlen(name) * 2 + 1);
data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc:215:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	|| (PathVertexRep::equal(clk_info1->crprClkPath(),
data/opensta-0~20191111gitc018cb2+dfsg/search/ClkInfo.cc:220:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	    && MinMaxValues<float>::equal(uncertainties1,
data/opensta-0~20191111gitc018cb2+dfsg/search/Path.cc:246:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
Path::equal(const Path *path1,
data/opensta-0~20191111gitc018cb2+dfsg/search/Path.cc:347:5:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	&& equal(&p1, path1, sta))
data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc:217:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		  Path::equal(&p, after_div, this) ? " <-diversion" : "");
data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc:552:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (Path::equal(&p, after_div, this))
data/opensta-0~20191111gitc018cb2+dfsg/search/PathEnum.cc:558:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (Path::equal(&p, before_div, this)) {
data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertex.cc:301:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
PathVertex::equal(const PathVertex *path1,
data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertexRep.cc:162:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
PathVertexRep::equal(const PathVertexRep *path1,
data/opensta-0~20191111gitc018cb2+dfsg/search/PathVertexRep.cc:170:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
PathVertexRep::equal(const PathVertexRep &path1,
data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1633:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  reportDashLine(strlen("transition_time") + field_slew_->width() + 1,
data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1792:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int line_len = strlen(key) + 2 + strlen(pt) + 2 + reason.size() + 1;
data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1792:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int line_len = strlen(key) + 2 + strlen(pt) + 2 + reason.size() + 1;
data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:1800:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (unsigned i = 0; i < strlen(key); i++)
data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:3102:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int length = strlen(what);
data/opensta-0~20191111gitc018cb2+dfsg/search/ReportPath.cc:3217:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (int i = strlen(value); i < field->width(); i++)
data/opensta-0~20191111gitc018cb2+dfsg/search/WriteSpice.cc:659:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return stringPrintTmp(strlen(net_name_) + 10, "%s/%d",
data/opensta-0~20191111gitc018cb2+dfsg/util/Debug.cc:96:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *what_cpy = new char[strlen(what) + 1];
data/opensta-0~20191111gitc018cb2+dfsg/util/Hash.cc:27:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(str);
data/opensta-0~20191111gitc018cb2+dfsg/util/StringUtil.cc:42:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *copy = new char[strlen(str) + 1];
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:61:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return verilog_reader->read(filename);
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:153:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  constant10_max_length_ = strlen(constant10_max_);
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:177:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
VerilogReader::read(const char *filename)
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:239:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = strlen(buf);
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:251:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result = strlen(buf);
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:492:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    net_bus_names_ += strlen(name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:508:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    net_scalar_names_ += strlen(name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:518:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    net_bus_names_ += strlen(name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:578:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      inst_names_ += strlen(inst_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:587:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      inst_module_names_ += strlen(module_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:588:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      inst_names_ += strlen(inst_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:628:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      net_scalar_names_ += strlen(net_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:629:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    port_names_ += strlen(port_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:642:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    net_scalar_names_ += strlen(net_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:643:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    port_names_ += strlen(port_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:655:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    port_names_ += strlen(port_name) + 1;
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1421:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t constant_length = strlen(constant);
data/opensta-0~20191111gitc018cb2+dfsg/verilog/VerilogReader.cc:1510:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(tmp);

ANALYSIS SUMMARY:

Hits = 188
Lines analyzed = 91589 in approximately 1.62 seconds (56611 lines/second)
Physical Source Lines of Code (SLOC) = 78166
Hits@level = [0] 304 [1] 120 [2]  43 [3]   0 [4]  25 [5]   0
Hits@level+ = [0+] 492 [1+] 188 [2+]  68 [3+]  25 [4+]  25 [5+]   0
Hits/KSLOC@level+ = [0+] 6.2943 [1+] 2.40514 [2+] 0.869943 [3+] 0.319832 [4+] 0.319832 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.