Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureServer.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureServer.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CedarPch.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CedarPch.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CedarType.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Database.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Database.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EMInner.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Link.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Link.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Listener.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Listener.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NMInner.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NullLan.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NullLan.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_SSTP.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_SSTP.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_Win7.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_Win7.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_Win7Inner.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Remote.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Remote.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SecureInfo.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SecureInfo.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SecureNAT.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SecureNAT.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UT.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UT.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UdpAccel.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UdpAccel.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VG.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VG.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLan.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLan.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WaterMark.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WaterMark.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinJumpList.cpp
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/netcfgn.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/netcfgx.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/GlobalConst.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/MayaType.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Memory.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Memory.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/OS.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/OS.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Object.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Object.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tick64.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tick64.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TunTap.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/cryptoki.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/pkcs11.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/pkcs11f.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/pkcs11t.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/hamcorebuilder/hamcorebuilder.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnbridge/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnbridge/vpnbridge.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnclient/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnclient/vpncsvc.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnclient/vpncsvc.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmd/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmd/vpncmd.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmgr/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmgr/vpncmgr.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpndrvinst/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpndrvinst/vpndrvinst.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpndrvinst/vpndrvinst.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnserver/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnserver/vpnserver.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnsetup/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnsetup/vpnsetup.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnsmgr/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnsmgr/vpnsmgr.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/vpntest.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/vpntest.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.cpp
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/dlldata.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/resource.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/stdafx.cpp
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/stdafx.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnweb.cpp
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h
Examining data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg_inner.h

FINAL RESULTS:

data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:793:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	(void)chmod(name, mode);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c:241:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:336:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(inc_filename, sizeof(inc_filename), src_str + i + StrLen(start_tag) + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:352:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(full_inc_filename, sizeof(full_inc_filename), dirname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:353:8:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
							StrCat(full_inc_filename, sizeof(full_inc_filename), "/");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:354:8:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
							StrCat(full_inc_filename, sizeof(full_inc_filename), inc_filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:365:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(full_inc_filename, sizeof(full_inc_filename), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:420:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(url, sizeof(url), url_src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:453:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(url2, sizeof(url2), url);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:454:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(url2, sizeof(url2), "/");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:508:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(relative_path, sizeof(relative_path), url + vroot_len);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:514:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp3, sizeof(tmp3), relative_path + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:515:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(relative_path, sizeof(relative_path), tmp3);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:530:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp2, sizeof(tmp2), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:553:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ret_filename, ret_filename_size, filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:661:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(url2, url2_size, url);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:664:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(url2, url2_size, "?");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:665:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(url2, url2_size, query_string);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:719:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(url, sizeof(url), url_target);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:724:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(query_string, sizeof(query_string), url + i + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:760:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(url, sizeof(url), url_target);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:765:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(query_string, sizeof(query_string), url + i + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:907:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(username, username_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:911:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(username, username_size, vpnadmin_hubname->Data);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:914:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(password, password_size, vpnadmin_password->Data);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:937:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(username, username_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:938:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(password, password_size, b64_dest + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1027:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(hub_name, sizeof(hub_name), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1049:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(a->dummy1, sizeof(a->dummy1), hub_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1070:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(admin_mode, sizeof(admin_mode),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1225:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(url, sizeof(url), url_target);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1230:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(query_string, sizeof(query_string), url + i + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1242:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(method_name, sizeof(method_name), url + 5);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1473:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ip, sizeof(ip), "Unknown");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1654:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ip, sizeof(ip), "Unknown");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2272:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tag_before_hostname, sizeof(tag_before_hostname),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2306:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(protocol, sizeof(protocol), "udp");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2324:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(protocol, sizeof(protocol), "tcp");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2343:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(protocol, sizeof(protocol), "udp");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2352:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(my_hostname, sizeof(my_hostname), "_");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2506:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(id, sizeof(id), t->Id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2532:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(id, sizeof(id), t->Id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2605:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2652:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2928:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.FilePath, sizeof(t.FilePath), filepath);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2930:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ServerName, sizeof(t.ServerName), server_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2996:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(logfilename, sizeof(logfilename), t->FilePath);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2997:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(servername, sizeof(servername), t->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3052:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(tt.ServerName, sizeof(tt.ServerName), servername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3053:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(tt.FilePath, sizeof(tt.FilePath), logfilename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3086:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->FilePath, sizeof(t->FilePath), logfilename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3087:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->ServerName, sizeof(t->ServerName), servername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3159:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(e->ServerName, sizeof(e->ServerName), f->hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3201:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(f->Path, sizeof(f->Path), e->FilePath);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3202:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(f->ServerName, sizeof(f->ServerName), e->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3228:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3232:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3291:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3351:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3421:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3426:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3481:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3549:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3610:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3614:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3673:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3676:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->Name, sizeof(t->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3698:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Name, sizeof(e->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3824:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3829:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->Name, sizeof(t->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3851:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Name, sizeof(e->Name), sw->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3852:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->HubName, sizeof(e->HubName), f->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4067:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Name, sizeof(e->Name), sw->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4268:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4340:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Name, sizeof(a->Name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4392:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4404:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(e->Name, sizeof(e->Name), a->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4437:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(a->Name, sizeof(a->Name), admin_options[i].Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4464:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->FileName, sizeof(t->FileName), s->CfgRw->FileName + (s->CfgRw->FileName[0] == '@' ? 1 : 0));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4578:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->DeviceName, sizeof(e->DeviceName), o->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4580:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), e->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4587:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4593:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp, sizeof(tmp), e->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4709:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(e->DeviceName, sizeof(e->DeviceName), br->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4710:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(e->HubName, sizeof(e->HubName), br->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4757:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->Hostname, sizeof(t->Hostname), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4762:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->Hostname, sizeof(t->Hostname), "Secret");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4792:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(keep->ServerName, sizeof(keep->ServerName), t->KeepConnectHost);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4825:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->KeepConnectHost, sizeof(t->KeepConnectHost), k->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4928:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4941:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(e->SessionName, sizeof(e->SessionName), table->Session->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4971:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4974:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5102:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5115:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(e->SessionName, sizeof(e->SessionName), mac->Session->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5146:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5199:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5200:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5294:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5295:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5323:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5324:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->Name, sizeof(t->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5348:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(tmp.HubName, sizeof(tmp.HubName), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5349:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(tmp.Name, sizeof(tmp.Name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5383:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->Username, sizeof(t->Username), s->Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5384:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->RealUsername, sizeof(t->RealUsername), s->UserNameReal);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5385:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->GroupName, sizeof(t->GroupName), s->GroupName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5398:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->ClientHostName, sizeof(t->ClientHostName), s->Connection->ClientHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5426:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5430:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5532:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5560:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5572:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Name, sizeof(e->Name), g->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5694:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5720:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5724:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->Name, sizeof(t->Name), g->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5922:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5925:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5942:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Name, sizeof(e->Name), u->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5943:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->GroupName, sizeof(e->GroupName), u->GroupName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6040:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6041:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6057:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6058:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->Name, sizeof(t->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6082:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->GroupName, sizeof(t->GroupName), u->GroupName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6408:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6411:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6476:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				(t->Id >= MAX_ACCESSLISTS && HashPtrToUINT(access) == t->Id))
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6478:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				Free(access);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6479:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				Delete(h->AccessList, access);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6597:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				Free(access);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6895:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6989:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7079:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7163:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7167:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7258:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7261:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7276:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Hostname, sizeof(e->Hostname), k->Option->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7277:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->HubName, sizeof(e->HubName), k->Option->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7367:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7370:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7477:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(k->Option->DeviceName, sizeof(k->Option->DeviceName), LINK_DEVICE_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7682:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7688:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7739:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7744:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7759:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7937:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->HubName, sizeof(t->HubName), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8128:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8215:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8283:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8298:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8454:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(push_routes_str_old, sizeof(push_routes_str_old), h->SecureNATOption->DhcpPushRoutes);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8458:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(h->SecureNATOption->DhcpPushRoutes, sizeof(h->SecureNATOption->DhcpPushRoutes), push_routes_str_old);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8496:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), t->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8524:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->HubName, sizeof(t->HubName), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8613:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, sizeof(name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8630:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->Name, sizeof(t->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8640:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->Hostname, sizeof(t->Hostname), s->RemoteHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8643:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->Name, sizeof(t->Name), connection->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8647:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->ServerStr, sizeof(t->ServerStr), connection->ServerStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8648:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->ClientStr, sizeof(t->ClientStr), connection->ClientStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8733:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(e->Hostname, sizeof(e->Hostname), s->RemoteHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8736:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Name, sizeof(e->Name), connection->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8929:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->HubName, sizeof(e->HubName), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9062:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->HubName, sizeof(t->HubName), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9412:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t->String, size, ciphers->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9420:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(t->String, size, ";");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9421:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(t->String, size, ciphers->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9594:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Hostname, sizeof(e->Hostname), f->hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9647:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(h->HubName, sizeof(h->HubName), hh->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9692:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->Hostname, sizeof(t->Hostname), f->hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9730:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->ControllerName, sizeof(t->ControllerName), s->ControllerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10276:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->ServerVersionString, sizeof(t->ServerVersionString), c->VerString);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10277:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->ServerBuildInfoString, sizeof(t->ServerBuildInfoString), c->BuildInfo);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10292:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->ServerFamilyName, sizeof(t->ServerFamilyName), UPDATE_FAMILY_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10822:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(f->Path, sizeof(f->Path), e->FilePath);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10823:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(f->ServerName, sizeof(f->ServerName), e->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10835:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(f->Path, sizeof(f->Path), e->FilePath);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10836:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(f->ServerName, sizeof(f->ServerName), e->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10855:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->FilePath, sizeof(e->FilePath), f->Path);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:10856:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->ServerName, sizeof(e->ServerName), f->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11757:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->FilePath, sizeof(e->FilePath), f->Path);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11758:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->ServerName, sizeof(e->ServerName), f->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11806:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Name, sizeof(e->Name), s->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11807:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Username, sizeof(e->Username), s->Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11810:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(e->Hostname, sizeof(e->Hostname), s->Connection->ClientHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:15072:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hubname, sizeof(hubname), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:15417:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(rpc->VpnServerHubName, sizeof(rpc->VpnServerHubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:15418:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(rpc->VpnServerClientName, sizeof(rpc->VpnServerClientName), client_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.c:278:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(ac->ConnectingAzureIp, sizeof(ac->ConnectingAzureIp), st.CurrentAzureIp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:46:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), t->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:70:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), a->Adapters[i]->Title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:224:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(br->HubName, sizeof(br->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:225:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(br->DeviceName, sizeof(br->DeviceName), devicename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:343:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), b->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:417:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(b->Name, sizeof(b->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:107:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:122:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp, sizeof(tmp), line + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:127:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:298:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(name, sizeof(name), ifr.ifr_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:301:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:521:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:546:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:666:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ifr.lifr_name, sizeof(ifr.lifr_name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:668:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:747:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ifr.lifr_name, sizeof(ifr.lifr_name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:750:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1064:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst_devname, dst_devname_size, device_path);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1065:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst_devname + device_pathlen, dst_devname_size - device_pathlen, src_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1277:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ifr.ifr_name, IFNAMSIZ, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:365:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(e->DriverType, sizeof(e->DriverType), driver_type);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:539:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(e->DeviceName, sizeof(e->DeviceName), a->Title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:540:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(e->Guid, sizeof(e->Guid), a->Guid);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:541:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(e->DeviceInstanceId, sizeof(e->DeviceInstanceId), device_instance_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:542:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(e->DriverName, sizeof(e->DriverName), sysname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:618:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(key, key_size, keyname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1170:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(dst, dst_size, nicname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1182:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, name_size, str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1192:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(id_str, sizeof(id_str), str + len - 16);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1201:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(num, sizeof(num), id_str + 5);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1230:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), guid);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1459:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Name, sizeof(a->Name), t->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1460:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Guid, sizeof(a->Guid), t->Guid);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1461:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Title, sizeof(a->Title), t->Info.FriendlyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1535:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp, sizeof(tmp), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1548:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1554:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(a->Name, sizeof(a->Name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1564:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Title, sizeof(a->Title), &buf[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1602:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Guid, sizeof(a->Guid), a->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1668:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), a->Title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1674:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(tmp, sizeof(tmp), a->Title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1697:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Title, sizeof(a->Title), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:2111:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(guid, sizeof(guid), t->Guid);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:75:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, name_size, s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:81:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp, sizeof(tmp), s + i + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:85:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(name, name_size, host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:122:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(o->ProxyName, sizeof(setting->ProxyHostName), setting->ProxyHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:157:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:164:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:171:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:185:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1784:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->Host, sizeof(t->Host), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2890:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2975:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3554:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p.Username, sizeof(p.Username), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3555:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p.HubName, sizeof(p.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3889:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.Password, sizeof(p.Password), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:5481:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c.DeviceName, sizeof(c.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6237:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t->ClientOption->ProxyName, sizeof(t->ClientOption->ProxyName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6240:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t->ClientOption->ProxyUsername, sizeof(t->ClientOption->ProxyUsername),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6242:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t->ClientOption->ProxyPassword, sizeof(t->ClientOption->ProxyPassword),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6251:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t->ClientOption->DeviceName, sizeof(t->ClientOption->DeviceName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6812:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->ClientOption->DeviceName, sizeof(a->ClientOption->DeviceName), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6844:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->ClientAuth->PlainPassword, sizeof(a->ClientAuth->PlainPassword), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7207:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->old_server_name, sizeof(a->old_server_name), a->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7436:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(tmp, sizeof(tmp), "/tcp");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7673:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(a->ClientAuth->SecurePublicCertName, sizeof(a->ClientAuth->SecurePublicCertName), cert);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7674:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(a->ClientAuth->SecurePrivateKeyName, sizeof(a->ClientAuth->SecurePrivateKeyName), priv);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7959:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(http_header, sizeof(str), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7969:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->CustomHttpHeader, sizeof(a->CustomHttpHeader), http_header);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8778:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(a->old_server_name, sizeof(a->old_server_name), server_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8879:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), a->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8910:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(tt.HubName, sizeof(tt.HubName), a->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10414:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, str + StrLen(VLAN_ADAPTER_NAME) + 3);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10426:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, str + StrLen(VLAN_ADAPTER_NAME_OLD) + 3);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10675:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(ip_str, sizeof(ip_str), t->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10707:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp3, sizeof(tmp3), t->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:186:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(v->Title, sizeof(v->Title), GetOsInfo()->OsProductName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:216:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(dt, sizeof(dt), ": ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:250:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->FileName, sizeof(t->FileName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:137:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), product_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:292:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(s.DeviceName, sizeof(s.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:335:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(s.DeviceName, sizeof(s.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:2798:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:2822:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, "VPN");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:3147:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t->HubName, sizeof(t->HubName), a.ClientOption->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5284:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(k->ServerName, sizeof(k->ServerName), c->Config.KeepConnectHost);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5709:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ret->ClientId, sizeof(ret->ClientId), t.ClientId);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5742:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(st->ServerProductName, sizeof(st->ServerProductName), s->Connection->ServerStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5790:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(st->CipherName, sizeof(st->CipherName), s->Connection->CipherName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5797:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(st->UnderlayProtocol, sizeof(st->UnderlayProtocol), s->UnderlayProtocol);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5799:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(st->ProtocolDetails, sizeof(st->ProtocolDetails), s->ProtocolDetails);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5805:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(tmp, sizeof(tmp), s->IpcSessionShared->ProtocolDetails);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5807:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(st->ProtocolDetails, sizeof(st->ProtocolDetails), " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5808:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(st->ProtocolDetails, sizeof(st->ProtocolDetails), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5838:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(st->SessionName, sizeof(st->SessionName), s->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5840:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(st->ConnectionName, sizeof(st->ConnectionName), s->Connection->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5842:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(st->ServerName, sizeof(st->ServerName), s->Connection->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6011:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dlg.ServerName, sizeof(dlg.ServerName), a->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6271:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.DeviceName, sizeof(t.DeviceName), "VPN");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6315:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.Name, sizeof(t.Name), r->ClientOption->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6475:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), a->ClientOption->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6726:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(k->ServerName, sizeof(k->ServerName), c->Config.KeepConnectHost);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6976:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->UserName, sizeof(item->UserName), a->ClientAuth->Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6979:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->ServerName, sizeof(item->ServerName), a->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6985:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->DeviceName, sizeof(item->DeviceName), a->ClientOption->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6990:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(item->ProxyName, sizeof(item->ProxyName), a->ClientOption->ProxyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7006:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->HubName, sizeof(item->HubName), a->ClientOption->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7332:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), vlan->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7462:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), vlan->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7585:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), d->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7763:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->DeviceName, sizeof(item->DeviceName), v->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7764:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->Version, sizeof(item->Version), c->Cedar->VerString);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7794:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->DeviceName, sizeof(item->DeviceName), t->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7803:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->MacAddress, sizeof(item->MacAddress), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7812:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(item->Version, sizeof(item->Version), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7856:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), set->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7936:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(get->MacAddress, sizeof(get->MacAddress), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7945:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(get->Version, sizeof(get->Version), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7954:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(get->FileName, sizeof(get->FileName), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7963:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(get->Guid, sizeof(get->Guid), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8140:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), create->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8155:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(r->Name, sizeof(r->Name), create->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8297:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(a->ClientOption->DeviceName, sizeof(a->ClientOption->DeviceName), create->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8420:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(item->DeviceName, sizeof(item->DeviceName), s->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8421:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(item->Manufacturer, sizeof(item->Manufacturer), s->Manufacturer);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8799:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(path, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8876:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(a->ClientOption->DeviceName, sizeof(a->ClientOption->DeviceName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8980:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(device_name, sizeof(device_name), t->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8995:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(device_name, sizeof(device_name), v->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9013:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(a->ClientOption->DeviceName, sizeof(a->ClientOption->DeviceName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9058:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(c->Config.KeepConnectHost, sizeof(c->Config.KeepConnectHost), CLIENT_DEFAULT_KEEPALIVE_HOST);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9244:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->PlainPassword, sizeof(a->PlainPassword), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9298:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(o->ProxyPassword, sizeof(o->ProxyPassword), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9534:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(v->Name, sizeof(v->Name), f->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9621:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ProxyPassword, sizeof(t.ProxyPassword), pw_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9666:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(uv->Name, sizeof(uv->Name), CLIENT_MACOS_TAP_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10290:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ver->ClientProductName, sizeof(ver->ClientProductName), CEDAR_CLIENT_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10291:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ver->ClientVersionString, sizeof(ver->ClientVersionString), c->Cedar->VerString);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10292:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ver->ClientBuildInfoString, sizeof(ver->ClientBuildInfoString), c->Cedar->BuildInfo);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:686:4:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execvp(exe, args);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:803:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(prompt, sizeof(prompt), "VPN Tools>");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2019:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(target_host, sizeof(target_host), ttc->Host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2209:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ttc->Host, sizeof(ttc->Host), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2969:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(prompt, sizeof(prompt), "VPN Client>");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3071:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Password, sizeof(t.Password), GetParamStr(o, "[password]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3544:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3587:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3630:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3673:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3758:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3802:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3845:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4007:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(ip_str, sizeof(ip_str), e->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4086:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4087:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4093:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientOption->DeviceName, sizeof(t.ClientOption->DeviceName), GetParamStr(o, "NICNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4097:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4161:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4162:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4440:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4575:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientAuth->PlainPassword, sizeof(t.ClientAuth->PlainPassword),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5040:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(t.ClientOption->CustomHttpHeader, sizeof(s), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5129:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(z.ClientOption->CustomHttpHeader, sizeof(z.ClientOption->CustomHttpHeader), tokens->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5130:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(z.ClientOption->CustomHttpHeader, 1, "\r\n");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5304:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5306:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5307:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5376:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5378:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5379:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5448:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5450:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5451:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6214:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ClientOption->DeviceName, sizeof(t.ClientOption->DeviceName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6393:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ClientAuth->SecurePublicCertName, sizeof(t.ClientAuth->SecurePublicCertName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6395:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ClientAuth->SecurePrivateKeyName, sizeof(t.ClientAuth->SecurePrivateKeyName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6657:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), GetParamStr(o, "SAVEPATH"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7045:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.KeepConnectHost, sizeof(t.KeepConnectHost), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7176:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(pass, sizeof(pass), password);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7208:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(pass, sizeof(pass), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7285:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->AdminHub);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7831:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ControllerName, sizeof(t.ControllerName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8782:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Hostname, sizeof(t.Hostname), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8949:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.KeepConnectHost, sizeof(t.KeepConnectHost), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9117:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9197:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9349:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "DEVICE"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9350:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[hubname]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9407:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "DEVICE"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9408:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[hubname]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9776:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9816:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9856:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9896:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9936:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10097:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10099:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "HUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10140:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10141:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "HUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10185:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10255:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10301:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10517:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10569:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10621:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10671:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10711:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10725:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10766:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10780:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10939:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11001:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11043:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11090:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11146:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11199:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11249:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11299:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11386:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11388:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.RadiusServerName, sizeof(t.RadiusServerName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11389:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.RadiusSecret, sizeof(t.RadiusSecret), GetParamStr(o, "SECRET"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11434:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11476:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11547:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11698:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11806:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11885:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12013:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12160:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12212:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12298:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12347:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12395:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12450:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12556:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12565:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12566:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12576:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12632:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12648:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12649:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12729:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12906:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12952:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12969:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13021:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13086:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13115:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientAuth->PlainPassword, sizeof(t.ClientAuth->PlainPassword),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13183:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13261:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13327:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13391:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13455:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13519:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13587:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13617:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(t.ClientOption->CustomHttpHeader, sizeof(s), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13680:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13699:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(t.ClientOption->CustomHttpHeader, sizeof(t.ClientOption->CustomHttpHeader), tokens->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13700:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(t.ClientOption->CustomHttpHeader, 1, "\r\n");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13750:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13815:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13882:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13905:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13907:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13908:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13960:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13983:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13985:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13986:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14038:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14061:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14063:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14064:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14113:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14177:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14251:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14320:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14389:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14469:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14797:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15097:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15156:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15205:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15252:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15643:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15648:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15649:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15745:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15750:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15751:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15763:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->RedirectUrl, sizeof(a->RedirectUrl), GetParamStr(o, "REDIRECTURL"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15838:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15843:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15844:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15953:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15958:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15959:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15981:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->RedirectUrl, sizeof(a->RedirectUrl), GetParamStr(o, "REDIRECTURL"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16024:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16113:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16160:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16243:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16320:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16460:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16461:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16462:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.GroupName, sizeof(t.GroupName), GetParamStr(o, "GROUP"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16533:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16534:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16546:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.GroupName, sizeof(t.GroupName), GetParamStr(o, "GROUP"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16595:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16596:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16643:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16644:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16800:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16801:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16867:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16868:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16952:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16953:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17029:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17030:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17096:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17097:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17182:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17183:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17255:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17256:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17327:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17328:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17395:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17396:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17548:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17549:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17610:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17684:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17685:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17737:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17738:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17801:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17802:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17848:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17849:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17867:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(groupname, sizeof(groupname), t.Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17890:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17960:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17961:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17976:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.GroupName, sizeof(t.GroupName), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18024:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18025:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18040:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.GroupName, sizeof(t.GroupName), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18088:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18089:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18158:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18159:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18243:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18482:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18483:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18576:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18577:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18625:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18739:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18788:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18901:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18942:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18982:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19022:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19092:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19162:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19179:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19283:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19348:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19364:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19403:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19419:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19479:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19498:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19537:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19682:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19786:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19802:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19841:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19914:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19936:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.DhcpDomainName, sizeof(t.DhcpDomainName), GetParamStr(o, "DOMAIN"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19939:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.DhcpPushRoutes, sizeof(t.DhcpPushRoutes), GetParamStr(o, "PUSHROUTE"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19942:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19990:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20076:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20145:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20182:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20224:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20293:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20330:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20372:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20446:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20593:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20642:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20759:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20844:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20936:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21026:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "ARG"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21172:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21255:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.IPsec_Secret, sizeof(t.IPsec_Secret), GetParamStr(o, "PSK"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21256:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.L2TP_DefaultHub, sizeof(t.L2TP_DefaultHub), GetParamStr(o, "DEFAULTHUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21347:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Id, sizeof(t.Id), GetParamStr(o, "[ID]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21348:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "HUB"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21349:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.UserName, sizeof(t.UserName), GetParamStr(o, "USERNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21350:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Password, sizeof(t.Password), GetParamStr(o, "PASSWORD"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21389:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Id, sizeof(t.Id), GetParamStr(o, "[ID]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21552:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "[CN]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21867:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "[hostname]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21906:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "[key]"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23795:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(o.Hostname, sizeof(o.Hostname), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:24006:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:104:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(server_name, sizeof(server_name), k->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:513:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ret->Username, sizeof(ret->Username), a->Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:528:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ret->PlainPassword, sizeof(ret->PlainPassword), a->PlainPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:539:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ret->SecurePublicCertName, sizeof(ret->SecurePublicCertName), a->SecurePublicCertName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:540:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ret->SecurePrivateKeyName, sizeof(ret->SecurePrivateKeyName), a->SecurePrivateKeyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:2600:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(b->Name, sizeof(b->Name), e->Title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:2604:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(b->ParentLocalBridge->DeviceName, sizeof(b->ParentLocalBridge->DeviceName), e->Title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:3371:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(c->ClientHostname, sizeof(c->ClientHostname), s->RemoteHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:3385:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->ServerStr, sizeof(c->ServerStr), cedar->ServerStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:3446:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(c->ClientStr, sizeof(c->ClientStr), CEDAR_CLIENT_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:3450:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(c->ClientStr, sizeof(c->ClientStr), CEDAR_SERVER_LINK_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:3455:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->ClientStr, sizeof(c->ClientStr), CEDAR_ROUTER_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:3462:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(c->ClientStr, sizeof(c->ClientStr), client_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:3466:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->ServerName, sizeof(c->ServerName), s->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:383:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:387:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp, sizeof(tmp), name + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:734:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), cmd_name + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:735:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(cmd_name, 0, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1109:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1123:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(dst, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1435:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:26:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->CurrentHostName, sizeof(st->CurrentHostName), c->CurrentHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:27:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->CurrentFqdn, sizeof(st->CurrentFqdn), c->CurrentFqdn);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:28:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->DnsSuffix, sizeof(st->DnsSuffix), c->DnsSuffix);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:29:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->CurrentIPv4, sizeof(st->CurrentIPv4), c->CurrentIPv4);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:30:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->CurrentIPv6, sizeof(st->CurrentIPv6), c->CurrentIPv6);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:32:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->CurrentAzureIp, sizeof(st->CurrentAzureIp), c->CurrentAzureIp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:34:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->CurrentAzureSignature, sizeof(st->CurrentAzureSignature), c->CurrentAzureSignature);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:35:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(st->AzureCertHash, sizeof(st->AzureCertHash), c->AzureCertHash);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:88:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p.NewHostname, sizeof(p.NewHostname), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:228:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(c->LastMyIPv4, sizeof(c->LastMyIPv4), ip);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:263:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(c->LastMyIPv6, sizeof(c->LastMyIPv6), ip);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:477:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(current_azure_ip, sizeof(current_azure_ip), ac->ConnectingAzureIp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:592:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(c->AzureCertHash, sizeof(c->AzureCertHash), cert_hash);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:596:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->Cedar->CurrentDDnsFqdn, sizeof(c->Cedar->CurrentDDnsFqdn), c->CurrentFqdn);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:743:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(data.SniString, sizeof(data.SniString), DDNS_SNI_VER_STRING);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:762:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(dst, dst_size, str + 3);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:70:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), s + 6);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:437:6:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
					ShellExecute(hWnd, "open", tmp, NULL, NULL, SW_SHOW);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:445:4:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			ShellExecute(hWnd, "open", _SS("LICENSE_INFO_URL"), NULL, NULL, SW_SHOW);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:681:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.DeviceName, sizeof(t.DeviceName), p->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:720:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:829:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p.DeviceName, sizeof(p.DeviceName), device_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:991:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c:368:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(a.DeviceName, sizeof(a.DeviceName), t->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c:421:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(item->DeviceName, sizeof(item->DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c:455:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(d->DeviceName, sizeof(d->DeviceName), eld->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c:771:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c:836:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c:873:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.c:887:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(d->DeviceName, sizeof(d->DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:117:10:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
									StrCpy(eap->In_VpnProtocolState, sizeof(eap->In_VpnProtocolState), vpn_protocol_state_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:216:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), name_in_acl);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:233:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(filename, sizeof(filename), name_in_acl + 8);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:245:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(filename2, sizeof(filename2), "@");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:246:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(filename2, sizeof(filename2), filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:247:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(filename, sizeof(filename), filename2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:311:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(u->Filename, sizeof(u->Filename), filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:378:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Filename, sizeof(t.Filename), filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:680:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ao->HubName, sizeof(ao->HubName), hub_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:710:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->Name, sizeof(a->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1393:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1400:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Name, sizeof(a->Name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1456:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1817:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1826:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1836:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1848:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1858:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1866:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp1, sizeof(tmp1), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1870:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "ICMPv4");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1873:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "GGP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1876:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "TCP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1879:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "EGP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1882:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "PUP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1885:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "UDP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1888:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "HMP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1891:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "XNS-IDP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1894:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "RDP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1897:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "ICMPv6");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1900:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp1, sizeof(tmp1), "RVD");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1913:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1923:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1928:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1939:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1944:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1953:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1959:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1968:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1976:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1983:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, "Established, ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1987:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, "Unestablished, ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1998:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2004:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2010:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2017:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2048:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, size, "*");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2578:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(redirect_url2, sizeof(redirect_url2), redirect_url);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2607:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(secret, sizeof(secret), redirect_url2 + isp + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2631:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), hash_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2912:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(redirect_url, sizeof(redirect_url), a->RedirectUrl);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2962:12:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
											StrCpy(redirect_url, sizeof(redirect_url), s->FirstTimeHttpRedirectUrl);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3056:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		ACCESS *access;
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3067:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		Copy(access, a, sizeof(ACCESS));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3116:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			Insert(hub->AccessList, access);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3120:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			Add(hub->AccessList, access);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3221:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, dst_size, tmp1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6396:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, size, hub->RadiusServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6403:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(secret, secret_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6408:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(suffix_filter, suffix_filter_size, hub->RadiusSuffixFilter);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6560:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6791:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp1, sizeof(tmp1), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6795:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp2, sizeof(tmp2), tmp1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6819:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp1, sizeof(tmp1), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6823:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp2, sizeof(tmp2), tmp1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:44:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(d->MsChapV2_PPPUsername, sizeof(d->MsChapV2_PPPUsername), t->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:299:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ipc->ClientHostname, sizeof(ipc->ClientHostname), client_hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:300:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ipc->HubName, sizeof(ipc->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:301:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ipc->UserName, sizeof(ipc->UserName), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:302:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ipc->Password, sizeof(ipc->Password), password);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:395:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info.ClientProductName, sizeof(info.ClientProductName), client_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:398:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info.ServerProductName, sizeof(info.ServerProductName), server_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:401:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info.ClientOsName, sizeof(info.ClientOsName), client_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:402:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info.ClientOsVer, sizeof(info.ClientOsVer), "-");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:403:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info.ClientOsProductId, sizeof(info.ClientOsProductId), "-");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:406:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info.ClientHostname, sizeof(info.ClientHostname), ipc->ClientHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:410:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info.HubName, sizeof(info.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:645:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(req->UserClass, sizeof(req->UserClass), ipc->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:683:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:707:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:753:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:794:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1249:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(username, sizeof(username), L3_USERNAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1252:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(username, sizeof(username), f->Switch->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1293:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s->UserNameReal, sizeof(s->UserNameReal), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1716:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1743:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1811:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(f->HubName, sizeof(f->HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1882:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(o->Name, sizeof(o->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Link.c:634:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(o->DeviceName, sizeof(o->DeviceName), LINK_DEVICE_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Listener.c:162:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->ClientHostname, sizeof(c->ClientHostname), s->RemoteHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:121:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(g->HostName, sizeof(g->HostName), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:914:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(pl->SrcPhysicalIP, sizeof(pl->SrcPhysicalIP), src_session->ClientIP);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:919:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(pl->DestPhysicalIP, sizeof(pl->DestPhysicalIP), dest_session->ClientIP);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1160:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(url, sizeof(url), h->Path);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1229:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1231:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "=");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1235:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp, sizeof(tmp), value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1237:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp, sizeof(tmp), " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1442:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(tmp2, tmp2_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1446:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(tmp2, tmp2_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1447:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(tmp2, tmp2_size, http_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1590:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1597:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1624:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1643:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1662:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1681:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1688:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1698:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1708:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(info, sizeof(info), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1750:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(tmp2, tmp2_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1754:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(tmp2, tmp2_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1755:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(tmp2, tmp2_size, http_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1905:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1909:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "FIN+");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1914:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "SYN+");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1919:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "RST+");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1924:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "PSH+");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1929:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "ACK+");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1934:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "URG+");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2167:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str, size, g->LastStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2200:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2207:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(g->LastStr, sizeof(g->LastStr), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2268:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tag, sizeof(tag), "~%02u");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2271:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
			snprintf(tmp2, sizeof(tmp2), tag, num);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2278:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(old_datestr, MAX_SIZE, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2563:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(file_name, sizeof(file_name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2603:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(current_file_name, sizeof(current_file_name), file_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2631:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(current_file_name, sizeof(current_file_name), file_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:90:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(r->CurrentPushRouteStr, sizeof(r->CurrentPushRouteStr), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:232:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), r->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:380:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), r->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:653:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), h->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:750:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), r->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:797:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(r->CurrentPushRouteStr, sizeof(r->CurrentPushRouteStr), t.DhcpPushRoutes);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:938:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), r->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:941:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DhcpPushRoutes, sizeof(t.DhcpPushRoutes), r->CurrentPushRouteStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:1467:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hostname, sizeof(hostname), t->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:510:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->NatProductName, sizeof(t->NatProductName), CEDAR_ROUTER_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:511:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->NatVersionString, sizeof(t->NatVersionString), n->Cedar->VerString);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:512:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->NatBuildInfoString, sizeof(t->NatBuildInfoString), n->Cedar->BuildInfo);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:597:10:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
									StrCpy(e->DestHost, sizeof(e->DestHost), nat->Sock->RemoteHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:685:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(e->Hostname, sizeof(e->Hostname), dhcp->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1276:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(o->DhcpDomainName, sizeof(o->DhcpDomainName), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:343:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->DeviceName, sizeof(a->DeviceName), device_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:422:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp, sizeof(tmp), mac_address_seed);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:423:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp, sizeof(tmp), "@");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:424:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp, sizeof(tmp), device_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:464:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->Chain, sizeof(e->Chain), "OUTPUT");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:473:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->Chain, sizeof(e->Chain), "OUTPUT");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:497:6:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
					system(cmdline);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:513:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				system(cmdline);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:566:4:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			system(cmdline);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:610:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				system(cmdline);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:825:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(current_chain, sizeof(current_chain), t2->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:855:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(e->Chain, sizeof(e->Chain), current_chain);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:857:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(e->ConditionAndArgs, sizeof(e->ConditionAndArgs), line);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.c:44:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(client_name, sizeof(client_name), ETHERIP_CLIENT_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.c:50:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(client_name, sizeof(client_name), ETHERIP_L2TPV3_CLIENT_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.c:299:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s->ClientId, sizeof(s->ClientId), client_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.c:313:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s->CryptName, sizeof(s->CryptName), crypt_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:1019:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(c->EtherIP->ClientId, sizeof(c->EtherIP->ClientId), c->ClientId);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:2949:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(c->ClientId, sizeof(c->ClientId), your_id_payload->Payload.Id.StrData);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:3043:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(c->Secret, sizeof(c->Secret), sa->Secret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:3376:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(c->ClientId, sizeof(c->ClientId), your_id_payload->Payload.Id.StrData);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:3439:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(c->ClientId, sizeof(c->ClientId), your_id_payload->Payload.Id.StrData);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:3447:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(c->Secret, sizeof(c->Secret), sa->Secret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:3525:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(sa->Secret, sizeof(sa->Secret), secret == NULL ? ike->Secret : secret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:4539:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(cc->ClientId, sizeof(cc->ClientId), c->ClientId);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:372:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->Services.IPsec_Secret, sizeof(s->Services.IPsec_Secret), IPSEC_DEFAULT_SECRET);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:401:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(s->Services.L2TP_DefaultHub, sizeof(s->Services.L2TP_DefaultHub), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:405:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(s->Services.L2TP_DefaultHub, sizeof(s->Services.L2TP_DefaultHub), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:463:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->Ike->Secret, sizeof(s->Ike->Secret), sl->IPsec_Secret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:489:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Id, sizeof(t.Id), id->Id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:527:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Id, sizeof(t.Id), id_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:563:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Id, sizeof(t.Id), id_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.c:672:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s->Ike->Secret, sizeof(s->Ike->Secret), IPSEC_DEFAULT_SECRET);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:1619:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(hostname, sizeof(hostname), "vpn");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:1908:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(s->EtherIP->VendorName, sizeof(s->EtherIP->VendorName), s->Tunnel->VendorName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:1918:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(s->EtherIP->ClientId, sizeof(s->EtherIP->ClientId), c->ClientId);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:2023:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), L2TP_IPC_CLIENT_NAME_NO_TAG);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1049:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p.ClientName, sizeof(p.ClientName), OPENVPN_IPC_CLIENT_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1050:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p.Postfix, sizeof(p.Postfix), (se->Mode == OPENVPN_MODE_L3 ? OPENVPN_IPC_POSTFIX_L3 : OPENVPN_IPC_POSTFIX_L2));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1052:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p.UserName, sizeof(p.UserName), id.UserName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1053:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p.HubName, sizeof(p.HubName), id.HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1054:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p.Password, sizeof(p.Password), c->ClientKey.Password);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1064:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p.CryptName, sizeof(p.CryptName), c->CipherEncrypt->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1076:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p.ClientHostname, sizeof(p.ClientHostname), EntryListStrValue(pi, "UV_HOSTNAME"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1080:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p.ClientHostname, sizeof(p.ClientHostname), EntryListStrValue(pi, "IV_HWADDR"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1127:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1195:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(opt_str, sizeof(opt_str), data->OptionString);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1198:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(opt_str, sizeof(opt_str), s->DefaultClientOption);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1241:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->Proto, sizeof(c->Proto), "TCPv4_SERVER");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1245:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->Proto, sizeof(c->Proto), "TCPv6_SERVER");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1253:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->Proto, sizeof(c->Proto), "UDPv4");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1257:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->Proto, sizeof(c->Proto), "UDPv6");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1346:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(lowercase_name, sizeof(lowercase_name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1531:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, str_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2360:10:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
									StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2366:10:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
									StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2373:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2383:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2385:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(ip_dns1, sizeof(ip_dns1), ip_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2395:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2397:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(ip_dns2, sizeof(ip_dns2), ip_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2407:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2409:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(ip_wins1, sizeof(ip_wins1), ip_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2419:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2421:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(ip_wins2, sizeof(ip_wins2), ip_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2431:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2433:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(ip_defgw, sizeof(ip_defgw), ip_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2455:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2473:13:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
												StrCat(option_str, sizeof(option_str), l3_options);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2489:11:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
										StrCat(option_str, sizeof(option_str), ",ifconfig 192.0.0.8 255.255.255.240");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2502:9:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
								StrCat(option_str, sizeof(option_str), ",block-outside-dns");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2509:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(se->PushReplyStr, sizeof(se->PushReplyStr), option_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:577:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p->CryptName, sizeof(p->CryptName), crypt_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:591:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p->Postfix, sizeof(p->Postfix), postfix);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:592:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p->ClientSoftwareName, sizeof(p->ClientSoftwareName), client_software_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:600:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p->ClientHostname, sizeof(p->ClientHostname), client_hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1514:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(id, sizeof(id), d.UserName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1515:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(hub, sizeof(hub), d.HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2807:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(id, sizeof(id), d.UserName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2808:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(hub, sizeof(hub), d.HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3753:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(src, sizeof(src), src_username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3763:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(token1, sizeof(token1), src + first_en + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3764:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(token2, sizeof(token2), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3772:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(token1, sizeof(token1), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3797:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(token1, sizeof(token1), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3801:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(token1, sizeof(token1), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3804:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(token2, sizeof(token2), src + last_at + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3813:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(token1, sizeof(token1), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3823:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(token2, sizeof(token2), SERVER_DEFAULT_HUB_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3830:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(token2, sizeof(token2), cedar->Server->IPsecServer->Services.L2TP_DefaultHub);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3838:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst->HubName, sizeof(dst->HubName), token2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3839:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst->UserName, sizeof(dst->UserName), token1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:4037:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_SSTP.c:1012:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s->ClientHostName, sizeof(s->ClientHostName), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_SSTP.c:1013:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s->ClientCipherName, sizeof(s->ClientCipherName), cipher);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:576:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(url, sizeof(url), id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:587:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(data.SniString, sizeof(data.SniString), DDNS_SNI_VER_STRING);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:692:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->ClientId, sizeof(c->ClientId), client_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:693:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->FamilyName, sizeof(c->FamilyName), family_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:694:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->SoftwareName, sizeof(c->SoftwareName), software_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:698:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->MyLanguage, sizeof(c->MyLanguage), my_lang);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1156:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(groupname, sizeof(groupname), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1157:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(sessionname, sizeof(sessionname), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1304:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->ClientStr, sizeof(c->ClientStr), "Unknown");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1449:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(radius_login_opt.NasId, sizeof(radius_login_opt.NasId), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1703:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(psk, sizeof(psk), s->IPsecServer->Services.IPsec_Secret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:2151:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(username_real, sizeof(username_real), user->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:2160:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(groupname, sizeof(groupname), group->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:2202:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(username_real, sizeof(username_real), ADMINISTRATOR_USERNAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:2479:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(t.HubName, sizeof(t.HubName), hub->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:2844:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->UnderlayProtocol, sizeof(s->UnderlayProtocol), c->FirstSock->UnderlayProtocol);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3016:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->UserNameReal, sizeof(s->UserNameReal), username_real);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3017:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->GroupName, sizeof(s->GroupName), groupname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3145:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(local_name, sizeof(local_name), local_name_3);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3715:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info->ClientProductName, sizeof(info->ClientProductName), c->ClientStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3722:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info->ServerProductName, sizeof(info->ServerProductName), c->ServerStr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3729:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info->ClientOsName, sizeof(info->ClientOsName), os->OsProductName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3731:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info->ClientOsVer, sizeof(info->ClientOsVer), os->OsVersion);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3734:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info->ClientOsProductId, sizeof(info->ClientOsProductId), product_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3757:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(info->ClientHostname, sizeof(info->ClientHostname), namea);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3774:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info->ServerHostname, sizeof(info->ServerHostname), c->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3793:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(info->ProxyHostname, sizeof(info->ProxyHostname), s->ClientOption->ProxyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3809:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(info->HubName, sizeof(info->HubName), s->ClientOption->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4158:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ss->SecurePrivateKeyName, sizeof(ss->SecurePrivateKeyName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4160:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ss->SecurePublicCertName, sizeof(ss->SecurePublicCertName),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4781:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(c->Session->UnderlayProtocol, sizeof(c->Session->UnderlayProtocol), s->UnderlayProtocol);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4787:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->Session->UnderlayProtocol, sizeof(c->Session->UnderlayProtocol), SOCK_UNDERLAY_AZURE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6202:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(c->ServerName, sizeof(c->ServerName), o->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6217:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hostname, sizeof(hostname), o->ProxyType == PROXY_DIRECT ? c->ServerName : o->ProxyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6252:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(sock->UnderlayProtocol, sizeof(sock->UnderlayProtocol), SOCK_UNDERLAY_NAT_T);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6283:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.TargetHostname, sizeof(in.TargetHostname), c->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6286:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.Hostname, sizeof(in.Hostname), IsEmptyStr(hostname) ? o->ProxyName : hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6289:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.Username, sizeof(in.Username), o->ProxyUsername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6290:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.Password, sizeof(in.Password), o->ProxyPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6292:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.HttpCustomHeader, sizeof(in.HttpCustomHeader), o->CustomHttpHeader);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6293:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.HttpUserAgent, sizeof(in.HttpUserAgent), c->Cedar->HttpUserAgent);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1187:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e->SharedSecret, sizeof(e->SharedSecret), shared_secret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1189:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e->CalledStationStr, sizeof(e->CalledStationStr), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1190:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e->ClientIpStr, sizeof(e->ClientIpStr), client_ip_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1191:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e->Username, sizeof(e->Username), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1668:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(eap->In_VpnProtocolState, sizeof(eap->In_VpnProtocolState), opt->In_VpnProtocolState);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:140:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a.ProxyName, sizeof(a.ProxyName), t->ProxyHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:142:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a.ProxyUsername, sizeof(a.ProxyUsername), t->ProxyUsername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:143:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a.ProxyPassword, sizeof(a.ProxyPassword), t->ProxyPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:144:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a.CustomHttpHeader, sizeof(a.CustomHttpHeader), t->CustomHttpHeader);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:149:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->ProxyHostName, sizeof(t->ProxyHostName), a.ProxyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:151:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->ProxyUsername, sizeof(t->ProxyUsername), a.ProxyUsername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:152:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->ProxyPassword, sizeof(t->ProxyPassword), a.ProxyPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:153:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t->CustomHttpHeader, sizeof(t->CustomHttpHeader), a.CustomHttpHeader);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:374:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), ddns.CurrentHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:375:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), AZURE_DOMAIN_SUFFIX);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:686:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(fqdn, sizeof(fqdn), d->Status.CurrentFqdn);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:711:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(tt.StrValue, sizeof(tt.StrValue), fqdn);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1330:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->Data.Id, sizeof(t->Data.Id), t->EditId);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1412:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(d.Id, sizeof(d.Id), t->EditId);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1524:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.EditId, sizeof(t.EditId), id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1558:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(d.Id, sizeof(d.Id), id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2010:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2046:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2161:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(t.StrValue, sizeof(t.StrValue), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2438:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hubname, sizeof(hubname), SERVER_DEFAULT_HUB_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2442:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hubname, sizeof(hubname), SERVER_DEFAULT_BRIDGE_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2453:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2477:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2507:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2537:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2567:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2588:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2610:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2638:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2792:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2842:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2843:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2878:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(t.DeviceName, sizeof(t.DeviceName), ti->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2879:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3044:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3073:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3086:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a.HubName, sizeof(a.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3104:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3138:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tt.Name, sizeof(tt.Name), e->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3208:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tt.HubName, sizeof(tt.HubName), e->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3305:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(s->HubName, sizeof(s->HubName), SERVER_DEFAULT_BRIDGE_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3542:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.StrValue, sizeof(t.StrValue), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3581:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), s + 6);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4076:6:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
					ShellExecute(hWnd, "open", tmp, NULL, NULL, SW_SHOW);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4084:4:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			ShellExecute(hWnd, "open", _SS("LICENSE_INFO_URL"), NULL, NULL, SW_SHOW);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4191:18:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
						if (((UINT)ShellExecute(hWnd, "open", fullpath, NULL, NULL, SW_SHOWNORMAL)) > 32)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4987:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), p->s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5042:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5075:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), c->s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5333:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), c->s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5346:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), c->s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5655:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5723:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5982:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(k->CertName, sizeof(k->CertName), s1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5986:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(k->KeyName, sizeof(k->KeyName), s2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6055:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(cert_name, cert_name_size, p.CertName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6059:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(key_name, key_name_size, p.KeyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6237:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6384:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6387:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6481:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6515:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6590:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6605:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6632:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6635:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), tmp3);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6667:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), w->SwitchName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6944:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6961:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7000:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7327:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), a->e->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7337:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(a->Name, sizeof(a->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7387:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Name, sizeof(a->Name), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7409:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(a->Name, sizeof(a->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7484:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a.CurrentOptions.HubName, sizeof(a.CurrentOptions.HubName), e->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7511:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a.CurrentOptions.HubName, sizeof(a.CurrentOptions.HubName), e->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7967:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(nic, sizeof(nic), e->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7994:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.DeviceName, sizeof(t.DeviceName), nic);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7995:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), hub);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8328:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8403:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8411:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8883:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8983:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9117:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9224:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9379:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9630:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), status->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9631:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), status->SessionName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9731:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9732:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9825:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9911:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9967:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9989:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10078:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10188:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10260:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), k->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10294:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10454:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10604:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10620:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10655:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10712:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10793:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10905:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11218:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->Access->RedirectUrl, sizeof(s->Access->RedirectUrl), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12518:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12524:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
					Copy(&t.Accesses[i], access, sizeof(ACCESS));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12588:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12599:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		Copy(access, &t.Accesses[i], sizeof(ACCESS));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12601:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		Add(a.AccessList, access);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12614:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		Free(access);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12898:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(group->Name, sizeof(group->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12899:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(group->HubName, sizeof(group->HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12933:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(group->HubName, sizeof(group->HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13029:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13125:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13126:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13249:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), p->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13250:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13639:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), u->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13640:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), u->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13641:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.GroupName, sizeof(t.GroupName), u->GroupName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14369:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e.SetUser.HubName, sizeof(e.SetUser.HubName), e.Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14370:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e.SetUser.Name, sizeof(e.SetUser.Name), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14404:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e.SetUser.HubName, sizeof(e.SetUser.HubName), e.Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14498:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14705:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.HubName, sizeof(t.HubName), s->Hub->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14706:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15591:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15599:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(tmp, sizeof(tmp), ", ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15614:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15625:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(tmp, sizeof(tmp), ", ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15894:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), info->ConnectionName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16080:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.Name, sizeof(t.Name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17139:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(defcn, sizeof(defcn), default_cn);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17153:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(defcn, sizeof(defcn), t.CurrentFqdn);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17182:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(defcn, sizeof(defcn), server->ServerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17426:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hubname, sizeof(hubname), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17427:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17432:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hubname, sizeof(hubname), t.HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17602:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17758:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s.HubName, sizeof(s.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17799:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), (char *)param);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18397:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(str, sizeof(str), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18426:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), st.CurrentHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18427:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), AZURE_DOMAIN_SUFFIX);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18598:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(t.HubName, sizeof(t.HubName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19157:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(rpc->HubName, sizeof(rpc->HubName), s->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19165:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption.Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19168:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.HubName, sizeof(p.HubName), rpc->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19258:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(family_name, sizeof(family_name), p.ServerInfo.ServerFamilyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19264:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(family_name, sizeof(family_name), "PacketiX");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19269:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(family_name, sizeof(family_name), "softether");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19339:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p.ServerName, sizeof(p.ServerName), server_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19477:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(s->ClientOption.Hostname, sizeof(s->ClientOption.Hostname), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:20066:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->ClientOption.Hostname, sizeof(s->ClientOption.Hostname), "localhost");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:20557:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(s->HubName, sizeof(s->HubName), hub);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:20574:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(o->Hostname, sizeof(o->Hostname), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:20577:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(o->DeviceName, sizeof(o->DeviceName), "DUMMY");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:157:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(inner_name, sizeof(inner_name), f->InnerFileName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:232:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(f->InnerFileName, sizeof(f->InnerFileName), inner_file_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:400:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(filename, sizeof(filename), resource_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1330:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(new_lang_name, sizeof(new_lang_name), new_lang->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1331:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(old_lang_name, sizeof(old_lang_name), old_lang.Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:6375:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(sw->SfxMode, sizeof(sw->SfxMode), GetParamStr(o, "SFXMODE"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:59:12:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		iError = execvp(path, parameter);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:454:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(name_and_realm, sizeof(name_and_realm), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:455:8:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
							StrCat(name_and_realm, sizeof(name_and_realm), "@");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:456:8:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
							StrCat(name_and_realm, sizeof(name_and_realm), h->RadiusRealm);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:654:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->AdapterId, sizeof(a->AdapterId), adapter_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:655:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(a->DeviceName, sizeof(a->DeviceName), filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:832:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Guid, sizeof(t.Guid), tmp + StrLen(SL_ADAPTER_ID_PREFIX));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:835:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Name, sizeof(t.Name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:72:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(ret->StrValue, sizeof(ret->StrValue),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:92:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(ret->StrValue, sizeof(ret->StrValue), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:109:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(ret->StrValue, sizeof(ret->StrValue), "Ok.");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:586:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(hh->HubName, sizeof(hh->HubName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:802:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(name, size, cpu);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:804:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(name, size, " (Open Source)");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:817:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, CEDAR_BRIDGE_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:821:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, CEDAR_BETA_SERVER);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:827:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, CEDAR_BRIDGE_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:831:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, CEDAR_SERVER_STR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:847:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.Path, sizeof(t.Path), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:848:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.ServerName, sizeof(t.ServerName), server_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:1008:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(f->Path, sizeof(f->Path), file_path);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:1972:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), "server.softether.vpn");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2375:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(k.KeepConnectHost, sizeof(k.KeepConnectHost), CLIENT_DEFAULT_KEEPALIVE_HOST);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2384:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(keep->ServerName, sizeof(keep->ServerName), k.KeepConnectHost);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2789:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(t.ProxyPassword, sizeof(t.ProxyPassword), pw_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3459:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(a->Name, sizeof(a->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5356:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(d.Id, sizeof(d.Id), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5365:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(d.Password, sizeof(d.Password), pass);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5640:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(k.KeepConnectHost, sizeof(k.KeepConnectHost), CLIENT_DEFAULT_KEEPALIVE_HOST);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5660:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(keep->ServerName, sizeof(keep->ServerName), k.KeepConnectHost);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6185:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str, sizeof(str), &c->UsernameHubSeparator);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6222:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(tmp, sizeof(tmp), tmp2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6223:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(tmp, sizeof(tmp), ",");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6311:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(option->String, size, buf);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6656:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(s->ControllerName, sizeof(s->ControllerName), controller_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6981:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(url, url_size, line);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7552:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(username, username_size, t->Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7553:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(usernamereal, usernamereal_size, t->UsernameReal);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7554:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(sessionname, sessionname_size, t->SessionName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7555:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(groupname, groupname_size, t->GroupName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8069:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->Username, sizeof(t->Username), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8070:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->UsernameReal, sizeof(t->UsernameReal), realusername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8071:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->GroupName, sizeof(t->GroupName), groupname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8072:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->SessionName, sizeof(t->SessionName), sessionname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8414:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(hh->Name, sizeof(hh->Name), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8852:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hub_name_upper, sizeof(hub_name_upper), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8854:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(user_name_upper, sizeof(user_name_upper), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8953:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->IpTables[i].RemoteHostname, sizeof(t->IpTables[i].RemoteHostname),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8982:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->MacTables[i].RemoteHostname, sizeof(t->MacTables[i].RemoteHostname),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9074:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->Sessions[i].RemoteHostname, sizeof(t->Sessions[i].RemoteHostname),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9104:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hh->Name, sizeof(hh->Name), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9415:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hubname, sizeof(hubname), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9618:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9650:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.Name, sizeof(t.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10047:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(hh->Name, sizeof(hh->Name), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10230:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(f->hostname, sizeof(f->hostname), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10331:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(o.Hostname, sizeof(o.Hostname), server->ControllerName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10563:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(region, region_size, c->CurrentRegion);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10571:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(region, region_size, "JP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10575:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(region, region_size, "CN");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10649:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(c->CurrentRegion, sizeof(c->CurrentRegion), region);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:160:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(dlg.HubName, sizeof(dlg.HubName), s->ClientOption->HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:161:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(dlg.ServerName, sizeof(dlg.ServerName), s->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:176:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(info.NicName, sizeof(info.NicName), s->ClientOption->DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1517:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1558:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1600:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.Username, sizeof(p.Username), s->ClientOption->ProxyUsername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1601:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.Password, sizeof(p.Password), s->ClientOption->ProxyPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1602:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->ProxyName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1608:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.Username, sizeof(p.Username), s->ClientAuth->Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1624:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.Password, sizeof(p.Password), empty ? "" : HIDDEN_PASSWORD);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1625:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p.ServerName, sizeof(p.ServerName), s->ClientOption->Hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1643:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(s->ClientOption->ProxyUsername, sizeof(s->ClientOption->ProxyUsername), p.Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1648:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(s->ClientAuth->Username, sizeof(s->ClientAuth->Username), p.Username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1658:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(s->ClientOption->ProxyPassword, sizeof(s->ClientOption->ProxyPassword), p.Password);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1665:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(s->ClientAuth->PlainPassword, sizeof(s->ClientAuth->PlainPassword), p.Password);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2088:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hub_name_upper, sizeof(hub_name_upper), h->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2090:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(user_name_upper, sizeof(user_name_upper), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2113:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(name, sizeof(name), "-");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2114:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(name, sizeof(name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2138:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(pc_name, sizeof(pc_name), t->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2142:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(pc_name, sizeof(pc_name), "pc");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:328:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(instance_name_lower, sizeof(instance_name_lower), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:379:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tap_path, "%s", TAP_DIR TAP_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:401:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:418:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:427:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:442:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_path + StrLen(TAP_DIR));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:452:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tap_name, sizeof(tap_name), ifr.ifr_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:459:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:469:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:616:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:627:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tt.Name, sizeof(tt.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:648:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t->Name, sizeof(t->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:675:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tt.Name, sizeof(tt.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:687:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), eth_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:759:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tt.Name, sizeof(tt.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:788:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tt.Name, sizeof(tt.Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:78:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(v->Title, sizeof(v->Title), GetOsInfo()->OsProductName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:24:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(secure_nat_target_hostname, sizeof(secure_nat_target_hostname), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:3583:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(q1->Hostname, sizeof(q1->Hostname), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:3584:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(q2->Hostname, sizeof(q2->Hostname), hostname2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6580:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(parsed_result->Hostname, sizeof(parsed_result->Hostname), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6920:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(v_vgs_hostname, sizeof(v_vgs_hostname), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:9548:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(ret.DomainName, sizeof(ret.DomainName), v->DhcpDomain);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:9664:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(ret.DomainName, sizeof(ret.DomainName), v->DhcpDomain);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:9963:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(o->DhcpDomainName, sizeof(o->DhcpDomainName), v->DhcpDomain);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:10061:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(v->DhcpDomain, sizeof(v->DhcpDomain), vo->DhcpDomainName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:291:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:307:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:323:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:396:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:397:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:411:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:471:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:472:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:533:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:540:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:626:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:684:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.StrValue, sizeof(t.StrValue), licensekey); 
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:869:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.DeviceName, sizeof(t.DeviceName), tapname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:874:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(t.DeviceName, sizeof(t.DeviceName), eth.Items[id].DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:876:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:908:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.DeviceName, sizeof(t.DeviceName), et.Items[id].DeviceName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:909:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), et.Items[id].HubName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1055:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1081:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1103:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.DhcpDomainName, sizeof(t.DhcpDomainName), (char*)StrMapSearch(params, "DHCPDOMAIN"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1120:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1141:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1208:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hub);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1209:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.Name, sizeof(t.Name), session);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1227:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(t.HubName, sizeof(t.HubName), hub);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1305:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1391:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(context->Admin->Rpc->Name, sizeof(context->Admin->Rpc->Name), "WEBUI");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1527:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(filename, size, start);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinJumpList.cpp:26:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#ifdef StrCpy
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinJumpList.cpp:27:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#undef StrCpy
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinJumpList.cpp:30:8:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
#ifdef StrCat
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinJumpList.cpp:31:8:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
#undef StrCat
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:374:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(u->ClientId, sizeof(u->ClientId), client_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:376:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(u->SoftwareName, sizeof(u->SoftwareName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1476:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(d.nat_t_svc_name, sizeof(d.nat_t_svc_name), nat_t_svc_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2538:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(tmp, sizeof(tmp), ret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2887:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(tmp, sizeof(tmp), dialog_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2888:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(tmp, sizeof(tmp), "@");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2892:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(tmp, sizeof(tmp), "CAPTION");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2896:7:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
						StrCat(tmp, sizeof(tmp), control_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:3475:4:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			ShellExecute(hWnd, "open", _SS("SE_COMPANY_URL"), NULL, NULL, SW_SHOW);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7115:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(pass, pass_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7126:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(pass, pass_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7133:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(pass, pass_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7147:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(pass, pass_size, p.pass);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7334:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), default_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7942:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(w->default_pin, 128, w->p->pin);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7944:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(cached_pin_code, sizeof(cached_pin_code), w->p->pin);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:10007:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:10011:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:98:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data.AdditionalHeaderName, sizeof(data.AdditionalHeaderName), additional_header_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:99:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data.AdditionalHeaderValue, sizeof(data.AdditionalHeaderValue), additional_header_value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:104:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data.SniString, sizeof(data.SniString), sni_string);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:427:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:532:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.TargetHostname, sizeof(in.TargetHostname), param->HostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:535:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.Hostname, sizeof(in.Hostname), param->ProxyHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:538:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.Username, sizeof(in.Username), param->ProxyUsername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:539:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.Password, sizeof(in.Password), param->ProxyPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:541:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(in.HttpCustomHeader, sizeof(in.HttpCustomHeader), param->CustomHttpHeader);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:584:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c.HostName, sizeof(c.HostName), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:587:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c.ProxyHostName, sizeof(c.HostName), t->ProxyHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:589:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c.ProxyUsername, sizeof(c.ProxyUsername), t->ProxyUsername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:590:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c.ProxyPassword, sizeof(c.ProxyPassword), t->ProxyPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:591:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c.CustomHttpHeader, sizeof(c.CustomHttpHeader), t->CustomHttpHeader);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:677:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(con.HostName, sizeof(con.HostName), data->HostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:680:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(con.ProxyHostName, sizeof(con.ProxyHostName), setting->ProxyHostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:682:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(con.ProxyUsername, sizeof(con.ProxyUsername), setting->ProxyUsername);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:683:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(con.ProxyPassword, sizeof(con.ProxyPassword), setting->ProxyPassword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:684:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(con.CustomHttpHeader, sizeof(con.CustomHttpHeader), setting->CustomHttpHeader);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:689:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(target, sizeof(target), data->Target);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1002:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, name_size, s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1008:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp, sizeof(tmp), s + i + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1012:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(name, name_size, host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1064:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1071:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1078:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1092:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(setting->ProxyHostName, sizeof(setting->ProxyHostName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1150:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data->Method, sizeof(data->Method), WPC_HTTP_POST_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1154:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data->Method, sizeof(data->Method), WPC_HTTP_GET_NAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1159:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data->Referer, sizeof(data->Referer), referrer);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1162:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1187:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(server_port, sizeof(server_port), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1193:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data->Target, sizeof(data->Target), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1197:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data->Target, sizeof(data->Target), "/");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1205:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(data->HostName, sizeof(data->HostName), host);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1212:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(data->HeaderHostName, sizeof(data->HeaderHostName), data->HostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1190:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(data, size, TAG_FALSE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1194:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(data, size, TAG_TRUE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1236:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, tmp_size, CfgTypeToStr(type));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1237:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1238:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, name2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1239:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1240:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, data2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1241:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1242:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, sub2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1246:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, tmp_size, CfgTypeToStr(type));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1247:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1248:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, name2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1249:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1250:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, tmp_size, data2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1404:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ret, StrLen(tmp) + 1, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1428:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, (len * 3 + 2), "$");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1450:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ret, 0, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1707:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tt.Name, 0, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1731:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ff.Name, 0, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:2094:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tt.Name, 0, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:2109:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->Name, 0, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:2223:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ff.Name, 0, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:2239:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(f->Name, 0, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:287:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(m->Name, sizeof(m->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:445:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(c->Name, sizeof(c->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:2074:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy((char *)t->data, t->length, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:3256:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return StrCpy(buf, bufsize, cb->password);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:3508:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(x->issuer_url, sizeof(x->issuer_url), uri);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:234:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:239:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(f->Name, sizeof(f->Name), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:584:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:860:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(filename, sizeof(filename), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1103:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(s, sizeof(s), src_file_list->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1217:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), dst_filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1285:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, size, exe_file_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1445:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1452:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1524:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1587:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), filepath);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1595:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1606:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(dst, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1617:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(dst, size, "/");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1433:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, http_403_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1492:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, http_404_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1551:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, http_501_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:384:7:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
						_snprintf(dst, sizeof(dst), tag, va_arg(args, UINT64));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:386:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
						snprintf(dst, sizeof(dst), tag, va_arg(args, UINT64));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:392:7:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
						_snprintf(dst, sizeof(dst), tag, va_arg(args, int));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:394:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
						snprintf(dst, sizeof(dst), tag, va_arg(args, int));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:415:6:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					_snprintf(dst, sizeof(dst), tag, va_arg(args, double));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:417:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					snprintf(dst, sizeof(dst), tag, va_arg(args, double));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:435:6:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					_snprintf(dst, sizeof(dst), tag, va_arg(args, void *));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:437:6:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
					snprintf(dst, sizeof(dst), tag, va_arg(args, void *));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:687:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(charset, sizeof(charset), "utf-8");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:689:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(charset, sizeof(charset), "EUCJP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:694:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(charset, sizeof(charset), "US");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:839:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:849:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:854:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, outbuf_orig);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:930:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), "C");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:939:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, t->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:945:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, size, t->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:949:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, size, "eucJP");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:1424:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str, 0, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:1432:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	ret = StrCpy(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:431:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(data, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:439:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(data, size, ret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:605:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), instance_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:620:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:636:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), instance_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:651:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:719:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "(Unknown)");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:760:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "(Unknown)");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:946:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s (0x%x)", name, (UINT)param);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:962:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp, "%s (%p)", name, param);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1438:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1454:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str_year, sizeof(str_year), tmp + 0);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1457:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str_month, sizeof(str_month), tmp + 5);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1460:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str_day, sizeof(str_day), tmp + 8);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1463:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str_hour, sizeof(str_hour), tmp + 11);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1466:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str_minute, sizeof(str_minute), tmp + 14);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1469:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(str_second, sizeof(str_second), tmp + 17);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1476:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(str_msec, sizeof(str_msec), tmp + 20);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1480:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(str_msec, sizeof(str_msec), "0");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1534:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1547:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1809:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
void LocalToSystem(SYSTEMTIME *system, SYSTEMTIME *local)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1819:17:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	UINT64ToSystem(system, sec64);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1823:51:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
void SystemToLocal(SYSTEMTIME *local, SYSTEMTIME *system)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1832:41:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	sec64 = (UINT64)((INT64)SystemToUINT64(system) + GetTimeDiffEx(system, false));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1832:65:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	sec64 = (UINT64)((INT64)SystemToUINT64(system) + GetTimeDiffEx(system, false));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h:101:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
void LocalToSystem(SYSTEMTIME *system, SYSTEMTIME *local);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h:102:51:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
void SystemToLocal(SYSTEMTIME *local, SYSTEMTIME *system);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:795:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(tmp, total_len, "\"");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:797:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, total_len, s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:800:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(tmp, total_len, "\"");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:802:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, total_len, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.h:78:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define	snprintf	_snprintf
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.h:78:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define	snprintf	_snprintf
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.h:93:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	char tmp[128]; sprintf(tmp, "%s: %u", __FILE__, __LINE__); Win32DebugAlert(tmp);	\
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:881:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2573:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(a->Guid, sizeof(a->Guid), info->AdapterName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2776:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(title, sizeof(title), (char *)r->bDescr);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2805:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(a->Title, sizeof(a->Title), title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3188:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(short_path, short_path_size, long_path);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3412:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p->ExeFilename, sizeof(p->ExeFilename), exe);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3465:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(p->ExeFilename, sizeof(p->ExeFilename), e.szExeFile);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3639:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(nid.szTip, sizeof(nid.szTip), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3670:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(nid.szInfo, sizeof(nid.szInfo), tmp1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3671:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(nid.szInfoTitle, sizeof(nid.szInfoTitle), tmp2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4611:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(g_service_name, sizeof(g_service_name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6474:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(sysdir, sizeof(sysdir), MsGetSystem32Dir());
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6933:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(path, size, proc->ExeFilename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7630:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(hwid_copy, sizeof(hwid_copy), hwid);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7716:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(target_name, sizeof(target_name), device_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8427:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(sys_name, sizeof(sys_name), neo_sys);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9592:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9720:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(tmp, sizeof(tmp), &device_id[StrLen(tag)]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9813:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(instance_name, sizeof(instance_name),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9822:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(instance_name, sizeof(instance_name),
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:249:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(v->Name, sizeof(v->Name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:423:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(current_fqdn, sizeof(current_fqdn), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:460:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, current_fqdn);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:570:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(e->IfName, sizeof(e->IfName), a->Title);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:699:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(connect_hostname2, sizeof(connect_hostname2), connect_hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1053:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp_username, sizeof(tmp_username), src_username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1062:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp_username, sizeof(tmp_username), t->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1066:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp_domain, sizeof(tmp_domain), t->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1077:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp_domain, sizeof(tmp_domain), t->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1080:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp_username, sizeof(tmp_username), t->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1084:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst_username, dst_username_size, tmp_username);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1085:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst_domain, dst_domain_size, tmp_domain);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1234:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(r->NatT_Token, sizeof(r->NatT_Token), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1268:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(r->CurrentRegisterHostname, sizeof(r->CurrentRegisterHostname), new_hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:2576:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_NAT_T);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:2581:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_DNS);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:2586:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_ICMP);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4237:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ipstr, sizeof(ipstr), tmp + 3);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4317:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(current_hostname, sizeof(current_hostname), r->CurrentRegisterHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:5284:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(r->SvcName, sizeof(r->SvcName), svc_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:5305:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), r->SvcName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:5696:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(clientcert->PreverifyErrMessage, PREVERIFY_ERR_MESSAGE_SIZE, (char *)msg);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6842:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6903:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, 0, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6915:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(str, 0, "::");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6919:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(str, 0, ":");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6925:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, 0, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6928:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(str, 0, ":");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6938:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, 0, "%");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6941:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, 0, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6961:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6981:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ss, sizeof(ss), &tmp[i + 1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:8961:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p->Guid, sizeof(p->Guid), guid);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9462:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(domain, size, info->DomainName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10203:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(hostname, size, c->HostName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10208:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(hostname, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10247:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(c->HostName, sizeof(c->HostName), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10417:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(name, size, t->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:12251:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(sock->SniHostname, sizeof(sock->SniHostname), (char *)sni_recv_hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:13154:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_NATIVE_V4);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:13266:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_NATIVE_V6);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14369:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hostname_original, sizeof(hostname_original), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14381:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(hostname_original, sizeof(hostname_original), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14386:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(hostname_original, sizeof(hostname_original), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14393:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(hint_str, sizeof(hint_str), hostname + i + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14407:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hostname_original, sizeof(hostname_original), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14470:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(nat_t_sock->UnderlayProtocol, sizeof(nat_t_sock->UnderlayProtocol), SOCK_UNDERLAY_NAT_T);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14498:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p1.Hostname, sizeof(p1.Hostname), hostname_original);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14508:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p2.Hostname, sizeof(p2.Hostname), hostname_original);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14515:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p2.HintStr, sizeof(p2.HintStr), hint_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14516:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p2.TargetHostname, sizeof(p2.TargetHostname), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14517:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p2.SvcName, sizeof(p2.SvcName), nat_t_svc_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14521:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p3.Hostname, sizeof(p3.Hostname), hostname_original);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14527:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p3.SvcName, sizeof(p3.SvcName), nat_t_svc_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14532:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p4.Hostname, sizeof(p4.Hostname), hostname_original);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14538:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(p4.SvcName, sizeof(p4.SvcName), nat_t_svc_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14696:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p2.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p2.Result_Nat_T_Sock->UnderlayProtocol), SOCK_UNDERLAY_NAT_T);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14710:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p4.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p4.Result_Nat_T_Sock->UnderlayProtocol), SOCK_UNDERLAY_DNS);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14720:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(p3.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p3.Result_Nat_T_Sock->UnderlayProtocol), SOCK_UNDERLAY_ICMP);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14785:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(sock->UnderlayProtocol, sizeof(sock->UnderlayProtocol), is_ipv6 ? SOCK_UNDERLAY_NATIVE_V6 : SOCK_UNDERLAY_NATIVE_V4);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14791:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), hostname_original);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14863:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(dst, dst_size, t2->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14864:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(dst, dst_size, " ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14875:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), key);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14876:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp, sizeof(tmp), "=");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14877:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(tmp, sizeof(tmp), value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15400:9:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
								StrCpy(name, size, t->Token[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15439:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, size, name_cache);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15446:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(name, size, "Unknown");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15451:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15465:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(name, size, tmp2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15470:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(name_cache, sizeof(name_cache), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15560:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(hostname, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15613:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hostname, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15658:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hostname, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15783:11:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
										StrCpy(name, size, a);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15985:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(hostname, sizeof(hostname), hostname_arg);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:16129:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p->HostName, sizeof(p->HostName), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:16681:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(dst, size, src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:17883:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:18880:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t->Hostname, sizeof(t->Hostname), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:19909:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_AZURE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:19959:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_INPROC);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:20794:26:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
																									StrCpy(sni, sni_size, name_buf);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:563:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(v->Str, v->Size, str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:648:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e->name, sizeof(e->name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:674:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.name, sizeof(t.name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:706:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(t.name, sizeof(t.name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:769:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(e->JsonHint_GroupName, sizeof(e->JsonHint_GroupName), p->CurrentJsonHint_GroupName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1095:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(p->CurrentJsonHint_GroupName, sizeof(p->CurrentJsonHint_GroupName), json_group_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1428:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, GetStrValue(e, index));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1494:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->name, sizeof(e->name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1571:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->name, sizeof(e->name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1616:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->name, sizeof(e->name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1728:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->name, sizeof(e->name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1792:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(e->name, sizeof(e->name), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1939:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), e->name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1940:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(name, sizeof(name), suffix);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:2474:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(name, sizeof(name), e->name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:2475:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(name, sizeof(name), suffix);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.c:58:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(target_hostname, sizeof(target_hostname), in->TargetHostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:192:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(str, str_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:196:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, str_size, separate_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:204:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:275:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, 0, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:784:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(key, key_size, key_tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:785:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(value, value_size, value_tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1054:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, size, tmp2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1170:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, tmp_size, str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1193:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1205:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), t->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1411:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, 0, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1516:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, dst_size, str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1683:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(tmp2, sizeof(tmp2), "0x");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1684:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(tmp2, sizeof(tmp2), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1727:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1760:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1827:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, str_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1883:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, len + 1, str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2208:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, ret);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2305:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(cmp_string, len_string + 1, string);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2307:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(cmp_keyword, len_keyword + 1, keyword);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2517:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, 0, buf);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2558:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(str, 0, buf);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2590:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2895:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
UINT StrCat(char *dst, UINT size, char *src)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2939:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2940:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(dst, size, s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2948:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
UINT StrCpy(char *dst, UINT size, char *src)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3135:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define sscanf THINK_TWICE_ABOUT_USING_SSCANF
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:4066:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	return sprintf(buf, "%s", string);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.h:30:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
UINT StrCpy(char *dst, UINT size, char *src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.h:32:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
UINT StrCat(char *dst, UINT size, char *src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:242:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(str, str_size, line);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:494:6:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					StrCpy(e->Name, sizeof(e->Name), t->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:674:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:794:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, len_name + 1, line);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:866:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(prefix, prefix_size, str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:886:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(name2, name2_size, prefix);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:887:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(name2, name2_size, "@");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:890:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(name2, name2_size, name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:954:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(src, 0, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1308:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), "Error: Can't read string tables (file not found).\r\nPlease check hamcore.se2.\r\n\r\n(First, reboot the computer. If this problem occurs again, please reinstall VPN software files.)");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1478:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ret->DnsQueryHost, sizeof(ret->DnsQueryHost), p->DnsQueryHost);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1856:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(h.Method, sizeof(h.Method), "SSL_Connect");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1857:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(h.Hostname, sizeof(h.Hostname), sni);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1859:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(h.Path, sizeof(h.Path), "/");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1913:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(h.Method, sizeof(h.Hostname), tokens->Token[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1916:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(h.Path, sizeof(h.Path), tokens->Token[1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1919:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(h.Protocol, sizeof(h.Protocol), tokens->Token[2]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1940:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(name, sizeof(name), line);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1944:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(value, sizeof(value), line + i + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1949:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(h.Hostname, sizeof(h.Hostname), value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1953:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(h.Referer, sizeof(h.Referer), value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1957:8:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							StrCpy(h.UserAgent, sizeof(h.UserAgent), value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:2879:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, name_size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:2900:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(name, name_size, ".");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:2902:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(name, name_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:2987:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(p->DnsQueryHost, sizeof(p->DnsQueryHost), hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3663:6:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
					StrCat(str, str_size, ", ");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3666:5:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
				StrCat(str, str_size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3765:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3782:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(gateway, sizeof(gateway), t->Token[2]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:349:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(o->FileName, sizeof(o->FileName), o->CallStack->filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:731:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, size, "(Unknown)\n");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:760:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp3, sizeof(tmp3), tmp2);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:761:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp3, sizeof(tmp3), tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:763:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(str, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:363:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	fp = popen(cmd, "r");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:557:3:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
		StrCat(tmp, sizeof(tmp), "/");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:650:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (access(name, X_OK) == 0)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:771:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(tmp, sizeof(tmp), instance_name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:809:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(ret->FileName, sizeof(ret->FileName), name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:946:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(tag, caption, msg);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:1117:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(filename, args);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2191:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(exe_name, sizeof(exe_name), ":pid_hash");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2236:2:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	StrCat(exe_name, sizeof(exe_name), ":pid_hash");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2395:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execvp(exe, args);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2457:4:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			system(tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:615:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, size, "");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:926:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:933:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:939:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:949:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(tmp, sizeof(tmp), str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1612:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1765:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, sizeof(name), filename);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1915:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(name, size, exe_dir);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1944:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, sizeof(str), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1948:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, sizeof(str), dst);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1955:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(dst, size, str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2006:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, sizeof(str), src);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2010:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(str, sizeof(str), dst);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2024:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(dst, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2025:4:  [4] (buffer) StrCat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
			StrCat(dst, size, "\\");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2720:3:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
		lstrcpy(s->name, sym->Name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2734:3:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
		lstrcpy(s->filename, line.FileName);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2737:3:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
		lstrcpy(tmp, &s->filename[len + 1]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2738:3:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
		lstrcpy(s->filename, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:173:4:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
			swprintf(args, sizeof(args), L"\"%S\" %s", buf, current_args);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpndrvinst/vpndrvinst.c:183:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), cmd);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:96:4:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
			swprintf(tmp, sizeof(tmp) / 2, warningMessage,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:712:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(f->SrcPath, sizeof(f->SrcPath), a->Path);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:718:3:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		StrCpy(f->SrcPath, sizeof(f->SrcPath), setting.SettingPath);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1062:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(set->SettingPath, sizeof(set->SettingPath), value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1070:7:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						StrCpy(set->x86.Path, sizeof(set->x86.Path), value);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1082:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(set->x86.VpnCMgrExeFileName, sizeof(set->x86.VpnCMgrExeFileName), (MsIsX64() ? "vpncmgr_x64.exe" : "vpncmgr.exe"));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1140:2:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	StrCpy(buf, size, tmp);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1275:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(setting.SettingPath, sizeof(setting.SettingPath), s);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/vpntest.c:132:4:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			StrCpy(tmp, sizeof(tmp), cmd);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/vpntest.c:254:5:  [4] (buffer) StrCpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				StrCpy(cmd, sizeof(cmd), &s[0]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h:204:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
				lstrcpy(init.InstallerExeUrl, installer_exe_url);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h:212:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
				lstrcpy(init.InstallerInfUrl, installer_inf_url);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h:220:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
				lstrcpy(init.SettingUrl, setting_url);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h:232:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
				lstrcpy(init.LanguageId, language_id);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h:241:6:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
					lstrcpy(init.VpnServerHostname, vpnserver_hostname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h:249:6:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
					lstrcpy(init.VpnServerHubName, vpnserver_hubname);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/VpnWebControl.h:257:6:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
					lstrcpy(init.VpnServerPassword, vpnserver_password);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:66:4:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
			swprintf(tmp, sizeof(tmp) / 2, warningMessage,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:103:2:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
	swprintf(tmp, sizeof(tmp), L"%S", name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:174:3:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
		swprintf(tmp, sizeof(tmp) / 2, msgInfDownloadFailed, VwUrlToFileName(data.InstallerInfUrl));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:203:5:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
				swprintf(tmp, sizeof(tmp) / 2, msgInfDownloadFailed, VwUrlToFileName(data.InstallerInfUrl));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:230:4:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
			swprintf(tmp, sizeof(tmp) / 2, msgBadInfFile, VwUrlToFileName(data.InstallerInfUrl));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:274:5:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
				swprintf(tmp, sizeof(tmp) / 2, msgWriteFailed, VPNINSTALL_INF_FILENAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:303:6:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
					swprintf(tmp, sizeof(tmp) / 2, msgInfDownloadFailed, VwUrlToFileName(data.InstallerExeUrl));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:320:6:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
					swprintf(tmp, sizeof(tmp) / 2, msgWriteFailed, VPNINSTALL_EXE_FILENAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:340:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
						swprintf(tmp, sizeof(tmp) / 2, msgInfDownloadFailed, VwUrlToFileName(data.InstallerExeUrl));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:378:6:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
					swprintf(tmp, sizeof(tmp) / 2, msgInfDownloadFailed, VwUrlToFileName(data.InstallerExeUrl));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:437:6:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
					swprintf(tmp, sizeof(tmp) / 2, msgProcessFailed, VPNINSTALL_EXE_FILENAME);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:15179:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
UINT AdminCheckPassword(CEDAR *c, void *random, void *secure_password, char *hubname,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:15207:53:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			SecurePassword(check, c->Server->HashedPassword, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:15250:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			SecurePassword(check, h->HashedPassword, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:932:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
UINT AdminCheckPassword(CEDAR *c, void *random, void *secure_password, char *hubname, bool accept_empty_password, bool *is_password_empty);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1949:7:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		h = LoadLibrary(BRIDGE_WIN32_PACKET_DLL);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6134:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	BUF *random;
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6142:11:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	WriteBuf(random, sign->Random, SHA1_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6149:67:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			{WINUI_SECURE_SIGN_WITH_KEY, sign->SecurePrivateKeyName, true, random, NULL, NULL, NULL, NULL, NULL}
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:6171:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	FreeBuf(random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:332:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (GetHello(p, ipc->random, &server_ver, &server_build, server_str, sizeof(server_str)) == false)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:125:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	UCHAR random[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:30:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	UCHAR random[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:70:37:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (PackGetData2(p, "auth_random", random, SHA1_SIZE) == false)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:80:51:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	SecurePassword(secure_password, hashed_password, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1041:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	UCHAR random[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1050:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Rand(random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1050:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Rand(random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1075:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		PackAddData(p, "auth_random", random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1075:48:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		PackAddData(p, "auth_random", random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1089:54:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
					SecurePassword(secure_check, n->HashedPassword, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1096:34:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
						SecurePassword(test, test, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:801:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	UCHAR random[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:816:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Copy(random, c->Random, SHA1_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:895:65:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
							SecurePassword(check_secure_old_password, pw->HashedKey, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4135:58:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
bool ClientSecureSign(CONNECTION *c, UCHAR *sign, UCHAR *random, X **x)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4163:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Copy(ss->Random, random, SHA1_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:5685:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	UCHAR random[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:5709:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (GetHello(p, random, &c->ServerVer, &c->ServerBuild, c->ServerStr, sizeof(c->ServerStr)) == false)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:5718:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		Copy(c->Random, random, SHA1_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6426:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
PACK *PackHello(void *random, UINT ver, UINT build, char *server_str)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6439:27:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	PackAddData(p, "random", random, SHA1_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6445:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
bool GetHello(PACK *p, void *random, UINT *ver, UINT *build, char *server_str, UINT server_str_size)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6463:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	if (PackGetData(p, "random", random) == false)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:131:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
PACK *PackHello(void *random, UINT ver, UINT build, char *server_str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:132:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
bool GetHello(PACK *p, void *random, UINT *ver, UINT *build, char *server_str, UINT server_str_size);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:159:58:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
bool ClientSecureSign(CONNECTION *c, UCHAR *sign, UCHAR *random, X **x);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1622:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	UCHAR random[MD5_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1732:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Rand(random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1732:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Rand(random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1741:56:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		encrypted_password = RadiusEncryptPassword(password, random, secret, secret_size);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1795:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			WriteBuf(p, random, 16);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:2298:51:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
BUF *RadiusEncryptPassword(char *password, UCHAR *random, UCHAR *secret, UINT secret_size)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:2339:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			WriteBuf(tmp, random, 16);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:282:51:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
BUF *RadiusEncryptPassword(char *password, UCHAR *random, UCHAR *secret, UINT secret_size);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:352:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void SecurePassword(void *secure_password, void *password, void *random)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:363:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	WriteBuf(b, random, SHA1_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:370:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void GenRandom(void *random)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:378:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Rand(random, SHA1_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:855:58:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
bool SamAuthUserByPassword(HUB *h, char *username, void *random, void *secure_password, char *mschap_v2_password, UCHAR *mschap_v2_server_response_20, UINT *err)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:881:60:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		SecurePassword(secure_password_check, h->SecurePassword, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:907:62:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
						SecurePassword(secure_password_check, auth->HashedKey, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.h:15:58:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
bool SamAuthUserByPassword(HUB *h, char *username, void *random, void *secure_password, char *mschap_v2_password, UCHAR *mschap_v2_server_response_20, UINT *err);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.h:21:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void GenRandom(void *random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.h:22:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
void SecurePassword(void *secure_password, void *password, void *random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:89:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	char random[20], securepass[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:102:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Rand(random,sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:102:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	Rand(random,sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:104:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	SecurePassword(securepass, securepass, random);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:105:41:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	result = AdminCheckPassword(wu->Cedar, random, securepass, hubname, false, NULL);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:620:15:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        this->LoadLibrary( pszModuleName );
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:648:15:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    HINSTANCE LoadLibrary( LPCTSTR pszModuleName )
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:651:24:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        m_hInstLib = ::LoadLibrary( pszModuleName );
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:9008:13:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
				hInst = LoadLibrary("user32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:10132:10:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		hDll = LoadLibrary(MsGetExeFileName());
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:433:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	ret = getenv(name);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:418:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand((UINT)SystemTime64());
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1731:9:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	hDll = LoadLibrary("Wintrust.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1794:9:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	hDll = LoadLibrary("Wintrust.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8753:8:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	UCHAR random[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8763:3:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		random[0] = rand() % 256;
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8764:3:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		random[1] = rand() % 256;
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8765:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		BinToStrW(tmp2, sizeof(tmp2), random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8765:48:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		BinToStrW(tmp2, sizeof(tmp2), random, sizeof(random));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9995:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		HINSTANCE h = LoadLibrary("kernel32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10031:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hKernel32 = LoadLibrary("kernel32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10038:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hAdvapi32 = LoadLibrary("advapi32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10045:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hShell32 = LoadLibrary("shell32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10053:15:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hPsApi = LoadLibrary("psapi.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10057:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		nt->hNewDev = LoadLibrary("newdev.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10066:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		nt->hSetupApi = LoadLibrary("setupapi.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10069:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hSecur32 = LoadLibrary("secur32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10071:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hUser32 = LoadLibrary("user32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10073:17:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hDbgHelp = LoadLibrary("dbghelp.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10075:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hWcmapi = LoadLibrary("wcmapi.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10077:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hDwmapi = LoadLibrary("dwmapi.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10199:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	nt->hWtsApi32 = LoadLibrary("wtsapi32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11989:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	ms->hKernel32 = LoadLibrary("kernel32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12194:10:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		hMsi = LoadLibrary("msi.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9760:24:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	w32net->hIpHlpApi32 = LoadLibrary("iphlpapi.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9761:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	w32net->hIcmp = LoadLibrary("icmp.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:65:6:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	h = LoadLibraryEx(dllname, NULL, flags);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:71:6:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	h = LoadLibraryEx(tmp1, NULL, flags);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:77:6:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	h = LoadLibraryEx(tmp2, NULL, flags);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:83:6:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	h = LoadLibraryEx(tmp3, NULL, flags);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:181:10:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		hDll = LoadLibrary("kernel32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:674:10:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		hDll = LoadLibrary("kernel32.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1651:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL, cmdline, NULL, NULL, FALSE,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1651:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL, cmdline, NULL, NULL, FALSE,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1799:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL, cmdline, NULL, NULL, FALSE,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1799:6:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (CreateProcess(NULL, cmdline, NULL, NULL, FALSE,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2918:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(&fasttick_lock);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:3078:2:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
	InitializeCriticalSection(critical_section);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:3098:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(critical_section);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:3217:2:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
	EnterCriticalSection(&fasttick_lock);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:105:9:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	hDll = LoadLibrary("Wintrust.dll");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:432:9:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
				if (CreateProcess(NULL, cmdline, NULL, NULL, FALSE,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:432:9:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
				if (CreateProcess(NULL, cmdline, NULL, NULL, FALSE,
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c:114:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[256], tmp2[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c:234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c:1291:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t macstr2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Account.c:1307:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char macstr_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:321:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char delimier_str[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:330:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char inc_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:344:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char full_inc_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:363:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:438:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:452:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char url2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:459:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char url2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:487:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:488:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:491:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char relative_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:512:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp3[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:583:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:584:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error_code_str[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:687:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:688:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query_string[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:739:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:740:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query_string[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:799:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t msg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:921:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char key[32], value[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:963:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char password[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:965:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char empty_pw_hash[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:981:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pw_hash[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:984:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hub_name[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1058:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char admin_mode[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char query_string[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1240:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char method_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char id[96];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1470:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ip[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1650:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:1651:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ip[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char my_hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char protocol[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char port_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tag_before_hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name_tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2523:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2592:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2742:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t winver_msg_client[3800];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2743:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t winver_msg_server[3800];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2986:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char logfilename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:2987:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char servername[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3218:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3472:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3664:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3747:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3800:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:3820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4625:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:4965:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5291:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5530:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5680:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:5899:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6038:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6039:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6862:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6863:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6955:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:6956:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7045:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7046:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7136:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7672:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:7729:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char push_routes_str_old[MAX_DHCP_CLASSLESS_ROUTE_TABLE_STR_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8494:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:8599:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_CONNECTION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9961:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:9962:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11080:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:11698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_dir[MAX_PATH], full_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:13914:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:13921:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char plain_pw[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.c:15040:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Title[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dummy1[MAX_HUBNAME_LEN + 1];	// hubname buffer (dummy)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char StrValue[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:45:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t UniStrValue[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerProductName[128];		// Server product name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerVersionString[128];		// Server version string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerBuildInfoString[128];	// Server build information string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerHostName[MAX_HOST_NAME_LEN + 1];	// Server host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerFamilyName[128];			// Family name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PlainTextPassword[MAX_SIZE];	// Plaintext password (for JSON-RPC)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ControllerName[MAX_HOST_NAME_LEN + 1];	// Controller name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MemberPasswordPlaintext[MAX_SIZE];	// Member password (plaintext)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RadiusServerName[MAX_HOST_NAME_LEN + 1];	// Radius server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RadiusSecret[MAX_PASSWORD_LEN + 1];	// Secret key
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:258:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AdminPasswordPlainText[MAX_SIZE];	// Password (plaintext)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];				// Connection name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_SIZE];			// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];				// Connection name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];				// Connection name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:325:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_SIZE];			// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerStr[MAX_SERVER_STR_LEN + 1];	// Server string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:332:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientStr[MAX_CLIENT_STR_LEN + 1];	// Client string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:384:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SubjectName[MAX_SIZE];			// Issued to
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:385:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t IssuerName[MAX_SIZE];			// Issuer
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:415:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:427:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];			// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:433:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:439:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:448:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:455:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:456:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:462:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:463:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t OldAccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Old account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:464:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t NewAccountName[MAX_ACCOUNT_NAME_LEN + 1];	// New account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:470:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:478:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:485:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:492:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:493:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_USERNAME_LEN + 1];				// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:494:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char GroupName[MAX_USERNAME_LEN + 1];			// Group name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:495:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Realname[MAX_SIZE];						// Real name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:496:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Note[MAX_SIZE];							// Note
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:510:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_USERNAME_LEN + 1];				// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:511:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char GroupName[MAX_USERNAME_LEN + 1];			// Group name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:512:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Realname[MAX_SIZE];						// Real name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:513:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Note[MAX_SIZE];							// Note
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:536:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_USERNAME_LEN + 1];				// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:537:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Realname[MAX_SIZE];						// Real name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:538:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Note[MAX_SIZE];							// Note
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_USERNAME_LEN + 1];				// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:547:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Realname[MAX_SIZE];						// Real name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:548:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Note[MAX_SIZE];							// Note
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:564:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:565:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_USERNAME_LEN + 1];				// User or group name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SESSION_NAME_LEN + 1];			// Session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:573:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RemoteHostname[MAX_HOST_NAME_LEN + 1];		// Remote server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:574:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[MAX_USERNAME_LEN + 1];			// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN	+ 1];			// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:600:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SESSION_NAME_LEN + 1];			// Session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:608:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SessionName[MAX_SESSION_NAME_LEN + 1];		// Session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:614:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RemoteHostname[MAX_HOST_NAME_LEN + 1];		// Remote host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:621:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:630:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SessionName[MAX_SESSION_NAME_LEN + 1];		// Session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:638:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RemoteHostname[MAX_HOST_NAME_LEN + 1];		// Remote host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:660:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char KeepConnectHost[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:669:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:670:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t NetworkConnectionName[MAX_SIZE];// Network connection name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:684:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:707:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FileName[MAX_PATH];				// File name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:714:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:722:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];			// L3 switch name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:728:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];			// Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:743:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];			// L3 switch name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:752:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];			// L3 switch name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:760:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];			// L3 switch name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:770:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];			// L3 switch name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:778:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:787:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t CrlInfo[MAX_SIZE];				// Information
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:791:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:799:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:807:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:808:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FilePath[MAX_PATH];				// File Path
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:821:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:822:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FilePath[MAX_PATH];				// File Path
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:840:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char LicenseKey[LICENSE_KEYSTR_LEN + 1];	// License key
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:841:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char LicenseId[LICENSE_LICENSEID_STR_LEN + 1];	// License ID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:842:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char LicenseName[LICENSE_MAX_PRODUCT_NAME_LEN + 1];	// License name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:859:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char EditionStr[LICENSE_MAX_PRODUCT_NAME_LEN + 1];	// Edition name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:877:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:878:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Guid[MAX_SIZE];					// GUID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceInstanceId[MAX_SIZE];		// Device Instance ID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:880:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DriverName[MAX_SIZE];				// Driver file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:881:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DriverType[MAX_SIZE];				// Type of driver
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Admin.h:894:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.c:41:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char opcode[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cipher_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.c:93:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char server_cert_hash_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/AzureClient.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ConnectingAzureIp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[4096];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[4096];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.c:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];	// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.h:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];			// Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Bridge.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];					// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:357:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errbuf[PCAP_ERRBUF_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:803:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:822:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(devname, O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errbuf[PCAP_ERRBUF_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1247:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1258:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open (devname, O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1601:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[CMSG_SPACE(sizeof(struct my_tpacket_auxdata))];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:2456:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char client_mac[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:2457:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char client_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tcpkey[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char short_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char short_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tcpkey[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:391:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:407:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:419:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:492:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char class_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:493:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char short_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:508:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char device_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:517:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char service_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:528:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char sysname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char keyname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:928:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char simple_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_with_id[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char num[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1501:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1513:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t str[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1545:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char str[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1665:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.c:1847:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.h:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeWin32.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Guid[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:73:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:150:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1037:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE], tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1092:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE], tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1287:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1320:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1321:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1322:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1889:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:1912:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2056:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2073:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2562:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE], *tmp2, *tmp3;
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char default_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2679:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2680:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2731:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char default_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2732:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t default_name_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2771:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char default_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2772:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t default_name_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2810:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char default_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2811:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t default_name_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2863:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2867:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2871:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t default_name[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:2951:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3183:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3185:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3186:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3405:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3448:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char old_pass[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3449:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_pass[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3622:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[2048];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3821:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3822:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3847:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:3982:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:4042:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:4337:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:4423:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:4496:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:5477:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:5531:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:5568:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:5588:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:5619:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:5661:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6025:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6059:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char key_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6060:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t target[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6061:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t workdir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6062:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t args[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6063:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t comment[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6064:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t icon[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6090:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6118:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6185:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6186:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6322:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6345:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char default_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_DEVICE_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6580:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6737:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6818:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6978:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6979:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t issuer[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6980:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t subject[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:6981:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t expires[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7248:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7249:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7269:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7668:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cert[MAX_SECURE_DEVICE_FILE_LEN + 1], priv[MAX_SECURE_DEVICE_FILE_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7937:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char http_header[HTTP_CUSTOM_HEADER_MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:7944:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[HTTP_CUSTOM_HEADER_MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8160:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8321:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8379:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char password[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8442:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8502:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char password[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8544:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pass[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8571:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8625:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char password[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8703:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pass[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:8743:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_name[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9146:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9176:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9206:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9250:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9503:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9504:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9505:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vv[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9729:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9825:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9839:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:9970:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t winver_msg_client[3800];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10006:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tag[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10579:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10580:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t new_inserted_item[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10660:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10661:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10662:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10663:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10665:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10914:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10915:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t mac[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10916:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t ver[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:10917:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:11085:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:11630:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:11946:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t server_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:11947:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char password[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:12012:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t server_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:12246:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:12601:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char key_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:12602:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								wchar_t target[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:12604:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								wchar_t args[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:12605:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								wchar_t commentW[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CM.c:12606:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								wchar_t icon[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:61:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t StatudBar1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:62:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t StatudBar2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:63:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t StatudBar3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:98:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t EasyLastSelectedAccountName[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:109:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];		// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:116:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];		// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char old_server_name[MAX_HOST_NAME_LEN + 1];	// Old server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[MAX_USERNAME_LEN + 1];	// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Host[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyHostName[MAX_HOST_NAME_LEN + 1];	// Proxy server host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyUsername[MAX_USERNAME_LEN + 1];	// Proxy server user name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/CMInner.h:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyPassword[MAX_USERNAME_LEN + 1];	// Proxy server password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dt[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:1265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_PATH] = "/etc/services";
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:1426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.c:1427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.h:911:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FileName[MAX_PATH];		// File name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.h:970:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentDDnsFqdn[MAX_SIZE];	// FQDN of the current DDNS
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.h:971:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char OpenVPNPublicPorts[MAX_SIZE];	// OpenVPN public UDP port list
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Cedar.h:974:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentRegion[128];		// Current region
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:1075:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:1076:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:1320:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t account_name[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:1342:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:1359:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:1515:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char function[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:2779:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:2842:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:4984:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t title[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5361:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:5804:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[sizeof(s->IpcSessionShared->ProtocolDetails)];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7403:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:7661:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8065:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8348:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:8959:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9579:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char user_agent[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:9721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10010:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10019:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10064:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10114:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.c:10371:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];					// Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char KeepConnectHost[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientProductName[128];		// Client product name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientVersionString[128];		// Client version string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientBuildInfoString[128];	// Build client information string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientId[128];					// Client OD
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Password[MAX_PASSWORD_LEN + 1];	// Password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:127:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SubjectName[MAX_SIZE];			// Issued to
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:128:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t IssuerName[MAX_SIZE];			// Issuer
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Manufacturer[MAX_SIZE];			// Manufacturer
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:205:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MacAddress[MAX_SIZE];				// MAC address
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Version[MAX_SIZE];					// Version
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FileName[MAX_SIZE];				// Driver file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Guid[MAX_SIZE];					// GUID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:216:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MacAddress[MAX_SIZE];				// MAC address
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MacAddress[MAX_SIZE];				// MAC address
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Version[MAX_SIZE];					// Version
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:251:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UserName[MAX_USERNAME_LEN + 1];	//  User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_DEVICE_NAME_LEN + 1];	// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyName[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];		// Virtual HUB name (Ver 3.0 or later)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:278:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:284:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t OldName[MAX_ACCOUNT_NAME_LEN + 1];		// Old name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:285:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t NewName[MAX_ACCOUNT_NAME_LEN + 1];		// New Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:291:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:307:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:313:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerProductName[MAX_SIZE];		// Server product name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CipherName[32];					// Cipher algorithm name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProtocolName[64];					// Protocol name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UnderlayProtocol[64];				// Physical communication protocol
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProtocolDetails[256];				// Protocol details
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SessionName[MAX_SESSION_NAME_LEN + 1];	// Session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ConnectionName[MAX_CONNECTION_NAME_LEN + 1];	// Connection name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Client.h:428:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientId[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:378:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:410:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:477:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:478:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:656:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:776:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:777:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:885:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:886:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:1009:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:1356:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:1424:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:1547:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:1548:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:1680:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:1971:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2002:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char target_host[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2038:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buffer[TRAFFIC_VER_STR_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2077:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE], tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2341:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2360:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2361:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2362:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2875:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:2876:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3012:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3167:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3168:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3383:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3384:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3385:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3497:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3681:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3900:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3901:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t mac[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3902:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t ver[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3993:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3994:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3995:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:3997:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:4221:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5034:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[HTTP_CUSTOM_HEADER_MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:5179:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t unistr[HTTP_CUSTOM_HEADER_MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6643:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6702:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6744:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6769:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:6813:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7088:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prompt[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7243:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:7280:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8015:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp0[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8016:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8017:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8018:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8019:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8020:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp5[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8021:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp6[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8022:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp7[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8023:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp8[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8088:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8089:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8116:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8127:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8213:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8553:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[4096];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8878:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:8903:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9000:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9029:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9072:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9073:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9074:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t datetime[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9102:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9246:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9298:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9299:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t nic[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9300:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t hub[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9450:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9474:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9569:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9722:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE], *tmp2, tmp3[64], tmp4[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9951:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9952:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9953:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:9985:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10005:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10027:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10055:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10167:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10168:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10169:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10170:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10354:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10370:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_PATH], tmp2[128], tmp3[128], tmp4[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10371:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10452:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10847:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t name[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10848:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t s1[64], s2[64], s3[64], s4[64], s5[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10849:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t s6[64], s7[128], s8[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10850:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t s9[64], s10[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:10935:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11314:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11491:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11563:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11658:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:11668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12231:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12232:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12476:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12477:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12478:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12479:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12694:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:12747:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13612:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[HTTP_CUSTOM_HEADER_MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:13760:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t unistr[HTTP_CUSTOM_HEADER_MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14532:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14537:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t value_str[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14539:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp2[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14585:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14586:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14587:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name1[64], name2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14589:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t policy_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14641:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14663:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14664:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14665:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pack_name[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14845:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14846:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:14847:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vv[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15507:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:15578:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16049:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16050:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16051:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16052:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16053:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16351:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16352:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t group[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16353:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t num[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16354:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t time[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16355:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t exp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16356:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t num1[64], num2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16423:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16656:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:16715:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17634:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17635:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17863:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:17864:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char groupname[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18272:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18274:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18275:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18276:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18277:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18278:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp7[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18279:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp8[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18394:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18497:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18498:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18657:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18658:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp0[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18659:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18660:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18661:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18662:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18663:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18664:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18819:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18820:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp0[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18821:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18822:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18823:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18824:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:18825:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19036:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19106:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19297:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19568:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp0[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19570:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19571:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19572:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19573:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19574:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19575:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp7[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19576:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp8[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19578:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char v1[128], v2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:19696:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20017:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp0[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20018:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20019:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20020:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20021:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20022:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20023:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20096:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20097:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20244:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20245:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20394:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20696:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20697:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20707:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20708:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20718:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20719:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:20784:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[32], *tmp2, tmp3[MAX_SIZE], tmp4[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21039:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[sizeof(t.StrValue)];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21067:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21068:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sizestr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21302:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21446:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t id[MAX_SIZE], hubname[MAX_SIZE], username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21500:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21501:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21736:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:21781:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22007:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[32], tmp2[LICENSE_KEYSTR_LEN + 1], tmp3[LICENSE_MAX_PRODUCT_NAME_LEN + 1],
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22050:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22118:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t dtstr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22131:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t dtstr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22220:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22229:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22248:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22527:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22535:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t buf[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22673:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char description_str_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22786:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[4];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22787:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22945:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[2]=L"*";
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22993:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE*4];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:22994:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t fmtbuf[MAX_SIZE*4];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23207:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23276:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23386:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char vv[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23548:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23549:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vv[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23871:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23892:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:23893:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:24004:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.c:24424:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t def_filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Command.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Host[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_name[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:709:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sign[4];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:1316:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:2890:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pcname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.c:2907:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];			// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SecurePublicCertName[MAX_SECURE_DEVICE_FILE_LEN + 1];	// Secure device certificate name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SecurePrivateKeyName[MAX_SECURE_DEVICE_FILE_LEN + 1];	// Secure device secret key name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:60:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];			// Connection setting name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];					// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyName[MAX_HOST_NAME_LEN + 1];					// Proxy server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyUsername[PROXY_MAX_USERNAME_LEN + 1];			// Maximum user name length
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyPassword[PROXY_MAX_PASSWORD_LEN + 1];			// Maximum password length
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CustomHttpHeader[HTTP_CUSTOM_HEADER_MAX_SIZE + 1];	// Custom HTTP proxy header
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];						// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_DEVICE_NAME_LEN + 1];				// VLAN device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[MAX_USERNAME_LEN + 1];			// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PlainPassword[MAX_PASSWORD_LEN + 1];		// Password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SecurePublicCertName[MAX_SECURE_DEVICE_FILE_LEN + 1];	// Secure device certificate name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SecurePrivateKeyName[MAX_SECURE_DEVICE_FILE_LEN + 1];	// Secure device secret key name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerStr[MAX_SERVER_STR_LEN + 1];	// Server string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientStr[MAX_CLIENT_STR_LEN + 1];	// Client string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientHostname[MAX_HOST_NAME_LEN + 1];	// Client host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Connection.h:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char InProcPrefix[64];			// Prefix
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:14:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:113:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:130:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:202:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[128], tmp2[128], tmp3[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[160];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:669:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:689:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:731:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:768:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:795:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:817:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:827:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:855:8:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							wchar_t tmp[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1058:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char oname[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1119:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1232:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1263:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:2146:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:2155:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:2168:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:2182:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:2337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine_key_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key_hash_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:409:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char current_azure_ip[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char add_header_name[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:413:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char add_header_value[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:563:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char snat_t[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:564:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char current_region[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:581:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cert_hash[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.c:693:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentHostName[DDNS_MAX_HOSTNAME + 1];	// Current host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentFqdn[MAX_SIZE];				// Current FQDN
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DnsSuffix[MAX_SIZE];				// DNS suffix
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentIPv4[MAX_SIZE];				// Current IPv4 address
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentIPv6[MAX_SIZE];				// Current IPv6 address
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char LastMyIPv4[MAX_SIZE];				// Self IPv4 address that were acquired on last
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char LastMyIPv6[MAX_SIZE];				// Self IPv6 address that were acquired on last
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentAzureIp[MAX_SIZE];			// IP address of Azure Server to be used
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentAzureSignature[MAX_SIZE];	// Signature to be presented to the Azure Server
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AzureCertHash[MAX_SIZE];			// Azure Server certificate hash
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NewHostname[DDNS_MAX_HOSTNAME + 1];	// Host name after the change
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:114:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t ErrStr_IPv4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:115:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t ErrStr_IPv6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentHostName[DDNS_MAX_HOSTNAME + 1];	// Current host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentFqdn[MAX_SIZE];				// Current FQDN
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DnsSuffix[MAX_SIZE];				// DNS suffix
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentIPv4[MAX_SIZE];				// Current IPv4 address
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentIPv6[MAX_SIZE];				// Current IPv6 address
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentAzureIp[MAX_SIZE];			// IP address of Azure Server to be used
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentAzureSignature[MAX_SIZE];	// Signature to be presented to the Azure Server
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/DDNS.h:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AzureCertHash[MAX_SIZE];			// Azure Server certificate hash
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:280:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:300:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[32], tmp2[LICENSE_KEYSTR_LEN + 1], tmp3[LICENSE_MAX_PRODUCT_NAME_LEN + 1],
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:434:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:502:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass1[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:503:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:661:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:676:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:893:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:985:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t msg[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EM.c:1057:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t temp_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EMInner.h:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];			// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];			// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];			// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/EtherLog.h:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];			// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:11:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char vgs_ua_str[9] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char radius_servers[MAX_PATH] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char radius_secret[MAX_PATH] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char radius_suffix_filter[MAX_PATH] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:795:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:796:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip[64], mask[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1173:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[2048];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1185:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1198:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t uni[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1211:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t uni[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1224:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t uni[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1353:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1806:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1807:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1808:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1964:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mac[MAX_SIZE], mask[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:1972:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mac[MAX_SIZE], mask[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2568:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char html[MAX_REDIRECT_URL_LEN * 2 + 1 + MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2569:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header[MAX_REDIRECT_URL_LEN * 2 + 1 + MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2570:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char redirect_url2[MAX_REDIRECT_URL_LEN * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char secret[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2585:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2619:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hash_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:2780:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char redirect_url[MAX_REDIRECT_URL_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3229:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3844:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip1[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3845:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:3846:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char mac[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4079:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char mac_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4129:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char mac_address[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4213:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char mac_address[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4223:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char mac_address[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4234:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char mac_address[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4402:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4444:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_address[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4467:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_address[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4468:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char mac_str[48];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4531:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4578:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4620:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_address[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4645:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_address[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4646:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char mac_str[48];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:4667:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5461:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip1[64], ip2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5490:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip1[128], ip2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5629:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip1[64], ip2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5654:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ip1[128], ip2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5748:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char dhcp_mac_addr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5749:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char dest_mac_addr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5750:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char dest_ip_addr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:5751:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char server_ip_addr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6782:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6783:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6810:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6811:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6887:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char packet_logger_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6888:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:6889:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char safe_hub_name[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:7181:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.c:7182:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:217:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Note[MAX_ACCESSLIST_NOTE_LEN + 1];	// Note
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:234:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SrcUsername[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DestUsername[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RedirectUrl[MAX_REDIRECT_URL_LEN + 1];	// URL to redirect to
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[MAX_USERNAME_LEN + 1];	// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UsernameReal[MAX_USERNAME_LEN + 1];	// Real user name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char GroupName[MAX_USERNAME_LEN + 1];	// Group name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SessionName[MAX_SESSION_NAME_LEN + 1];	// Session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_ADMIN_OPTION_NAME_LEN + 1];	// Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:290:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Descrption[MAX_SIZE];				// Descrption
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Filename[MAX_PATH];			// File name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RadiusSuffixFilter[MAX_SIZE];	// Radius suffix filter
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Hub.h:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RadiusRealm[MAX_SIZE];			// Radius realm (optional)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.c:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char macstr[30];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProtocolDetails[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Postfix[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UserName[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Password[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientHostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CryptName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UserName[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Password[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientHostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SessionName[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ConnectionName[MAX_CONNECTION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/IPC.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MsChapV2_PPPUsername[MAX_SIZE];	// MS-CHAPv2 Username
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.c:1240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Layer3.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];	// Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Link.c:17:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Listener.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Listener.c:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dirname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bs[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bs[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:456:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:478:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:500:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:518:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:540:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:541:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:578:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:594:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:614:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t prefix[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:615:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf2[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:616:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:617:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:643:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t prefix[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:644:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf2[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:646:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:700:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:701:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf2[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:702:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipstr[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:733:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:948:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1348:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char src_mac[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1349:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char src_ip[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1351:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char dst_ip[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1372:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char src_mac[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1373:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char src_ip[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1375:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char dst_ip[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1480:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char ip1[64], ip2[64], ip3[64], ip4[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1575:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char info[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1637:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1656:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1678:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1685:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1694:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1904:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:1951:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2237:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tag[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char current_file_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char current_logfile_datename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2555:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2729:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char time_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.c:2730:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SrcPhysicalIP[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DestPhysicalIP[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char LastStr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Logging.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HostName[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:244:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp0[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:245:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:246:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:247:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:248:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:249:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:393:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp0[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:395:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:396:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:397:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:398:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:399:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:400:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp7[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:401:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp8[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:403:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char v1[128], v2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:548:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:604:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char vv[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:643:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:693:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:737:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:1104:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:1105:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:1290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NM.c:1440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_address[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_address[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1504:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_address[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.c:1544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_address[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];			// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NatProductName[128];					// Server product name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NatVersionString[128];					// Server version string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NatBuildInfoString[128];				// Server build information string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NatHostName[MAX_HOST_NAME_LEN + 1];	// Server host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SrcHost[MAX_HOST_NAME_LEN + 1];		// Source host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DestHost[MAX_HOST_NAME_LEN + 1];		// Destination host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];			// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];		// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Nat.h:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];			// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:491:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char cmdline[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:507:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cmdline[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:560:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char cmdline[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:604:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cmdline[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:701:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str1[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:702:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:703:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mark_str1[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:704:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mark_str2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.c:809:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char current_chain[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_SIZE];		// Ethernet device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Chain[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NativeStack.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ConditionAndArgs[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/NullLan.c:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto.c:7:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t message[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char client_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CryptName[MAX_SIZE];					// Cipher algorithm name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientId[MAX_SIZE];					// Client ID has been presented by the IPsec connection
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_EtherIP.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VendorName[MAX_SIZE];					// Vendor name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:992:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char crypt_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:1111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:1112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:2232:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
														char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:2604:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:2706:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:3070:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:3515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:4255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:4256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:4481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.c:4482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.h:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientId[128];							// ID presented by the client
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Secret[MAX_SIZE];						// Secret value of the authentication is successful
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.h:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Secret[MAX_SIZE];						// Secret value of the authentication is successful
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IKE.h:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Secret[MAX_SIZE];						// Pre-shared key
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char IPsec_Secret[MAX_SIZE];				// IPsec pre-shared key
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.h:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char L2TP_DefaultHub[MAX_SIZE];				// Default Virtual HUB name for L2TP connection
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Id[MAX_SIZE];							// ID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];			// Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UserName[MAX_USERNAME_LEN + 1];		// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IPsec.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Password[MAX_USERNAME_LEN + 1];		// Password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.c:1266:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.c:1267:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char subnetstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.c:1281:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.c:1282:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char subnetstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.c:2082:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char space[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_IkePacket.h:322:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char StrData[128];							// Data of the result of converting to a string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:1569:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:1574:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:1719:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:1887:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char crypt_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.c:2007:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.h:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HostName[MAX_SIZE];					// Destination host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.h:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VendorName[MAX_SIZE];					// Destination vendor name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_L2TP.h:222:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CryptName[MAX_SIZE];					// Cipher algorithm name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:252:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t prefix[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:253:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf2[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:907:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:933:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char opt_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:1345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lowercase_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2093:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2094:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2320:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char option_str[4096];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2321:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char l3_options[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2338:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_client[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2339:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_subnet_mask[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2340:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_dns1[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2341:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_dns2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2342:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_wins1[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2343:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_wins2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2344:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char ip_defgw[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2379:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2391:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2403:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2415:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.c:2427:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
										char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char OptionString[512];								// Option string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[512];									// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Password[512];									// Password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.h:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PeerInfo[1536];								// PeerInfo
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.h:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Proto[64];										// Protocol
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_OpenVPN.h:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PushReplyStr[MAX_SIZE];						// PUSH_REPLY string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipstr1[128], ipstr2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:506:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1033:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hex[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1034:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ret_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1070:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hex[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1071:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char ret_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addrStr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prevAddrStr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1480:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char username[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1481:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char password[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1499:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char id[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1500:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char hub[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1692:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char server_ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1693:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char subnet_str[64], defgw_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1694:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char dns1_str[64], dns2_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1695:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char wins1_str[64], wins2_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1764:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char client_ip_str[64], server_ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1765:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char subnet_str[64], defgw_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1766:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char dns1_str[64], dns2_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1767:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char wins1_str[64], wins2_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1812:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char client_ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1813:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char subnet_str[64], defgw_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1814:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dns1_str[64], dns2_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:1815:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char wins1_str[64], wins2_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2753:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip_tmp[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username_tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2761:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2762:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hub[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2763:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char password[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2764:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_challenge_hex[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2765:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_challenge_hex[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2766:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_response_hex[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2767:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eap_client_hex[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:2996:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3743:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char token1[MAX_SIZE];	// username
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char token2[MAX_SIZE];	// hub_name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3745:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3902:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:3903:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char domainname2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.c:4033:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.h:265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Postfix[MAX_SIZE];				// Postfix of the session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.h:266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientHostname[MAX_SIZE];		// Client host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.h:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientSoftwareName[MAX_SIZE];	// Client software name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_PPP.h:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CryptName[MAX_SIZE];			// Cipher algorithm name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_SSTP.c:74:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *header_str, date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_SSTP.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientHostName[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_SSTP.h:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientCipherName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_Win7.c:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sys_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_Win7.c:264:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char src_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Proto_Win7.c:301:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t sys_filename_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:57:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t dirname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:58:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t exedir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:78:8:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:96:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:105:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t fn[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:106:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char hex_a[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:107:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t hex[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:109:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:357:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dirname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:358:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exedir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:384:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:558:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:559:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:738:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:775:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip[128], server_ip[128], proxy_ip[128], unique_id[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:802:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:803:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:844:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1044:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1061:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username_real[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1062:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char method[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1063:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1064:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1065:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char groupname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sessionname[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ctoken_hash_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[20];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1409:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1428:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char plain_password[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1480:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1609:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip1[64], ip2[64], verstr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1649:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char password_tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1665:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1666:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1667:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1668:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:1670:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char psk[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:2021:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3009:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3069:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t winver_msg_client[3800];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3070:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t winver_msg_server[3800];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3128:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char local_name[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3129:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t local_name_2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3130:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char local_name_3[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3198:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3578:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3743:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t namew[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:3744:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char namea[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char session_name[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4390:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char connection_name[MAX_CONNECTION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:4563:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[20];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6072:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_HOST_NAME_LEN];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6229:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6274:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.c:6585:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cn_username[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_PATH];		// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FamilyName[MAX_SIZE];		// Product family name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SoftwareName[MAX_SIZE];	// Software Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:56:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SoftwareTitle[MAX_SIZE];	// Software display name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientId[128];				// Client ID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Protocol.h:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MyLanguage[MAX_SIZE];		// My language
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:931:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char tmp_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:947:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char tmp[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:1633:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char client_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:2021:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:2051:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char tmp_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.c:2070:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char tmp[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Chap_Name[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Chap_Name[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Message[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SharedSecret[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientIpStr[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CalledStationStr[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:236:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char In_VpnProtocolState[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NasId[RADIUS_MAX_NAS_ID_LEN + 1];	// NAS-Identifier
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Out_VirtualMacAddress[6];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Radius.h:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char In_VpnProtocolState[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Remote.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char func_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Remote.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// Managing HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Remote.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];			// RPC session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Remote.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VpnServerHubName[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Remote.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VpnServerClientName[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:596:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE * 4];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:597:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t ipv4[MAX_SIZE], ipv6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:630:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE * 4];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:682:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fqdn[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:695:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char cn[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:733:12:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
											wchar_t defname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:811:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[20];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:812:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char encodedkey[20 * 4 + 32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:987:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1058:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1114:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1115:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char safe_hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:1630:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t id[MAX_SIZE], hubname[MAX_SIZE], username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2260:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp0[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2261:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2262:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2264:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2265:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2760:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2805:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:2868:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t fullname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3572:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3628:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3824:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3844:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[32], tmp2[LICENSE_KEYSTR_LEN + 1], tmp3[LICENSE_MAX_PRODUCT_NAME_LEN + 1],
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3931:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t dtstr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3944:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t dtstr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:3953:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t dtstr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4073:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4179:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4204:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t def[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4214:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4249:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char size1[64], size2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4403:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_PATH], tmp2[128], tmp3[128], tmp4[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4404:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4569:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4672:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp1[MAX_SIZE], tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4705:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4808:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:4894:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[32], *tmp2, tmp3[MAX_SIZE], tmp4[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5270:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:5421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6465:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6466:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6467:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6468:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:6863:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE], *tmp2, tmp3[64], tmp4[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7063:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7076:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7082:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7227:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7228:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7392:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7393:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7415:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7563:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7760:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t ncname[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7856:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7907:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7908:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t nic[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7909:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t hub[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nic[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7936:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hub[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7951:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t nctmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:7963:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t ncname[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8108:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8183:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t temp_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8573:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t cn[MAX_SIZE], o[MAX_SIZE], ou[MAX_SIZE], c[MAX_SIZE], st[MAX_SIZE], l[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char serial[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8750:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8833:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8834:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8901:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8902:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8903:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8904:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8905:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:8906:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9063:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9064:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9136:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9137:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9138:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9139:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9140:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9141:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9396:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9398:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9399:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9400:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp5[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9401:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp6[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9402:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp7[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9403:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp8[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9555:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9621:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9622:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9688:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9689:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:9836:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10466:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10467:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10468:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10469:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10637:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10826:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:10827:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11000:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11056:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11077:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mac[MAX_SIZE], mask[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mac[MAX_SIZE], mask[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_REDIRECT_URL_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_REDIRECT_URL_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char srcmac[MAX_SIZE], srcmac_mask[MAX_SIZE], dstmac[MAX_SIZE], dstmac_mask[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11308:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t unitmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11364:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11365:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11415:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11416:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:11712:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12366:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12368:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12369:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12370:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12640:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12786:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:12971:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13040:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13041:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13093:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13237:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13411:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13685:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13852:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13869:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:13870:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14154:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14252:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14424:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14425:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14468:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14510:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14511:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t group[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14512:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t num[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14513:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t time[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14514:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t exp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14515:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t num1[64], num2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14651:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14668:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14701:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14727:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:14728:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15072:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15073:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15175:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15310:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15311:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15312:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp3[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15313:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp4[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15314:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp5[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15315:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp6[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15316:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp7[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15317:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp8[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15379:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15380:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15421:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15432:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15585:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PUBLIC_PORT_NUM * 8];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15612:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PUBLIC_PORT_NUM * 8];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15765:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pass[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15886:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15989:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15990:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:15991:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t datetime[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16053:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t caption[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16075:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16151:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16234:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16259:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16271:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16386:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char vv[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16456:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16560:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t default_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16577:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t filename1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16578:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t filename2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16621:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16654:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char default_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16913:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16925:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:16939:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17106:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t subject[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17107:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t issuer[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17108:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t date[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char defcn[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17250:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17415:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17484:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17576:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17803:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17903:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:17904:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vv[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18192:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18279:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t name[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18280:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t s1[64], s2[64], s3[64], s4[64], s5[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18281:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t s6[64], s7[128], s8[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18282:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t s9[64], s10[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18355:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18395:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18424:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18448:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18499:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18557:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18686:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18826:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:18934:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19247:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t update_software_title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19248:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char update_software_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19249:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char server_name_safe[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19250:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char family_name[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19372:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19736:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:19967:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:20143:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:20144:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SM.c:20208:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t new_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:25:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Title[MAX_SIZE];	// Setting Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:57:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Title[MAX_SIZE];	// Title
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentPushRouteStr[MAX_DHCP_CLASSLESS_ROUTE_TABLE_STR_SIZE];	// Current editing push routing table string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_ADMIN_OPTION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CertName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char KeyName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:330:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SMInner.h:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char EditId[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:115:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:155:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char inner_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:254:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t name_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:255:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t src_file_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:269:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t name_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:270:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t src_file_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:365:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exec_filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:385:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t filename_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:386:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:461:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t exe_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:478:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t params[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:480:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:482:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t copy_of_me[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:507:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t lang_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:539:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t srcfilename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:540:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exefilename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:812:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:909:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1141:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1142:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1183:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1304:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t add_param[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1308:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char new_lang_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char old_lang_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1679:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1691:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1966:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1981:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char svc_title_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:1995:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t svc_exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2042:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t svc_exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2085:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char svc_title_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char svc_description_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2215:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmpa[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char keyname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char keyname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2273:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t setuplog[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2339:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2340:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_setup_exe_fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2341:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_setup_exe_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2342:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_setup_exe_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2343:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_desktop[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2344:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_startmenu[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2345:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_program[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2346:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_app_program[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2347:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_config_program[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2348:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_admin_tools[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2349:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_config_language[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2350:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_startup[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2351:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE], tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2562:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t srcname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2563:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t srcdir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2739:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2750:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t installer_src_exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2751:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t src_cab[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2752:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t vpninstall_exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2753:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char inf_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2754:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char htm_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2763:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ver_major[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2764:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ver_minor[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2765:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ver_build[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char package_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2910:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t account_tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:2974:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3029:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3076:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char svc_title_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3090:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t svc_exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3137:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t svc_exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3178:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3268:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t fullpath_src[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3269:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t fullpath_dst[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3359:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t langfilename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dira[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char svc_title_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3391:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char svc_description_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3404:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3430:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t fullpath2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3475:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3476:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t fullpath2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3499:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t wtmp[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3559:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char svc_description_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3581:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3582:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t fullcmd[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3600:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3609:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t dst_vpnclient_exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3610:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t vpnclient_arg[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3651:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t tmp_setting_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3652:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char uninstall_keyname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3688:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t uninstall_keyname_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char uninstall_version[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3690:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t dst_setup_exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3691:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t setup_icon[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3692:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t uninstaller_exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3694:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char install_date[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3758:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t log_filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3793:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char keyname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3828:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t msg[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3893:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3894:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t setuplog[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3942:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t lnk_fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3943:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t lnk_dirname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3944:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t target_fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3945:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t target_dirname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:3946:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t icon_fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4061:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char component_name[MAX_SIZE] = { 0 };
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4121:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t value[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4180:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4466:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4471:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t msg[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4521:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char keyname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4650:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4652:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t testname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4692:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4693:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t setuplog[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4817:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmpa[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:4979:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char warning_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5177:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5229:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5636:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t new_param[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5679:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t verstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5680:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ver[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5859:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5867:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5868:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:5932:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:6132:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:6158:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t name_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:6159:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:6397:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t verstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SW.c:6398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ver[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:129:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SrcFileName[MAX_SIZE];		// Original file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:130:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DstFileName[MAX_SIZE];		// Destination file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:131:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SrcDir[MAX_SIZE];			// Source directory
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:132:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DstDir[MAX_SIZE];			// Destination directory
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:140:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t TargetDir[MAX_SIZE];		// Target directory
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:141:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t TargetExe[MAX_SIZE];		// Target EXE file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:142:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t TargetArg[MAX_SIZE];		// Arguments to pass to the target
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:143:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t IconExe[MAX_SIZE];			// Icon EXE file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:145:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DestDir[MAX_SIZE];			// Directory name to be created
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:146:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DestName[MAX_SIZE];			// File name to be created
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:147:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DestDescription[MAX_SIZE];	// Description string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:163:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Path[MAX_PATH];				// Path
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char InnerFileName[MAX_PATH];				// Internal file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:187:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DiskFileName[MAX_PATH];				// File name of the disk
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:194:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t InstallSrc[MAX_SIZE];		// Source directory
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:212:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DefaultInstallDir_System[MAX_PATH];		// Default system installation directory
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:213:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DefaultInstallDir_User[MAX_PATH];		// Default user installation directory
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:217:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t InstallDir[MAX_PATH];		// Destination directory
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:223:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t FinishMsg[MAX_SIZE * 2];	// Completion message
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:224:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Easy_SettingFile[MAX_PATH];	// Connection settings file name of the Simple installer creation kit:
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:225:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Easy_OutFile[MAX_PATH];		// Destination file name of the simple installer creation kit
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:228:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Web_SettingFile[MAX_PATH];	// Connection setting file name for the Web installer creation Kit
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:229:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Web_OutFile[MAX_PATH];		// Destination file name of the Web installer creation Kit
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:232:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t vpncmgr_path[MAX_PATH];		// Path of vpncmgr.exe
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:233:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t auto_setting_path[MAX_PATH];	// Path of automatic connection setting
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SfxMode[MAX_SIZE];				// SFX generation mode
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:236:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SfxOut[MAX_PATH];			// SFX destination
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SWInner.h:237:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t CallerSfxPath[MAX_PATH];	// Calling SFX path
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  buffer[255];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:115:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char  ntlm_timeout[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  requiremember[352];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  answer[300];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:453:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char name_and_realm[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:504:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char radius_server_addr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:506:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char radius_secret[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:507:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char suffix_filter[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:508:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t suffix_filter_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char nt_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:590:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char nt_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:591:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char nt_username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:592:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char nt_groupname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:593:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char nt_domainname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:672:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:741:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:26:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t config_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:27:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:104:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char full_key[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:164:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t sys_fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:167:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_cat[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:168:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_inf[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:169:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:170:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_cat[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:171:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_inf[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:172:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:173:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:314:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_rename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:626:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.c:814:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AdapterId[MAX_PATH];				// Adapter ID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DeviceName[MAX_PATH];				// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Guid[128];							// GUID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];					// Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/SeLowUser.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SortKey[MAX_SIZE];					// Sort key
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[64], tmp2[64], tmp3[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[64], tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:698:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:699:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machinename[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:700:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char datetime[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:881:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:882:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:914:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char dir_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:925:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dir_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:947:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char dir_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:960:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dir_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:974:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:975:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir_full_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:998:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char full_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:999:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char file_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:1679:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:1680:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ct_key[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:1681:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t ct_description[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:1958:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:1959:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t cn[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2774:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2775:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char machine_name2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2916:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2945:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2977:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2989:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hub[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:2990:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nic[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3015:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3082:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char region[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3510:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3581:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3617:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3720:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3753:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:3900:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4066:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t realname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4067:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t note[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4068:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char groupname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4081:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t common_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4084:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4297:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t realname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4298:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t note[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4403:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4483:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4525:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4571:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t cn[MAX_SIZE], org[MAX_SIZE], u[MAX_SIZE], c[MAX_SIZE],
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4573:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4659:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4932:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:4956:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char secret_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:5893:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[6 * MAX_PUBLIC_PORT_NUM + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6052:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6184:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6210:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[6 * MAX_PUBLIC_PORT_NUM + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:6303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7000:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7057:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char public_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7082:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char client_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7296:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7654:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7655:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7703:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filepath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7731:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7789:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7815:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7841:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7886:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:7976:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8002:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8003:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8004:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char groupname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8005:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char realusername[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sessionname[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8009:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ticket_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8090:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8614:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char hubname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8827:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SESSION_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8828:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hub_name_upper[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8829:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char user_name_upper[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:8830:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ticket_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hubname[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9610:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9791:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:9818:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char taskname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.c:10614:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char region[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_HUBNAME_LEN + 1];		// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char TaskName[MAX_PATH];			// Task name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HostName[MAX_PATH];			// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ControllerName[MAX_HOST_NAME_LEN + 1];		// Controller name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];				// HUB Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SESSION_NAME_LEN + 1];			// Session name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:284:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[MAX_USERNAME_LEN + 1];			// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RealUsername[MAX_USERNAME_LEN + 1];		// Real user name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:286:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char GroupName[MAX_USERNAME_LEN + 1];			// Group name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientHostName[MAX_HOST_NAME_LEN + 1];		// Client host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Path[MAX_PATH];				// Path name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Server.h:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:1446:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2048:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2049:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hub_name_upper[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2050:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char user_name_upper[MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2131:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pc_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.c:2173:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char machine[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientProductName[64];		// Client product name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerProductName[64];		// Server product name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientOsName[64];			// Client OS name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientOsVer[128];			// Client OS version
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientOsProductId[64];		// Client OS Product ID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientHostname[64];		// Client host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerHostname[64];		// Server host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyHostname[64];			// Proxy host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[64];				// HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Padding[304 - (16 * 3)];	// Padding
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientIP[64];				// Client IP
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:143:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UserNameReal[MAX_USERNAME_LEN + 1];	// User name (real)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char GroupName[MAX_USERNAME_LEN + 1];	// Group name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SessionKeyStr[64];			// Session key string
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UnderlayProtocol[64];		// Physical communication protocol
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProtocolDetails[256];		// Protocol details
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FirstTimeHttpRedirectUrl[128];	// URL for redirection only the first time
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[MAX_USERNAME_LEN + 1];	// User name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:238:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Password[MAX_PASSWORD_LEN + 1];	// Password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:263:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_SIZE];	// Connection setting name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NicName[MAX_SIZE];			// Virtual NIC name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:277:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:291:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];	// Account name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Session.h:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_HOST_NAME_LEN + 1];	// Server name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UT.c:59:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UT.c:60:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UT.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UT.c:189:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UdpAccel.c:804:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UdpAccel.c:846:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UdpAccel.c:1034:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/UdpAccel.c:1062:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:325:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char instance_name_lower[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tap_name[MAX_SIZE], tap_path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:357:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:367:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(TAP_FILENAME_1, O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:371:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = open(TAP_FILENAME_2, O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:381:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tap_path + StrLen(TAP_DIR TAP_NAME), "%d", i);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:382:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(tap_path, O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:486:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		tun_fd = open(tap_name, O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:494:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ip_fd = open("/dev/ip", O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:610:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:668:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char eth_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];		// Device name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:204:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:205:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip_str2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:421:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:670:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:828:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:901:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:1030:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:1200:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:1416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanWin32.c:1417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_upper[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:11:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char v_vgs_hostname[256] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:13:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char secure_nat_target_hostname[MAX_SIZE] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:1293:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:1393:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:1496:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:2602:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:2691:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char client_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:2692:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char dhcp_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:2693:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char client_mask[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:2694:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char gateway_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:2803:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char macstr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:3664:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:4304:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:4362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:5476:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:5982:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6056:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6099:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[17];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6322:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char my_pcname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6484:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:6898:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s1[MAX_SIZE], s2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:9496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char client_mac[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:9497:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char client_ip[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:9608:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char client_mac[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.c:9609:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char client_ip[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.h:297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DhcpDomain[MAX_HOST_NAME_LEN + 1];	// Assigned domain name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.h:318:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HubName[MAX_HUBNAME_LEN + 1];	// Target Virtual HUB name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.h:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DhcpDomainName[MAX_HOST_NAME_LEN + 1];	// Assigned domain name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.h:338:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DhcpPushRoutes[MAX_DHCP_CLASSLESS_ROUTE_TABLE_STR_SIZE];	// DHCP pushing routes
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.h:358:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[256];				// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Virtual.h:367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char random[20], securepass[SHA1_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:159:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t lastlogin[MAX_SIZE], lastcomm[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:265:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:295:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:327:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:401:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:418:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:419:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t datestr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:451:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:452:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t utmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:613:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:679:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:700:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:739:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t *status, expires[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:794:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t expires[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:848:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:896:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1052:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1077:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mac[MAX_SIZE], ip[MAX_SIZE], mask[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dhcpips[MAX_SIZE], dhcpipe[MAX_SIZE], dhcpmask[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char optgw[MAX_SIZE], optdns[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1301:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE] = "|";
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1469:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1479:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1659:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1676:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MD5_SIZE], *ret;
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1738:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE*10];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1748:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WebUI.c:1756:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:57:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:320:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t inf_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:362:8:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							wchar_t dst_inf_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:438:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char display_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:495:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:533:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:554:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t display_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:588:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:775:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Win32Com.cpp:1013:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:35:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cached_pin_code[MAX_SIZE] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_current[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_latest[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:182:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t date_current_str[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:183:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t date_latest_str[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1210:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1435:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1436:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1491:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1572:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1573:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t message[8192];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1719:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char valuename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1836:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exedir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:1856:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2299:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2300:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t exedir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2448:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2510:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2530:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2710:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char class_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2780:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char caption[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2818:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char classname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2819:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char parent_classname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2867:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char classname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2878:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2884:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:2927:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char class_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:3278:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t unidef[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:3305:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:3411:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:3447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:3498:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4260:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4405:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4531:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4570:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sha1_new_str[MAX_SIZE], sha1_old_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char md5_new_str[MAX_SIZE], md5_old_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4598:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sha1_new_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:4599:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char md5_new_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:5268:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t na[2] = {0xff0d, 0x0, };
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:6108:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[1024 * 5];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:6230:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:6249:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:6648:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:6672:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:6877:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:6976:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7253:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7368:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:7428:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:9321:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:9345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:9509:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.c:9677:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char class_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pass[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:202:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t AccountName[MAX_ACCOUNT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:315:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t String[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:328:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cached_pin_code[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nat_t_svc_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ServerName[MAX_SERVER_STR_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:441:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SoftwareTitle[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:442:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SoftwareName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ClientId[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/WinUi.h:447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char RegKey[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_str[WPC_DATA_ENTRY_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entry_name[WPC_DATA_ENTRY_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char size_str[11];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:420:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entry_name[WPC_DATA_ENTRY_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:470:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char size_str[11];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:636:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target[MAX_SIZE * 4];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:641:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char len_str[100];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:802:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char auth_tmp_str[MAX_SIZE], auth_b64_str[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:803:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char basic_str[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1000:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1057:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char name[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE * 3];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.c:1135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server_port[MAX_HOST_NAME_LEN + 16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HostName[MAX_HOST_NAME_LEN + 1];					// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyHostName[MAX_HOST_NAME_LEN + 1];				// Proxy server host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyUsername[MAX_USERNAME_LEN + 1];				// Proxy server user name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyPassword[MAX_USERNAME_LEN + 1];				// Proxy server password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CustomHttpHeader[HTTP_CUSTOM_HEADER_MAX_SIZE + 1];	// Custom HTTP header
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyHostName[MAX_HOST_NAME_LEN + 1];				// Proxy server host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyUsername[MAX_USERNAME_LEN + 1];				// Proxy server user name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProxyPassword[MAX_USERNAME_LEN + 1];				// Proxy server password
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CustomHttpHeader[HTTP_CUSTOM_HEADER_MAX_SIZE + 1];	// Custom HTTP header
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HostName[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HeaderHostName[MAX_HOST_NAME_LEN + 16];	// Host name on the header
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Method[32];						// Method
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Target[MAX_SIZE * 3];				// Target
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Referer[MAX_SIZE * 3];				// Referer
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AdditionalHeaderName[128];			// Additional header name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char AdditionalHeaderValue[MAX_SIZE];	// Additional header value
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SniString[MAX_SIZE];				// SNI String
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Wpc.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char EntryName[WPC_DATA_ENTRY_SIZE];		// Entry name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:24:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dirname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:25:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:26:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:27:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t datestr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:335:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:440:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:441:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t newfile[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:818:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1365:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1812:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.c:1880:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Cfg.h:66:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t LastSavedDateStr[MAX_SIZE];	// Date and time string that last saved
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:91:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char A1[EVP_MAX_MD_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:131:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(out,A1,olen);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:844:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:899:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MD5_SIZE * 3 + 8], tmp2[SHA1_SIZE * 3 + 8];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:900:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp3[sizeof(tmp1) + sizeof(tmp2) + 64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:911:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:912:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:1727:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char alt_dns[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:2057:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[20];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:2141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char century[3] = {0, 0, 0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:2170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char year[3] = {str[0], str[1], 0},
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:2342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errbuf[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:2417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char errbuf[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:2753:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:3757:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.c:4583:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(digest, MY_SHA0_final(&ctx), MY_SHA0_DIGEST_SIZE);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.h:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char issuer_url[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.h:252:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Encrypt.h:263:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:19:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char exe_file_name[MAX_SIZE] = "/tmp/a.out";
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:20:8:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static wchar_t exe_file_name_w[MAX_SIZE] = L"/tmp/a.out";
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:216:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:618:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:691:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:706:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:840:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:841:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_dir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:843:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:973:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:974:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:975:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:977:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header[HAMCORE_HEADER_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1031:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1085:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_dir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1099:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char rpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1399:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1458:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1493:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1528:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1626:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1640:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1641:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t filename_ident[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1709:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1743:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1804:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t fullpath2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1805:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t basepath2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1838:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1839:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t fullpath_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1840:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t basepath_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1865:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1891:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t cd[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1917:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1943:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:1998:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t d[2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2025:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2038:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2039:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2094:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2127:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t dir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2133:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t dir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2144:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2169:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2170:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2226:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2260:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2273:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2444:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2482:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2523:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.c:2573:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.h:24:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t NameW[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/FileIO.h:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:998:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char port_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1462:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char port_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1464:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1518:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1521:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char port_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/HTTP.c:1523:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char host[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:20:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char charset[MAX_SIZE] = "EUCJP";
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:346:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dst[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:916:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:994:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:1219:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:2270:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:2461:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:403:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t drive[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:404:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t hpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:466:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char data_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:537:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:596:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:598:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[11];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:629:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[11];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:682:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:938:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:942:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(tmp, "idle");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:954:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:958:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp, "idle");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1296:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1297:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1451:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str_year[16], str_month[16], str_day[16], str_hour[16], str_minute[16],
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:1527:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:2103:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("abort_error_log.txt", "w");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h:22:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t YearStr[16], MonthStr[16], DayStr[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h:23:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t HourStr[16], MinuteStr[16], SecondStr[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h:24:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DayOfWeek[7][16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h:25:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SpanDay[16], SpanHour[16], SpanMinute[16], SpanSecond[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.h:26:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Unknown[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:213:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:374:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:503:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.c:611:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128], tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Mayaqua.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128]; sprintf(tmp, "%s: %u", __FILE__, __LINE__); Win32DebugAlert(tmp);	\
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Memory.c:2101:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Memory.c:2102:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Memory.c:3929:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, size);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_service_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:163:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:164:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Workstation[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:165:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t Domain[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char system_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kernel32_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subkey[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:213:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmpdir_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:226:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t config_src[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:227:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t config_dst[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:228:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t log_dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:262:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:296:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char log_dst_filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:322:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpdir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rand_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:325:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename_bat[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char full[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:445:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char full[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:465:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t bat_filename[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:466:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t cscript_exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:467:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:709:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char user[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char domain[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:711:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t workstation[MAX_SIZE + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:872:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:873:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:948:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1302:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char exe_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1303:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char arg_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1377:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char exe_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char arg_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1461:8:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static wchar_t ms_computer_name_full_cache[MAX_SIZE] = {0};
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1545:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t cmdline[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1546:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:1986:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2020:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2021:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cscript[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2022:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2025:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2028:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_hash_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2093:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2094:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t hamcore_dst[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2095:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t hamcore_src[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2096:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t lang_config_src[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2097:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t lang_config_dst[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dll_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2286:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp_dll_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2317:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2333:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp_dll_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hash_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2366:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp_dll_name_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2378:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2761:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char title[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:2873:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t title[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3140:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t me_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3141:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t me_path_short[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3164:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char short_path_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char long_path_a[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3382:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3383:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t exe_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3508:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3509:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char wav[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3633:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3645:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3661:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3662:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3679:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3680:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3771:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3772:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t caption[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3790:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3811:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3812:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3813:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t title_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3814:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3912:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3969:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:3984:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char wndclass_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4247:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title_a[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4552:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4574:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4599:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4697:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4792:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4799:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4844:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t vpncmgr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:4845:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:5157:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char cmdline[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:5774:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:5801:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:5862:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6273:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t netsh[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hwid[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6325:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t hwid_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device_title[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device_title_old[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6421:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char keyname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6458:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sysdir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char infdir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6460:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char otherdir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6461:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char syspath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6462:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char syspath2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6463:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char infpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6464:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vpn16[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6465:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char infpath_src[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6466:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char syspath_src[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char neo_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6583:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c1[MAX_SIZE], c2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:6616:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c1[MAX_SIZE], c2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7006:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7049:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7065:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7087:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
												char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src_dir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7482:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t infpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7483:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hwid[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7484:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t hwid_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7486:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char neo_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7569:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char mac_address_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7597:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t inf_class_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7628:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char hwid_copy[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7709:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7871:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char device_id[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:7976:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8052:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8097:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8137:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_inf[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8138:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8139:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dest_inf[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8140:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dest_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8141:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_cat[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8142:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_cat[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_address_str[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_year[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_month[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_day[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_major[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_minor[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str_build[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8298:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_inf[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8299:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8300:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dest_inf[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8301:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dest_sys[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8302:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_cat[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8303:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_cat[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8390:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8411:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char inf_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8426:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sys_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8435:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8484:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_inf_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8485:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_sys_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8486:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dest_inf_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8487:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dest_sys_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8488:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t src_cat_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8489:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dst_cat_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8531:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir_mask[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8577:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t lock_file_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8578:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t dir_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8612:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
									wchar_t full_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8659:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_mask[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8677:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8698:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t file_mask[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8727:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8751:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8752:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8754:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t lockfilename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8778:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char msg[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8798:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t lock_file_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8829:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8830:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netsh[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8888:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8933:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8996:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:8997:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char netsh[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9054:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9073:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9074:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mac_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9255:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9344:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9375:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fullname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9464:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9493:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9559:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9577:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9619:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9637:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9688:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9719:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9776:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_key_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9807:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char instance_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9854:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t password_unicode[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:9879:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char username_ansi[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10692:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:10762:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11682:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11701:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11731:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11764:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11782:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11792:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11805:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11823:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11846:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmpa[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11847:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmpw[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:11971:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12050:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12078:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12093:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12123:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12271:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12316:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.c:12317:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ExeFilename[MAX_PATH];		// EXE file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h:438:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t ExeFilenameW[MAX_PATH];	// EXE file name (Unicode)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h:447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Title[MAX_PATH];			// Display name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h:448:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t TitleW[MAX_PATH];		// Display Name (Unicode)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h:463:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Guid[MAX_SIZE];			// GUID
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h:510:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t ScreenSaveActive[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Microsoft.h:511:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t SCRNSAVE_EXE[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:109:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char current_fqdn[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:433:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:650:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char connect_hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:651:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char connect_hostname2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:655:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char request_str[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1037:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1038:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp_domain[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1228:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1232:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char myip[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1244:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
							char new_hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1349:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char client_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char private_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1461:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char machine_key[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1462:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1464:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ddns_fqdn[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1669:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:1935:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip_str[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4036:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char rand_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4070:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char rand_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4148:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str1[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4149:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char current_hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4789:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4847:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char result_ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:4995:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:5220:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:5538:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:5539:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6838:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6906:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[16];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6936:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6949:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:6979:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ss[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:7091:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[5];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:8407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9023:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9133:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9189:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ps_miniport_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:9289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ps_miniport_str2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10859:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10879:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest_ip[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10880:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest_mask[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:10881:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gateway_ip[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:11404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char machine_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:11405:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:11935:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dirname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:11936:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exedir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:11937:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t txtname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:11973:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:12370:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dirname[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:12371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:12372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dtstr[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:12373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn1[MAX_PATH], fn2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:13006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:13782:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14052:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[1024];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname_original[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hint_str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14666:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14874:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:14883:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15425:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char name_cache[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15428:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15480:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15621:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15622:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip_str[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:15971:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[260];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:16376:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:16399:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:16408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:16651:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:16697:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:18518:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:18612:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:19063:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:19088:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ipstr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:19150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char natt_hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:20292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[256];								// Name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SniHostname[256];		// SNI host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UnderlayProtocol[64];	// Underlying protocol
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ProtocolDetails[256];	// Protocol details
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:325:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HostName[256];						// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HostName[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:382:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Guid[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:531:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_SIZE];			// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:758:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SvcName[MAX_SIZE];				// Service name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:783:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentRegisterHostname[MAX_SIZE];	// The host name of the the current destination of registration
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:797:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NatT_Token[MAX_SIZE];			// Token needed to communicate with NAT-T Server
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:802:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char NatT_Registered_IPAndPort[128];		// IP address and port number at the time of registration success
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:827:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:830:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SvcName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:831:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HintStr[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char TargetHostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:881:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char IfName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.h:1417:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PreverifyErrMessage[PREVERIFY_ERR_MESSAGE_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Object.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_ELEMENT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1391:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1846:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1870:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char dtstr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1926:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1952:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ip_str[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:1976:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char dtstr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:2160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:2230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:2250:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:2251:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.c:2467:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_ELEMENT_NAME_LEN + 1];	// Element name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char JsonHint_GroupName[MAX_ELEMENT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CurrentJsonHint_GroupName[MAX_ELEMENT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.h:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ArrayNumNameInPack[MAX_ELEMENT_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Pack.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ArrayMembersInPack[MAX_SIZE + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target_hostname[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target_hostname_port[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char iptmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char auth_str[MAX_SIZE * 2], auth_b64_str[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.h:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char TargetHostname[MAX_HOST_NAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Username[PROXY_MAX_USERNAME_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Password[PROXY_MAX_PASSWORD_LEN + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HttpCustomHeader[HTTP_CUSTOM_HEADER_MAX_SIZE + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Proxy.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char HttpUserAgent[HTTP_HEADER_USER_AGENT_MAX_SIZE + 1];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp3[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char username[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:148:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:616:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t w_subject[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:617:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t w_issuer[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:740:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char year[32], month[32], day[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:766:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char year[32], month[32], day[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:1228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char label[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:1434:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:1893:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char data[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:2056:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Secure.c:2090:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char pin[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char hex_str[8];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1014:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1015:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1656:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[3];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1680:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:1824:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(&tmp[i * 2], "%02X", buf[i]);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2100:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2565:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(str, "%u", i);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:2583:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3427:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp_names, object->names, object->count * sizeof(char*));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3428:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp_values, object->values, object->count * sizeof(JSON_VALUE*));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3499:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_items, array->items, array->count * sizeof(JSON_VALUE*));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3651:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(resized_output, output, final_size);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3864:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:4450:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num_buf[1100]; /* recursively allocating buffer on stack is a bad idea, so let's do it only once */
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:4488:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num_buf[1100]; /* recursively allocating buffer on stack is a bad idea, so let's do it only once */
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:21:8:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static wchar_t old_table_name[MAX_SIZE] = {0};		// Old table name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char table_name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:169:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char lang[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:555:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:573:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:667:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:989:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1022:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char key[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1023:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1029:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t univalue[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1030:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t uniname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1082:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1083:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t hashstr[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1084:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t hashtemp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1085:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1122:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1184:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1307:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1343:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.c:1368:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t replace_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char StrFileName[256];	// String file name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MachineName[256];	// Machine name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.h:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[32];					// Identifier
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.h:57:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t TitleEnglish[128];		// English notation
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Table.h:58:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t TitleLocal[128];		// Local notation
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1842:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sni[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1937:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:1938:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char value[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:2871:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[257];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:2953:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hostname[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3654:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3758:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3776:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ip_and_mask[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.c:3777:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char gateway[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:543:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Method[32];						// Method
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:544:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1];	// Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:546:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Path[MAX_SIZE];					// Path
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:547:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Protocol[64];						// Protocol
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:548:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UserAgent[MAX_SIZE];				// User Agent value
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:549:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Referer[MAX_SIZE];					// Referer
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:604:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DnsQueryHost[64];				// DNS hostname
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:707:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Hostname[MAX_HOST_NAME_LEN + 1]; // Host name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char UserClass[MAX_USER_CLASS_LEN + 1]; // User class
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/TcpIp.h:717:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char DomainName[MAX_HOST_NAME_LEN + 1];	// Domain name
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:205:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:710:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE * 2];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:719:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.c:721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp3[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Tracking.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FileName[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:42:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    f_fstypename[15]; /* fs type name */
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    f_mntonname[90];  /* directory on which mounted */
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:44:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    f_mntfromname[90];/* mounted filesystem */
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:79:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((*namelist)[i], entry, entrysize);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FileName[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:406:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:435:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:461:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:498:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:540:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:580:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir_a[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:757:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:758:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:779:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(name, O_WRONLY);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:818:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:820:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "/proc/%u/oom_score_adj", getpid());
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:825:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:826:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%u\n", 800);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:1165:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		(void)open("/dev/null", O_RDWR);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:1509:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(name, mode);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2103:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%u\n", UNIX_LINUX_MAX_THREADS);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp1[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2248:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2266:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[64];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2284:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2305:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2411:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2413:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2452:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[256];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2602:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:200:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:277:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:355:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:437:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:438:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:439:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t dirname2[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:494:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t fullpath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name_a[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:631:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dir_a[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:730:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:735:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char exe_path[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:903:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:924:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:931:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:937:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:947:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1507:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t cmdline[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1508:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1603:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1604:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1680:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t cmdline[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1681:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1757:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1758:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1872:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1873:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_dir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1882:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name_a[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1901:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1902:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exe_dir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1921:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1940:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1961:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1964:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:1999:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2002:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2700:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:3324:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:55:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t exe_name_w[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char args[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char error[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:160:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(error, "VPN Command Line Tools is not Installed.\nPlease reinstall programs.");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4096];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:171:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t args[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpndrvinst/vpndrvinst.c:174:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:72:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[2048];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:91:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char instdir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hamcore[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:190:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t arg[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:191:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t exe[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:227:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t filename[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:501:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fullpath[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:502:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char exedir[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:737:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:743:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t filename_w[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.c:1230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Path[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VpnCMgrExeFileName[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:41:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t CurrentInstalledPathW[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SettingPath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:50:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DownloadedSettingPathW[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:51:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DownloadedInstallerPathW[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SrcPath[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char FileName[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpninstall/vpninstall.h:84:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t DestPathW[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/vpntest.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/vpntest.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpntest/vpntest.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:46:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[2048];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:89:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[MAX_PATH];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:173:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:199:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:227:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:236:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmpdir[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:237:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char wintmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:238:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char temp_vpninstaller_exe[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:239:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char temp_vpninstaller_exe_tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:240:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char temp_vpninstaller_inf[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:271:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:301:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:318:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:337:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:377:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:396:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char cmdline[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:419:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char args[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:436:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					wchar_t tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:465:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[MAX_SIZE];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:693:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t tmp[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:912:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[8];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:940:3:  [2] (buffer) CopyMemory:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		CopyMemory(tmp, path, 6);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h:20:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char InstallerExeUrl[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char InstallerInfUrl[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SettingUrl[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VpnServerHostname[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h:25:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VpnServerHubName[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char VpnServerPassword[512];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char LanguageId[32];
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1205:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		rest = read(fd, buf, e->BufSize);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/BridgeUnix.c:1830:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		e->Rest = read(e->Socket, e->Buffer, e->BufSize);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1916:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = getc(stdin);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Console.c:1948:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			c = getc(stdin);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:138:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(domainname) > 255)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:160:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(groupname) > 1)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:198:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (base64_enc_len((unsigned int)strlen(name)) < sizeof(buffer)-1 &&
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:199:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base64_enc_len((unsigned int)strlen(password)) < sizeof(buffer)-1 &&
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:200:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		base64_enc_len((unsigned int)strlen(domainname)) < sizeof(buffer)-1)
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:204:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		unsigned int end = B64_Encode(buffer, name, (int)strlen(name));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:212:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = B64_Encode(buffer, domainname, (int)strlen(domainname));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/Sam.c:223:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = B64_Encode(buffer, password, (int)strlen(password));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Cedar/VLanUnix.c:193:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(v->fd, tmp, sizeof(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:2899:3:  [1] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant character.
		wcscpy(dst, L"");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Internat.c:2951:3:  [1] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant character.
		wcscpy(dst, L"");
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Kernel.c:2106:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fwrite(msg, 1, strlen(msg), f);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:8293:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret = read(p1, tmp, sizeof(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:8301:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret = read(p2, tmp, sizeof(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:8315:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			ret = read(e->pipe_read, tmp, sizeof(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:8469:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		readret = read(event->pipe_read, tmp, sizeof(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Network.c:20321:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			readret = read(fd, tmp, sizeof(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3097:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return (UINT)strlen(str);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:3203:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(output_string, string, n);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Str.c:4064:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return (int)strlen(string);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:76:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	entrysize=sizeof(struct dirent)-sizeof(entry->d_name)+strlen(entry->d_name)+1;
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:409:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	(void)read(solaris_sleep_p1, tmp, sizeof(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:711:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(1000);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:827:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		UnixFileWrite(o, tmp, strlen(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:1380:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ret = read(p->fd, buf, size);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:1894:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(millisec * 1000);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Unix.c:2104:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		UnixFileWrite(o, tmp, strlen(tmp));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/Mayaqua/Win32.c:2719:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s->name = OSMemoryAlloc((UINT)strlen(sym->Name) + 1);
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpncmdsys/vpncmdsys.c:68:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mbstowcs(exe_name_w, exe_name, strlen(exe_name));
data/softether-vpn-5.01.9674+git20200806+8181039+dfsg2/src/vpnweb/vpnwebdlg.c:938:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(path) >= 6)

ANALYSIS SUMMARY:

Hits = 4672
Lines analyzed = 324824 in approximately 6.35 seconds (51128 lines/second)
Physical Source Lines of Code (SLOC) = 247518
Hits@level = [0]  69 [1]  34 [2] 2880 [3] 107 [4] 1650 [5]   1
Hits@level+ = [0+] 4741 [1+] 4672 [2+] 4638 [3+] 1758 [4+] 1651 [5+]   1
Hits/KSLOC@level+ = [0+] 19.1542 [1+] 18.8754 [2+] 18.738 [3+] 7.10251 [4+] 6.67022 [5+] 0.00404011
Dot directories skipped = 3 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.