Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c
Examining data/sqlcipher-3.4.1/ext/async/sqlite3async.c
Examining data/sqlcipher-3.4.1/ext/async/sqlite3async.h
Examining data/sqlcipher-3.4.1/ext/fts1/ft_hash.c
Examining data/sqlcipher-3.4.1/ext/fts1/ft_hash.h
Examining data/sqlcipher-3.4.1/ext/fts1/fts1.c
Examining data/sqlcipher-3.4.1/ext/fts1/fts1.h
Examining data/sqlcipher-3.4.1/ext/fts1/fts1_hash.c
Examining data/sqlcipher-3.4.1/ext/fts1/fts1_hash.h
Examining data/sqlcipher-3.4.1/ext/fts1/fts1_porter.c
Examining data/sqlcipher-3.4.1/ext/fts1/fts1_tokenizer.h
Examining data/sqlcipher-3.4.1/ext/fts1/fts1_tokenizer1.c
Examining data/sqlcipher-3.4.1/ext/fts1/fulltext.c
Examining data/sqlcipher-3.4.1/ext/fts1/fulltext.h
Examining data/sqlcipher-3.4.1/ext/fts1/simple_tokenizer.c
Examining data/sqlcipher-3.4.1/ext/fts1/tokenizer.h
Examining data/sqlcipher-3.4.1/ext/fts2/fts2.c
Examining data/sqlcipher-3.4.1/ext/fts2/fts2.h
Examining data/sqlcipher-3.4.1/ext/fts2/fts2_hash.c
Examining data/sqlcipher-3.4.1/ext/fts2/fts2_hash.h
Examining data/sqlcipher-3.4.1/ext/fts2/fts2_icu.c
Examining data/sqlcipher-3.4.1/ext/fts2/fts2_porter.c
Examining data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer.c
Examining data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer.h
Examining data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer1.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3.h
Examining data/sqlcipher-3.4.1/ext/fts3/fts3Int.h
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_aux.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_hash.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_hash.h
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_icu.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_porter.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_term.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_test.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_tokenize_vtab.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.h
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer1.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_unicode.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_unicode2.c
Examining data/sqlcipher-3.4.1/ext/fts3/fts3_write.c
Examining data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5.h
Examining data/sqlcipher-3.4.1/ext/fts5/fts5Int.h
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_aux.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_buffer.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_config.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_hash.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_index.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_main.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_storage.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_tcl.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_test_mi.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_test_tok.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_unicode2.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_varint.c
Examining data/sqlcipher-3.4.1/ext/fts5/fts5_vocab.c
Examining data/sqlcipher-3.4.1/ext/icu/icu.c
Examining data/sqlcipher-3.4.1/ext/icu/sqliteicu.h
Examining data/sqlcipher-3.4.1/ext/misc/amatch.c
Examining data/sqlcipher-3.4.1/ext/misc/carray.c
Examining data/sqlcipher-3.4.1/ext/misc/closure.c
Examining data/sqlcipher-3.4.1/ext/misc/compress.c
Examining data/sqlcipher-3.4.1/ext/misc/csv.c
Examining data/sqlcipher-3.4.1/ext/misc/eval.c
Examining data/sqlcipher-3.4.1/ext/misc/fileio.c
Examining data/sqlcipher-3.4.1/ext/misc/fuzzer.c
Examining data/sqlcipher-3.4.1/ext/misc/ieee754.c
Examining data/sqlcipher-3.4.1/ext/misc/json1.c
Examining data/sqlcipher-3.4.1/ext/misc/memvfs.c
Examining data/sqlcipher-3.4.1/ext/misc/nextchar.c
Examining data/sqlcipher-3.4.1/ext/misc/percentile.c
Examining data/sqlcipher-3.4.1/ext/misc/regexp.c
Examining data/sqlcipher-3.4.1/ext/misc/rot13.c
Examining data/sqlcipher-3.4.1/ext/misc/scrub.c
Examining data/sqlcipher-3.4.1/ext/misc/series.c
Examining data/sqlcipher-3.4.1/ext/misc/showauth.c
Examining data/sqlcipher-3.4.1/ext/misc/spellfix.c
Examining data/sqlcipher-3.4.1/ext/misc/totype.c
Examining data/sqlcipher-3.4.1/ext/misc/vfslog.c
Examining data/sqlcipher-3.4.1/ext/misc/vfsstat.c
Examining data/sqlcipher-3.4.1/ext/misc/vtshim.c
Examining data/sqlcipher-3.4.1/ext/misc/wholenumber.c
Examining data/sqlcipher-3.4.1/ext/rbu/rbu.c
Examining data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c
Examining data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.h
Examining data/sqlcipher-3.4.1/ext/rbu/test_rbu.c
Examining data/sqlcipher-3.4.1/ext/rtree/rtree.c
Examining data/sqlcipher-3.4.1/ext/rtree/rtree.h
Examining data/sqlcipher-3.4.1/ext/rtree/sqlite3rtree.h
Examining data/sqlcipher-3.4.1/ext/session/changeset.c
Examining data/sqlcipher-3.4.1/ext/session/sqlite3session.c
Examining data/sqlcipher-3.4.1/ext/session/sqlite3session.h
Examining data/sqlcipher-3.4.1/ext/session/test_session.c
Examining data/sqlcipher-3.4.1/ext/userauth/sqlite3userauth.h
Examining data/sqlcipher-3.4.1/ext/userauth/userauth.c
Examining data/sqlcipher-3.4.1/macosx/SQLCipher.h
Examining data/sqlcipher-3.4.1/mptest/mptest.c
Examining data/sqlcipher-3.4.1/src/alter.c
Examining data/sqlcipher-3.4.1/src/analyze.c
Examining data/sqlcipher-3.4.1/src/attach.c
Examining data/sqlcipher-3.4.1/src/auth.c
Examining data/sqlcipher-3.4.1/src/backup.c
Examining data/sqlcipher-3.4.1/src/bitvec.c
Examining data/sqlcipher-3.4.1/src/btmutex.c
Examining data/sqlcipher-3.4.1/src/btree.c
Examining data/sqlcipher-3.4.1/src/btree.h
Examining data/sqlcipher-3.4.1/src/btreeInt.h
Examining data/sqlcipher-3.4.1/src/build.c
Examining data/sqlcipher-3.4.1/src/callback.c
Examining data/sqlcipher-3.4.1/src/complete.c
Examining data/sqlcipher-3.4.1/src/crypto.c
Examining data/sqlcipher-3.4.1/src/crypto.h
Examining data/sqlcipher-3.4.1/src/crypto_cc.c
Examining data/sqlcipher-3.4.1/src/crypto_impl.c
Examining data/sqlcipher-3.4.1/src/crypto_libtomcrypt.c
Examining data/sqlcipher-3.4.1/src/crypto_openssl.c
Examining data/sqlcipher-3.4.1/src/date.c
Examining data/sqlcipher-3.4.1/src/dbstat.c
Examining data/sqlcipher-3.4.1/src/delete.c
Examining data/sqlcipher-3.4.1/src/expr.c
Examining data/sqlcipher-3.4.1/src/fault.c
Examining data/sqlcipher-3.4.1/src/fkey.c
Examining data/sqlcipher-3.4.1/src/func.c
Examining data/sqlcipher-3.4.1/src/global.c
Examining data/sqlcipher-3.4.1/src/hash.c
Examining data/sqlcipher-3.4.1/src/hash.h
Examining data/sqlcipher-3.4.1/src/hwtime.h
Examining data/sqlcipher-3.4.1/src/insert.c
Examining data/sqlcipher-3.4.1/src/legacy.c
Examining data/sqlcipher-3.4.1/src/loadext.c
Examining data/sqlcipher-3.4.1/src/main.c
Examining data/sqlcipher-3.4.1/src/malloc.c
Examining data/sqlcipher-3.4.1/src/mem0.c
Examining data/sqlcipher-3.4.1/src/mem1.c
Examining data/sqlcipher-3.4.1/src/mem2.c
Examining data/sqlcipher-3.4.1/src/mem3.c
Examining data/sqlcipher-3.4.1/src/mem5.c
Examining data/sqlcipher-3.4.1/src/memjournal.c
Examining data/sqlcipher-3.4.1/src/msvc.h
Examining data/sqlcipher-3.4.1/src/mutex.c
Examining data/sqlcipher-3.4.1/src/mutex.h
Examining data/sqlcipher-3.4.1/src/mutex_noop.c
Examining data/sqlcipher-3.4.1/src/mutex_unix.c
Examining data/sqlcipher-3.4.1/src/mutex_w32.c
Examining data/sqlcipher-3.4.1/src/notify.c
Examining data/sqlcipher-3.4.1/src/os.c
Examining data/sqlcipher-3.4.1/src/os.h
Examining data/sqlcipher-3.4.1/src/os_common.h
Examining data/sqlcipher-3.4.1/src/os_setup.h
Examining data/sqlcipher-3.4.1/src/os_win.c
Examining data/sqlcipher-3.4.1/src/os_win.h
Examining data/sqlcipher-3.4.1/src/pager.c
Examining data/sqlcipher-3.4.1/src/pager.h
Examining data/sqlcipher-3.4.1/src/pcache.c
Examining data/sqlcipher-3.4.1/src/pcache.h
Examining data/sqlcipher-3.4.1/src/pcache1.c
Examining data/sqlcipher-3.4.1/src/pragma.c
Examining data/sqlcipher-3.4.1/src/pragma.h
Examining data/sqlcipher-3.4.1/src/prepare.c
Examining data/sqlcipher-3.4.1/src/printf.c
Examining data/sqlcipher-3.4.1/src/random.c
Examining data/sqlcipher-3.4.1/src/resolve.c
Examining data/sqlcipher-3.4.1/src/rowset.c
Examining data/sqlcipher-3.4.1/src/select.c
Examining data/sqlcipher-3.4.1/src/shell.c
Examining data/sqlcipher-3.4.1/src/sqlcipher.h
Examining data/sqlcipher-3.4.1/src/sqlite3ext.h
Examining data/sqlcipher-3.4.1/src/sqliteInt.h
Examining data/sqlcipher-3.4.1/src/status.c
Examining data/sqlcipher-3.4.1/src/table.c
Examining data/sqlcipher-3.4.1/src/tclsqlite.c
Examining data/sqlcipher-3.4.1/src/test1.c
Examining data/sqlcipher-3.4.1/src/test2.c
Examining data/sqlcipher-3.4.1/src/test3.c
Examining data/sqlcipher-3.4.1/src/test4.c
Examining data/sqlcipher-3.4.1/src/test5.c
Examining data/sqlcipher-3.4.1/src/test6.c
Examining data/sqlcipher-3.4.1/src/test7.c
Examining data/sqlcipher-3.4.1/src/test8.c
Examining data/sqlcipher-3.4.1/src/test9.c
Examining data/sqlcipher-3.4.1/src/test_async.c
Examining data/sqlcipher-3.4.1/src/test_autoext.c
Examining data/sqlcipher-3.4.1/src/test_backup.c
Examining data/sqlcipher-3.4.1/src/test_bestindex.c
Examining data/sqlcipher-3.4.1/src/test_blob.c
Examining data/sqlcipher-3.4.1/src/test_btree.c
Examining data/sqlcipher-3.4.1/src/test_config.c
Examining data/sqlcipher-3.4.1/src/test_delete.c
Examining data/sqlcipher-3.4.1/src/test_demovfs.c
Examining data/sqlcipher-3.4.1/src/test_devsym.c
Examining data/sqlcipher-3.4.1/src/test_fs.c
Examining data/sqlcipher-3.4.1/src/test_func.c
Examining data/sqlcipher-3.4.1/src/test_hexio.c
Examining data/sqlcipher-3.4.1/src/test_init.c
Examining data/sqlcipher-3.4.1/src/test_intarray.c
Examining data/sqlcipher-3.4.1/src/test_intarray.h
Examining data/sqlcipher-3.4.1/src/test_journal.c
Examining data/sqlcipher-3.4.1/src/test_loadext.c
Examining data/sqlcipher-3.4.1/src/test_malloc.c
Examining data/sqlcipher-3.4.1/src/test_multiplex.c
Examining data/sqlcipher-3.4.1/src/test_multiplex.h
Examining data/sqlcipher-3.4.1/src/test_mutex.c
Examining data/sqlcipher-3.4.1/src/test_onefile.c
Examining data/sqlcipher-3.4.1/src/test_osinst.c
Examining data/sqlcipher-3.4.1/src/test_pcache.c
Examining data/sqlcipher-3.4.1/src/test_quota.c
Examining data/sqlcipher-3.4.1/src/test_quota.h
Examining data/sqlcipher-3.4.1/src/test_rtree.c
Examining data/sqlcipher-3.4.1/src/test_schema.c
Examining data/sqlcipher-3.4.1/src/test_server.c
Examining data/sqlcipher-3.4.1/src/test_sqllog.c
Examining data/sqlcipher-3.4.1/src/test_superlock.c
Examining data/sqlcipher-3.4.1/src/test_syscall.c
Examining data/sqlcipher-3.4.1/src/test_tclvar.c
Examining data/sqlcipher-3.4.1/src/test_thread.c
Examining data/sqlcipher-3.4.1/src/test_vfs.c
Examining data/sqlcipher-3.4.1/src/test_vfstrace.c
Examining data/sqlcipher-3.4.1/src/test_windirent.c
Examining data/sqlcipher-3.4.1/src/test_windirent.h
Examining data/sqlcipher-3.4.1/src/test_wsd.c
Examining data/sqlcipher-3.4.1/src/threads.c
Examining data/sqlcipher-3.4.1/src/tokenize.c
Examining data/sqlcipher-3.4.1/src/treeview.c
Examining data/sqlcipher-3.4.1/src/trigger.c
Examining data/sqlcipher-3.4.1/src/update.c
Examining data/sqlcipher-3.4.1/src/utf.c
Examining data/sqlcipher-3.4.1/src/util.c
Examining data/sqlcipher-3.4.1/src/vacuum.c
Examining data/sqlcipher-3.4.1/src/vdbe.c
Examining data/sqlcipher-3.4.1/src/vdbe.h
Examining data/sqlcipher-3.4.1/src/vdbeInt.h
Examining data/sqlcipher-3.4.1/src/vdbeapi.c
Examining data/sqlcipher-3.4.1/src/vdbeaux.c
Examining data/sqlcipher-3.4.1/src/vdbeblob.c
Examining data/sqlcipher-3.4.1/src/vdbemem.c
Examining data/sqlcipher-3.4.1/src/vdbesort.c
Examining data/sqlcipher-3.4.1/src/vdbetrace.c
Examining data/sqlcipher-3.4.1/src/vtab.c
Examining data/sqlcipher-3.4.1/src/vxworks.h
Examining data/sqlcipher-3.4.1/src/wal.c
Examining data/sqlcipher-3.4.1/src/wal.h
Examining data/sqlcipher-3.4.1/src/walker.c
Examining data/sqlcipher-3.4.1/src/where.c
Examining data/sqlcipher-3.4.1/src/whereInt.h
Examining data/sqlcipher-3.4.1/src/wherecode.c
Examining data/sqlcipher-3.4.1/src/whereexpr.c
Examining data/sqlcipher-3.4.1/src/os_unix.c
Examining data/sqlcipher-3.4.1/src/sqliteLimit.h
Examining data/sqlcipher-3.4.1/src/ctime.c
Examining data/sqlcipher-3.4.1/test/crashtest1.c
Examining data/sqlcipher-3.4.1/test/fuzzcheck.c
Examining data/sqlcipher-3.4.1/test/speedtest1.c
Examining data/sqlcipher-3.4.1/test/threadtest1.c
Examining data/sqlcipher-3.4.1/test/threadtest2.c
Examining data/sqlcipher-3.4.1/test/threadtest3.c
Examining data/sqlcipher-3.4.1/test/threadtest4.c
Examining data/sqlcipher-3.4.1/test/tt3_checkpoint.c
Examining data/sqlcipher-3.4.1/test/tt3_index.c
Examining data/sqlcipher-3.4.1/test/tt3_lookaside1.c
Examining data/sqlcipher-3.4.1/test/tt3_stress.c
Examining data/sqlcipher-3.4.1/test/tt3_vacuum.c
Examining data/sqlcipher-3.4.1/test/wordcount.c
Examining data/sqlcipher-3.4.1/tool/checkSpacing.c
Examining data/sqlcipher-3.4.1/tool/dbhash.c
Examining data/sqlcipher-3.4.1/tool/extract.c
Examining data/sqlcipher-3.4.1/tool/fast_vacuum.c
Examining data/sqlcipher-3.4.1/tool/fuzzershell.c
Examining data/sqlcipher-3.4.1/tool/getlock.c
Examining data/sqlcipher-3.4.1/tool/lemon.c
Examining data/sqlcipher-3.4.1/tool/lempar.c
Examining data/sqlcipher-3.4.1/tool/libvers.c
Examining data/sqlcipher-3.4.1/tool/loadfts.c
Examining data/sqlcipher-3.4.1/tool/logest.c
Examining data/sqlcipher-3.4.1/tool/mkkeywordhash.c
Examining data/sqlcipher-3.4.1/tool/offsets.c
Examining data/sqlcipher-3.4.1/tool/pagesig.c
Examining data/sqlcipher-3.4.1/tool/rollback-test.c
Examining data/sqlcipher-3.4.1/tool/showdb.c
Examining data/sqlcipher-3.4.1/tool/showjournal.c
Examining data/sqlcipher-3.4.1/tool/showlocks.c
Examining data/sqlcipher-3.4.1/tool/showstat4.c
Examining data/sqlcipher-3.4.1/tool/showwal.c
Examining data/sqlcipher-3.4.1/tool/speedtest16.c
Examining data/sqlcipher-3.4.1/tool/speedtest8.c
Examining data/sqlcipher-3.4.1/tool/speedtest8inst1.c
Examining data/sqlcipher-3.4.1/tool/sqldiff.c
Examining data/sqlcipher-3.4.1/tool/srcck1.c
Examining data/sqlcipher-3.4.1/tool/varint.c
Examining data/sqlcipher-3.4.1/vsixtest/App.xaml.cpp
Examining data/sqlcipher-3.4.1/vsixtest/App.xaml.h
Examining data/sqlcipher-3.4.1/vsixtest/MainPage.xaml.cpp
Examining data/sqlcipher-3.4.1/vsixtest/MainPage.xaml.h
Examining data/sqlcipher-3.4.1/vsixtest/pch.cpp
Examining data/sqlcipher-3.4.1/vsixtest/pch.h

FINAL RESULTS:

data/sqlcipher-3.4.1/src/os_unix.c:490:42:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  { "readlink",     (sqlite3_syscall_ptr)readlink,        0 },
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:38:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define   snprintf	_snprintf
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:38:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define   snprintf	_snprintf
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:237:5:  [4] (buffer) lstrcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
    lstrcat(cmdline, option);
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:371:5:  [4] (buffer) lstrcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
    lstrcat(cmdline, option);
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:653:6:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	    printf(szBuffer);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:58:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define TRACE(A)  printf A; fflush(stdout)
data/sqlcipher-3.4.1/ext/fts1/fts1.c:1845:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(z, argv[i]);
data/sqlcipher-3.4.1/ext/fts1/simple_tokenizer.c:27:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(str, s);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:331:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define TRACE(A)  printf A; fflush(stdout)
data/sqlcipher-3.4.1/ext/fts2/fts2.c:2713:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(z, argv[i]);
data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c:617:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stdout, zOfstFmt, i);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1013:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
# define amatchStrcpy strcpy
data/sqlcipher-3.4.1/ext/misc/amatch.c:1014:23:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
# define amatchStrcat strcat
data/sqlcipher-3.4.1/mptest/mptest.c:587:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(*pzScript, (const char*)sqlite3_column_text(pStmt, 0));
data/sqlcipher-3.4.1/mptest/mptest.c:657:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    rc = system(zSys);
data/sqlcipher-3.4.1/src/btree.c:30:42:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define TRACE(X)  if(sqlite3BtreeTrace){printf X;fflush(stdout);}
data/sqlcipher-3.4.1/src/crypto.h:105:26:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define CODEC_TRACE(X)  {printf X;fflush(stdout);}
data/sqlcipher-3.4.1/src/crypto.h:114:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(DESC); \
data/sqlcipher-3.4.1/src/func.c:1789:14:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    FUNCTION(printf,            -1, 0, 0, printfFunc       ),
data/sqlcipher-3.4.1/src/os_unix.c:364:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { "access",       (sqlite3_syscall_ptr)access,     0  },
data/sqlcipher-3.4.1/src/pager.c:117:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define sqlite3DebugPrintf printf
data/sqlcipher-3.4.1/src/shell.c:105:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
# ifndef access
data/sqlcipher-3.4.1/src/shell.c:106:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#  define access(f,m) _access((f),(m))
data/sqlcipher-3.4.1/src/shell.c:108:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# undef popen
data/sqlcipher-3.4.1/src/shell.c:109:10:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
# define popen _popen
data/sqlcipher-3.4.1/src/shell.c:119:17:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   extern FILE *popen(const char*,const char*);
data/sqlcipher-3.4.1/src/shell.c:388:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(out, zFormat, ap);
data/sqlcipher-3.4.1/src/shell.c:393:22:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define utf8_printf fprintf
data/sqlcipher-3.4.1/src/shell.c:401:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define raw_printf fprintf
data/sqlcipher-3.4.1/src/shell.c:2934:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if( access(zNewDb,0)==0 ){
data/sqlcipher-3.4.1/src/shell.c:3657:17:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      sCtx.in = popen(sCtx.zFile+1, "r");
data/sqlcipher-3.4.1/src/shell.c:4069:16:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      p->out = popen(zFile + 1, "w");
data/sqlcipher-3.4.1/src/shell.c:4533:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    x = system(zCmd);
data/sqlcipher-3.4.1/src/shell.c:5613:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if( access(data.zDbFilename, 0)==0 ){
data/sqlcipher-3.4.1/src/shell.c:5770:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(
data/sqlcipher-3.4.1/src/sqlite3ext.h:137:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  char * (*snprintf)(int,char*,const char*,...);
data/sqlcipher-3.4.1/src/sqlite3ext.h:249:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  char *(*vsnprintf)(int,char*,const char*,va_list);
data/sqlcipher-3.4.1/src/sqlite3ext.h:411:53:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define sqlite3_snprintf               sqlite3_api->snprintf
data/sqlcipher-3.4.1/src/sqlite3ext.h:435:53:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define sqlite3_vsnprintf              sqlite3_api->vsnprintf
data/sqlcipher-3.4.1/src/sqlite3ext.h:511:53:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define sqlite3_uri_vsnprintf          sqlite3_api->vsnprintf
data/sqlcipher-3.4.1/src/test1.c:215:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(iotrace_file, zFormat, ap);
data/sqlcipher-3.4.1/src/test_delete.c:65:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  rc = access(zFile, F_OK);
data/sqlcipher-3.4.1/src/test_demovfs.c:513:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  rc = access(zPath, eAccess);
data/sqlcipher-3.4.1/src/test_sqllog.c:440:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        bRet = !access(zFile, F_OK);
data/sqlcipher-3.4.1/src/vdbeaux.c:1453:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(pOut, zFormat1, pc, 
data/sqlcipher-3.4.1/test/crashtest1.c:36:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if( access("./test.db-journal",0)==0 ){
data/sqlcipher-3.4.1/test/crashtest1.c:38:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("cp test.db test.db-saved");
data/sqlcipher-3.4.1/test/crashtest1.c:40:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system("cp test.db-journal test.db-journal-saved");
data/sqlcipher-3.4.1/test/fuzzcheck.c:145:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zFormat, ap);
data/sqlcipher-3.4.1/test/speedtest1.c:94:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zMsg, ap);
data/sqlcipher-3.4.1/test/speedtest1.c:1365:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(zHelp, argv[0]);
data/sqlcipher-3.4.1/test/wordcount.c:108:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zMsg, ap);
data/sqlcipher-3.4.1/tool/dbhash.c:244:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zFormat, ap);
data/sqlcipher-3.4.1/tool/dbhash.c:258:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zFormat, ap);
data/sqlcipher-3.4.1/tool/fuzzershell.c:141:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zFormat, ap);
data/sqlcipher-3.4.1/tool/fuzzershell.c:158:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zFormat, ap);
data/sqlcipher-3.4.1/tool/lemon.c:34:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
extern int access(const char *path, int mode);
data/sqlcipher-3.4.1/tool/lemon.c:1457:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr,format,ap);
data/sqlcipher-3.4.1/tool/lemon.c:3283:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if( access(path,modemask)==0 ) break;
data/sqlcipher-3.4.1/tool/lemon.c:3354:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if( access(user_templatename,004)==-1 ){
data/sqlcipher-3.4.1/tool/lemon.c:3376:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if( access(buf,004)==0 ){
data/sqlcipher-3.4.1/tool/lemon.c:3378:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  }else if( access(templatename,004)==0 ){
data/sqlcipher-3.4.1/tool/offsets.c:54:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(zFormat, ap);
data/sqlcipher-3.4.1/tool/showdb.c:210:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stdout, zOfstFmt, i+printOfst);
data/sqlcipher-3.4.1/tool/showdb.c:560:12:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
           sprintf(zNm, (iType&1)==0 ? "blob(%d)" : "text(%d)", sz);
data/sqlcipher-3.4.1/tool/showwal.c:153:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stdout, zOfstFmt, i+printOfst);
data/sqlcipher-3.4.1/tool/speedtest8inst1.c:216:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(stderr, zUsageMsg, argv[0]);
data/sqlcipher-3.4.1/tool/sqldiff.c:74:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zFormat, ap);
data/sqlcipher-3.4.1/tool/sqldiff.c:88:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, zFormat, ap);
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:245:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    ok = CreateProcess(
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:245:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    ok = CreateProcess(
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:373:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    ok = CreateProcess(
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:373:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    ok = CreateProcess(
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:269:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&primitives.aMutex[0]);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:270:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&primitives.aMutex[1]);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:271:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&primitives.aMutex[2]);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:292:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&primitives.aMutex[eMutex]);
data/sqlcipher-3.4.1/src/crypto_impl.c:817:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    if(c_ctx->provider->random(c_ctx->provider_ctx, iv_out, c_ctx->reserve_sz) != SQLITE_OK) return SQLITE_ERROR; 
data/sqlcipher-3.4.1/src/crypto_impl.c:888:35:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      if(ctx->read_ctx->provider->random(ctx->read_ctx->provider_ctx, ctx->kdf_salt, FILE_HEADER_SZ) != SQLITE_OK) return SQLITE_ERROR;
data/sqlcipher-3.4.1/src/crypto_impl.c:1194:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    unsigned char *random;
data/sqlcipher-3.4.1/src/crypto_impl.c:1198:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    memset(random, 0, buffer_sz);
data/sqlcipher-3.4.1/src/crypto_impl.c:1199:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    cipher_hex2bin(z, n, random);
data/sqlcipher-3.4.1/src/crypto_impl.c:1200:75:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    rc = ctx->read_ctx->provider->add_random(ctx->read_ctx->provider_ctx, random, buffer_sz);
data/sqlcipher-3.4.1/src/crypto_impl.c:1201:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    sqlcipher_free(random, buffer_sz);
data/sqlcipher-3.4.1/src/func.c:1801:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    VFUNCTION(random,            0, 0, 0, randomFunc       ),
data/sqlcipher-3.4.1/src/mutex_w32.c:136:7:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
      InitializeCriticalSection(&winMutex_staticMutexes[i].mutex);
data/sqlcipher-3.4.1/src/mutex_w32.c:230:9:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        InitializeCriticalSection(&p->mutex);
data/sqlcipher-3.4.1/src/mutex_w32.c:296:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&p->mutex);
data/sqlcipher-3.4.1/src/os_unix.c:2840:10:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    lk = random(); 
data/sqlcipher-3.4.1/src/os_unix.c:5419:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if( !azDirs[0] ) azDirs[0] = getenv("SQLITE_TMPDIR");
data/sqlcipher-3.4.1/src/os_unix.c:5420:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if( !azDirs[1] ) azDirs[1] = getenv("TMPDIR");
data/sqlcipher-3.4.1/src/os_unix.c:5870:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *envforce = getenv("SQLITE_FORCE_PROXY_LOCKING");
data/sqlcipher-3.4.1/src/os_win.c:4644:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[0] ) azDirs[0] = getenv("SQLITE_TMPDIR");
data/sqlcipher-3.4.1/src/os_win.c:4645:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[1] ) azDirs[1] = getenv("TMPDIR");
data/sqlcipher-3.4.1/src/os_win.c:4646:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[2] ) azDirs[2] = getenv("TMP");
data/sqlcipher-3.4.1/src/os_win.c:4647:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[3] ) azDirs[3] = getenv("TEMP");
data/sqlcipher-3.4.1/src/os_win.c:4648:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if( !azDirs[4] ) azDirs[4] = getenv("USERPROFILE");
data/sqlcipher-3.4.1/src/shell.c:265:28:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
      HINSTANCE hinstLib = LoadLibrary(TEXT("Kernel32.dll"));
data/sqlcipher-3.4.1/src/shell.c:5240:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    home_dir = getenv("USERPROFILE");
data/sqlcipher-3.4.1/src/shell.c:5245:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    home_dir = getenv("HOME");
data/sqlcipher-3.4.1/src/shell.c:5252:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    zDrive = getenv("HOMEDRIVE");
data/sqlcipher-3.4.1/src/shell.c:5253:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    zPath = getenv("HOMEPATH");
data/sqlcipher-3.4.1/src/sqlcipher.h:44:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  int (*random)(void *ctx, void *buffer, int length);
data/sqlcipher-3.4.1/src/tclsqlite.c:4218:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if( getenv("BREAK") ){
data/sqlcipher-3.4.1/src/test1.c:284:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if( res==0 && getenv("OMIT_MISUSE")!=0 ) res = 1;
data/sqlcipher-3.4.1/src/test6.c:242:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      char random;
data/sqlcipher-3.4.1/src/test6.c:243:30:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      sqlite3_randomness(1, &random);
data/sqlcipher-3.4.1/src/test6.c:249:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        random &= 0x01;
data/sqlcipher-3.4.1/src/test6.c:272:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      if( (random&0x06)==0x06 ){
data/sqlcipher-3.4.1/src/test6.c:275:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        eAction = ((random&0x01)?2:1);
data/sqlcipher-3.4.1/src/test_sqllog.c:376:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *zVar = getenv(ENVIRONMENT_VARIABLE1_NAME);
data/sqlcipher-3.4.1/src/test_sqllog.c:382:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if( getenv(ENVIRONMENT_VARIABLE2_NAME) ){
data/sqlcipher-3.4.1/src/test_sqllog.c:383:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        sqllogglobal.bReuse = atoi(getenv(ENVIRONMENT_VARIABLE2_NAME));
data/sqlcipher-3.4.1/src/test_sqllog.c:547:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if( getenv(ENVIRONMENT_VARIABLE1_NAME) ){
data/sqlcipher-3.4.1/src/test_sqllog.c:551:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if( getenv(ENVIRONMENT_VARIABLE3_NAME) ){
data/sqlcipher-3.4.1/test/crashtest1.c:50:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(getpid());
data/sqlcipher-3.4.1/test/fuzzcheck.c:844:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  zFailCode = getenv("TEST_FAILURE");
data/sqlcipher-3.4.1/tool/fuzzershell.c:783:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  zFailCode = getenv("TEST_FAILURE");
data/sqlcipher-3.4.1/tool/lemon.c:3267:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    pathlist = getenv("PATH");
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[STATICBUFFERSIZE];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[300];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[300];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:191:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmdline[100];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:231:5:  [2] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
    lstrcpy(cmdline, "cl.exe -nologo -c -TC -Zs -X -Fp.\\_junk.pch ");
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:243:5:  [2] (buffer) lstrcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
    lstrcat(cmdline, " .\\nul");
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[300];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:325:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmdline[100];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:365:5:  [2] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
    lstrcpy(cmdline, "link.exe -nologo ");
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:485:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char szBuffer[100];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:487:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fp = fopen(filename, "rt");
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:516:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(szBuffer, p, q - p);
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:591:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char szBuffer[1024], szCopy[1024];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:596:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(filename, "rt");
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:603:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	sp = fopen(substitutions, "rt");
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:650:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		    memcpy(szBuffer, szCopy, sizeof(szCopy));
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szCwd[MAX_PATH + 1];
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:675:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szTmp[MAX_PATH + 1];
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:615:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zBuf, zByte, nByte);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:724:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&((char *)zOut)[iBeginOut], &pWrite->zBuf[iBeginIn], (size_t)nCopy);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:724:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          memcpy(&((char *)zOut)[iBeginOut], &pWrite->zBuf[iBeginIn], (size_t)nCopy);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:1077:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pData->zName, zName, nName);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:1114:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pLock->zFile, pData->zName, pLock->nFile);
data/sqlcipher-3.4.1/ext/fts1/ft_hash.c:381:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)new_elem->pKey, pKey, nKey);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:87:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(sb->s + sb->len, zFrom, nFrom);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:255:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d->pData, pData, nData);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:289:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts1/fts1.c:292:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(d->pData + d->nData, c, n);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:617:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTarget, pSource, nSource);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:645:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pAcc->pData, pUpdate->pData, pUpdate->nData);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:874:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(str, s, n);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:909:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(r, zDb, nDb);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:912:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(r, zName, nName);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:1061:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *const fulltext_zStatement[MAX_STMT] = {
data/sqlcipher-3.4.1/ext/fts1/fts1.c:1658:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCopy, aToken[i].z, n);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:2319:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[200];
data/sqlcipher-3.4.1/ext/fts1/fts1.c:2632:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t->pTerm, pTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:2908:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *zQuery = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/ext/fts1/fts1_hash.c:344:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)new_elem->pKey, pKey, nKey);
data/sqlcipher-3.4.1/ext/fts1/fts1_porter.c:342:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zReverse[28];
data/sqlcipher-3.4.1/ext/fts1/fts1_tokenizer1.c:30:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char delim[128];             /* flag ASCII delimiters */
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d->pData, pData, nData);
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:180:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(d->pData + d->nData, c, n);
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:325:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, pUpdate->pData, pUpdate->nData);
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:462:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(str, s, n);
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:494:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(r, zName, nName);
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:547:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *fulltext_zStatement[MAX_STMT] = {
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:1255:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *zQuery = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:1478:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                      (const char *)sqlite3_value_text(ppArg[2]), pRowid);
data/sqlcipher-3.4.1/ext/fts1/simple_tokenizer.c:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zDelim[0x80];               /* nul-terminated, so nul not a member */
data/sqlcipher-3.4.1/ext/fts2/fts2.c:501:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBuffer->pData+pBuffer->nData, pSource, nSource);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:510:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBuffer->pData+pBuffer->nData, pSource1, nSource1);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:511:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBuffer->pData+pBuffer->nData+nSource1, pSource2, nSource2);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:787:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:821:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:972:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[5*VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1004:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1032:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1071:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1616:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(str, s, n);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1651:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(r, zDb, nDb);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1654:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(r, zName, nName);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1800:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *const fulltext_zStatement[MAX_STMT] = {
data/sqlcipher-3.4.1/ext/fts2/fts2.c:2526:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCopy, aToken[i].z, n);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:3187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[200];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:3494:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t->pTerm, pTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:3821:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *zQuery = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4080:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX+VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX+VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4695:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX+VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4738:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX+VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4750:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pWriter->data.pData+iData, c, n);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4751:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pWriter->data.pData+iData+n, pTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4762:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char c[VARINT_MAX+VARINT_MAX];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4818:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pWriter->data.pData+iDoclistData, c, nActual);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4841:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pWriter->data.pData+iDoclistData, c, nActual);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4859:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pWriter->data.pData+n, pTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:4871:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pWriter->data.pData+n,
data/sqlcipher-3.4.1/ext/fts2/fts2.c:5412:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, pBuffers, nBuffers*sizeof(*pBuffers));
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6285:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[512];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6299:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6379:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result+iByte, pData[iTerm].pTerm, pData[iTerm].nTerm);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6487:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6578:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *pTerm = (const char *)sqlite3_value_text(argv[1]);
data/sqlcipher-3.4.1/ext/fts2/fts2_hash.c:351:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)new_elem->pKey, pKey, nKey);
data/sqlcipher-3.4.1/ext/fts2/fts2_icu.c:73:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zLocale, argv[0], n);
data/sqlcipher-3.4.1/ext/fts2/fts2_porter.c:344:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zReverse[28];
data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer.c:165:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zName = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer.c:167:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zInput = (const char *)sqlite3_value_text(argv[argc-1]);
data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer.c:170:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    zArg = (const char *)sqlite3_value_text(argv[1]);
data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer.c:264:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pp, sqlite3_column_blob(pStmt, 0), sizeof(*pp));
data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer1.c:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char delim[128];             /* flag ASCII delimiters */
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1082:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, zCol, n);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1378:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->aIndex, aIndex, sizeof(struct Fts3Index) * nIndex);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1388:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zCsr, argv[2], nName);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1391:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zCsr, argv[1], nDb);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1398:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    z = (char *)sqlite3Fts3NextToken(aCol[iCol], &n);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1399:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCsr, z, n);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1404:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    assert( zCsr <= &((char *)p)[nByte] );
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1839:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zBuffer[nPrefix], zCsr, nSuffix);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1991:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, *ppPoslist, n);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:2029:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, *ppPoslist, n);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:2354:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *aaOutput[16];             /* Malloc'd output buffers */
data/sqlcipher-3.4.1/ext/fts3/fts3.c:2746:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTS->aaOutput[0], aDoclist, nDoclist);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:3543:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pRet, sqlite3_value_blob(pVal), sizeof(Fts3Cursor *));
data/sqlcipher-3.4.1/ext/fts3/fts3.c:3664:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      zArg = (const char *)sqlite3_value_text(apVal[1]);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:4563:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aDoclist, a[p->nToken-1].pList, nByte+1);
data/sqlcipher-3.4.1/ext/fts3/fts3_aux.c:111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)p->pFts3Tab->zDb, zDb, nDb);
data/sqlcipher-3.4.1/ext/fts3/fts3_aux.c:112:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)p->pFts3Tab->zName, zFts3, nFts3);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:216:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pRet->pPhrase->aToken[0].z, zToken, nToken);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:331:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&zTemp[nTemp], zByte, nByte);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:359:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zBuf, zTemp, nTemp);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:1132:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void *)pp, sqlite3_column_blob(pStmt, 0), sizeof(*pp));
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:1231:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                          (const char *)sqlite3_value_text(argv[0]), &pModule);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:1248:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zExpr = (const char *)sqlite3_value_text(argv[1]);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:1257:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    azCol[ii] = (char *)sqlite3_value_text(argv[ii+2]);
data/sqlcipher-3.4.1/ext/fts3/fts3_hash.c:369:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)new_elem->pKey, pKey, nKey);
data/sqlcipher-3.4.1/ext/fts3/fts3_icu.c:71:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zLocale, argv[0], n);
data/sqlcipher-3.4.1/ext/fts3/fts3_porter.c:343:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zReverse[28];
data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c:143:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pRet->zMatchinfo, zMatchinfo, nStr+1);
data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c:184:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( p->bGlobal ) memcpy(aOut, &p->aMatchinfo[1], p->nElem*sizeof(u32));
data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c:194:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&p->aMatchinfo[2+p->nElem], &p->aMatchinfo[1], p->nElem*sizeof(u32));
data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c:618:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pStr->z[pStr->n], zAppend, nAppend);
data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c:1648:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char aBuffer[64];
data/sqlcipher-3.4.1/ext/fts3/fts3_term.c:78:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iIndex = atoi(argv[4]);
data/sqlcipher-3.4.1/ext/fts3/fts3_term.c:110:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)p->pFts3Tab->zDb, zDb, nDb);
data/sqlcipher-3.4.1/ext/fts3/fts3_term.c:111:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)p->pFts3Tab->zName, zFts3, nFts3);
data/sqlcipher-3.4.1/ext/fts3/fts3_test.c:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aBuf[24];
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenize_vtab.c:133:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pSpace, argv[i], n+1);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenize_vtab.c:347:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *zByte = (const char *)sqlite3_value_text(apVal[0]);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenize_vtab.c:353:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pCsr->zInput, zByte, nByte);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c:276:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *azArg[64];
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c:293:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zName = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c:295:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zInput = (const char *)sqlite3_value_text(argv[argc-1]);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c:311:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    azArg[i-1] = (const char *)sqlite3_value_text(argv[i]);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c:392:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void *)pp, sqlite3_column_blob(pStmt, 0), sizeof(*pp));
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer1.c:37:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char delim[128];             /* flag ASCII delimiters */
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:926:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *zText = (const char *)sqlite3_value_text(apVal[i]);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:1336:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aCopy, pList->aData, nCopy);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:1395:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pReader->zTerm[nPrefix], pNext, nSuffix);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:1627:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pReader->aNode, zRoot, nRoot);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:1750:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pReader->ppNextElem, aElem, nElem*sizeof(Fts3HashElem *));
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:2041:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pTree->aData[nData], &zTerm[nPrefix], nSuffix);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:2055:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTree->zTerm, zTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:2305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pWriter->aData[nData], &zTerm[nPrefix], nSuffix);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:2308:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pWriter->aData[nData], aDoclist, nDoclist);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:2327:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pWriter->zTerm, zTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:2635:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pMsr->aBuffer, pList, nList);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:2979:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(&pCsr->aBuffer[nDoclist], pList, nList);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:3731:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&p->term.a[nPrefix], &p->aNode[p->iOff], nSuffix);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:3835:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pBlk->a[pBlk->n], &zTerm[nPrefix], nSuffix);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:3838:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNode->key.a, zTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:3911:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pPrev->a, zTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:3918:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pNode->a[pNode->n], &zTerm[nPrefix], nSuffix);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:3923:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pNode->a[pNode->n], aDoclist, nDoclist);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:4254:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNode->block.a, aRoot, nRoot);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:4266:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pNode->key.a, reader.term.a, reader.term.n);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:4276:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(pNode->block.a, aBlock, nBlock);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:4740:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pHint->a, aHint, nHint);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:5303:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    p->nNodeSize = atoi(&zVal[9]);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:5306:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    p->nMaxPendingData = atoi(&zVal[11]);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:5309:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    p->bNoIncrDoclist = atoi(&zVal[21]);
data/sqlcipher-3.4.1/ext/fts3/fts3_write.c:5431:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRet, &p->pList->aData[nSkip], *pnData);
data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c:260:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nTop = atoi(findOption("top", 1, "25"));
data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c:496:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char rtag[20];
data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c:559:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTerm[1000];
data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c:579:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zTerm+iPrefix, aData+i, (size_t)nTerm);
data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c:757:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nData = atoi(azExtra[2]);
data/sqlcipher-3.4.1/ext/fts3/tool/fts3view.c:783:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  nTop = atoi(findOption("top", 1, "25"));
data/sqlcipher-3.4.1/ext/fts5/fts5_buffer.c:71:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pBuf->p[pBuf->n], pData, nData);
data/sqlcipher-3.4.1/ext/fts5/fts5_buffer.c:274:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zRet, pIn, nIn);
data/sqlcipher-3.4.1/ext/fts5/fts5_buffer.c:369:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pEntry->pTerm, pTerm, nTerm);
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:316:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pSpace, p2, p-p2);
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:438:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zOut, zIn, nIn+1);
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:782:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( zRank ) memcpy(zRank, pRank, p-pRank);
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:802:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          if( zRankArgs ) memcpy(zRankArgs, pArgs, p-pArgs);
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:349:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aNew, aIter, sizeof(Fts5PoslistReader) * nIter);
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:1507:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pSyn->zTerm, pToken, nToken);
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:1663:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pColset, pColsetOrig, nByte);
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:1918:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->apChild[p->nChild], pSub->apChild, nByte);
data/sqlcipher-3.4.1/ext/fts5/fts5_hash.c:71:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zKey[8];                   /* Nul-terminated entry key */
data/sqlcipher-3.4.1/ext/fts5/fts5_hash.c:274:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->zKey[1], pToken, nToken);
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:1098:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&(pBuf)->p[(pBuf)->n], pBlob, nBlob);             \
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:1196:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pOut->aSeg, &pLvl->aSeg[is], sizeof(Fts5StructureSegment));
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:5094:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pData->p, doclist.p, doclist.n);
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:5333:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&buf.p[1], pToken, nToken);
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:6264:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(a, aBlob, n);
data/sqlcipher-3.4.1/ext/fts5/fts5_main.c:2445:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pAux->zFunc, zName, nName);
data/sqlcipher-3.4.1/ext/fts5/fts5_main.c:2483:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew->zName, zName, nName);
data/sqlcipher-3.4.1/ext/fts5/fts5_main.c:2599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[8];
data/sqlcipher-3.4.1/ext/fts5/fts5_main.c:2603:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, (void*)&pGlobal, sizeof(pGlobal));
data/sqlcipher-3.4.1/ext/fts5/fts5_tcl.c:110:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((void*)&pApi, pPtr, sizeof(pApi));
data/sqlcipher-3.4.1/ext/fts5/fts5_tcl.c:186:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zCmd[64];
data/sqlcipher-3.4.1/ext/fts5/fts5_tcl.c:191:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(zCmd, "f5t_2_%lld", iCmd++);
data/sqlcipher-3.4.1/ext/fts5/fts5_tcl.c:531:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zCmd[64];
data/sqlcipher-3.4.1/ext/fts5/fts5_tcl.c:536:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(zCmd, "f5t_%lld", iCmd++);
data/sqlcipher-3.4.1/ext/fts5/fts5_test_mi.c:81:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ppApi, sqlite3_column_blob(pStmt, 0), sizeof(fts5_api*));
data/sqlcipher-3.4.1/ext/fts5/fts5_test_mi.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->zArg, zArg, i);
data/sqlcipher-3.4.1/ext/fts5/fts5_test_tok.c:148:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pSpace, argv[i], n+1);
data/sqlcipher-3.4.1/ext/fts5/fts5_test_tok.c:352:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRow->zToken, pToken, nToken);
data/sqlcipher-3.4.1/ext/fts5/fts5_test_tok.c:375:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *zByte = (const char *)sqlite3_value_text(apVal[0]);
data/sqlcipher-3.4.1/ext/fts5/fts5_test_tok.c:381:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pCsr->zInput, zByte, nByte);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:25:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char aAsciiTokenChar[128] = {
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:38:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aTokenChar[128];
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:81:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->aTokenChar, aAsciiTokenChar, sizeof(aAsciiTokenChar));
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aFold[64];
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:234:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aTokenChar[128];  /* ASCII range token characters */
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:345:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->aTokenChar, aAsciiTokenChar, sizeof(aAsciiTokenChar));
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:453:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aFold, p->aFold, nFold);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:507:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aBuf[FTS5_PORTER_MAX_TOKEN + 64];
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:594:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&aBuf[nStem], p->zOutput, p->nOutput);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:833:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aBuf[nBuf-2], "ate", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:841:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aBuf[nBuf-2], "ble", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:849:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aBuf[nBuf-2], "ize", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:868:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ate", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:873:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-6], "tion", 4);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:882:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ence", 4);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:887:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ance", 4);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:896:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ize", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:905:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "log", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:914:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-3], "ble", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:919:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "al", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:924:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ent", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:929:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-3], "e", 1);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:934:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ous", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:943:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ize", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:948:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ate", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:953:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ate", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:962:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "al", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:967:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ive", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:972:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ful", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:977:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-7], "ous", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:986:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "al", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:991:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ive", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:996:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-6], "ble", 3);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:1015:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-4], "ic", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:1032:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ic", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:1037:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "ic", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:1062:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-5], "al", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:1081:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nBuf-3], "ee", 2);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:1144:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aBuf, pToken, nBuf);
data/sqlcipher-3.4.1/ext/fts5/fts5_vocab.c:199:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRet->zFts5Tbl, zTab, nTab);
data/sqlcipher-3.4.1/ext/fts5/fts5_vocab.c:200:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRet->zFts5Db, zDb, nDb);
data/sqlcipher-3.4.1/ext/fts5/fts5_vocab.c:543:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pCsr->zLeTerm, zCopy, pCsr->nLeTerm+1);
data/sqlcipher-3.4.1/ext/icu/icu.c:239:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[128];
data/sqlcipher-3.4.1/ext/icu/icu.c:369:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    zLocale = (const char *)sqlite3_value_text(apArg[1]);
data/sqlcipher-3.4.1/ext/icu/icu.c:469:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zLocale = (const char *)sqlite3_value_text(apArg[0]);
data/sqlcipher-3.4.1/ext/icu/icu.c:470:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zName = (const char *)sqlite3_value_text(apArg[1]);
data/sqlcipher-3.4.1/ext/misc/amatch.c:472:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zCost[10];       /* Cost key (text rendering of rCost) */
data/sqlcipher-3.4.1/ext/misc/amatch.c:474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zWord[4];        /* Text of the word.  Extra space appended as needed */
data/sqlcipher-3.4.1/ext/misc/amatch.c:487:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTo[4];             /* Tranform to V.W value (extra space appended) */
data/sqlcipher-3.4.1/ext/misc/amatch.c:629:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRule->zFrom, zFrom, nFrom+1);
data/sqlcipher-3.4.1/ext/misc/amatch.c:630:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRule->zTo, zTo, nTo+1);
data/sqlcipher-3.4.1/ext/misc/amatch.c:750:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zOut, zIn, nIn+1);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1038:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[4];
data/sqlcipher-3.4.1/ext/misc/amatch.c:1054:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pCur->zBuf, zBuf+2, 2);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1055:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pCur->zBuf+2, zWordBase, nBase);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1056:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pCur->zBuf+2+nBase, zWordTail, nTail+1);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zNext[8];
data/sqlcipher-3.4.1/ext/misc/amatch.c:1121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zNextIn[8];
data/sqlcipher-3.4.1/ext/misc/closure.c:434:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zOut, zIn, nIn+1);
data/sqlcipher-3.4.1/ext/misc/compress.c:40:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char x[8];
data/sqlcipher-3.4.1/ext/misc/csv.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zErr[CSV_MXERR];  /* Error message */
data/sqlcipher-3.4.1/ext/misc/csv.c:131:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    p->in = fopen(zFilename, "rb");
data/sqlcipher-3.4.1/ext/misc/csv.c:458:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *azPValue[3];         /* Parameter values */
data/sqlcipher-3.4.1/ext/misc/csv.c:494:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      tstFlags = (unsigned int)atoi(zValue);
data/sqlcipher-3.4.1/ext/misc/csv.c:502:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nCol = atoi(zValue);
data/sqlcipher-3.4.1/ext/misc/csv.c:661:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pCur->azVal[i], z, pCur->rdr.n+1);
data/sqlcipher-3.4.1/ext/misc/eval.c:55:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&p->z[p->nUsed], p->zSep, p->szSep);
data/sqlcipher-3.4.1/ext/misc/eval.c:58:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->z[p->nUsed], z, sz);
data/sqlcipher-3.4.1/ext/misc/fileio.c:37:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zName, "rb");
data/sqlcipher-3.4.1/ext/misc/fileio.c:69:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(zFile, "wb");
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTo[4];                /* Transform to (extra space appended) */
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:348:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRule->zFrom, zFrom, nFrom+1);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:349:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pRule->zTo, zTo, nTo+1);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:459:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zOut, zIn, nIn+1);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:527:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pNew->zClassName, zModule, nModule+1);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:630:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(z, pStem->zBasis, pStem->nBasis+1);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:632:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(z, pStem->zBasis, n);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:633:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&z[n], pRule->zTo, pRule->nTo);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:634:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&z[n+pRule->nTo], &pStem->zBasis[n+pRule->nFrom], 
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:880:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zBasis, zWord, pNew->nBasis+1);
data/sqlcipher-3.4.1/ext/misc/ieee754.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zResult[100];
data/sqlcipher-3.4.1/ext/misc/json1.c:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zSpace[100];        /* Initial static space */
data/sqlcipher-3.4.1/ext/misc/json1.c:224:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zNew, p->zBuf, (size_t)p->nUsed);
data/sqlcipher-3.4.1/ext/misc/json1.c:243:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->zBuf+p->nUsed, zIn, N);
data/sqlcipher-3.4.1/ext/misc/json1.c:2027:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->zJson, z, (size_t)n+1);
data/sqlcipher-3.4.1/ext/misc/json1.c:2049:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->zRoot, zRoot, (size_t)n+1);
data/sqlcipher-3.4.1/ext/misc/memvfs.c:160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zBuf, p->aData+iOfst, iAmt);
data/sqlcipher-3.4.1/ext/misc/memvfs.c:435:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zReturn[100];
data/sqlcipher-3.4.1/ext/misc/memvfs.c:438:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zFilename, "rb");
data/sqlcipher-3.4.1/ext/misc/nextchar.c:166:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zPrev[8];
data/sqlcipher-3.4.1/ext/misc/regexp.c:129:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zInit[12];    /* Initial text to match */
data/sqlcipher-3.4.1/ext/misc/regexp.c:377:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&p->aOp[p->nState], &p->aOp[iStart], N*sizeof(p->aOp[0]));
data/sqlcipher-3.4.1/ext/misc/regexp.c:378:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&p->aArg[p->nState], &p->aArg[iStart], N*sizeof(p->aArg[0]));
data/sqlcipher-3.4.1/ext/misc/rot13.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTemp[100];
data/sqlcipher-3.4.1/ext/misc/showauth.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zOpSpace[50];
data/sqlcipher-3.4.1/ext/misc/spellfix.c:558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char a[4]    ;            /* FROM string followed by TO string */
data/sqlcipher-3.4.1/ext/misc/spellfix.c:717:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pCost->a, zFrom, nFrom);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:718:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pCost->a + nFrom, zTo, nTo);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:817:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pStr->z, z, n+1);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:1823:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zHash[SPELLFIX_MX_HASH]; /* the phonehash used for this match */
data/sqlcipher-3.4.1/ext/misc/spellfix.c:1945:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew->zDbName, zDbName, nDbName+1);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2247:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zHash[SPELLFIX_MX_HASH];    /* The current phonehash for zPattern */
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2258:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char azPrior[SPELLFIX_MX_RUN][SPELLFIX_MX_HASH];  /* Prior hashes */
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2278:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zHash1[SPELLFIX_MX_HASH];
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zHash2[SPELLFIX_MX_HASH];
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2302:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zHash1, zClass, iScope);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zHash2, zHash1, iScope);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->azPrior[p->nRun++], zHash1, iScope+1);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2382:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pCur->a[idx].zHash, zHash1, iScope+1);
data/sqlcipher-3.4.1/ext/misc/totype.c:386:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char zBlobRev[sizeof(sqlite3_int64)];
data/sqlcipher-3.4.1/ext/misc/totype.c:390:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&iVal, zBlobRev, sizeof(sqlite3_int64));
data/sqlcipher-3.4.1/ext/misc/totype.c:392:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&iVal, zBlob, sizeof(sqlite3_int64));
data/sqlcipher-3.4.1/ext/misc/totype.c:456:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char zBlobRev[sizeof(double)];
data/sqlcipher-3.4.1/ext/misc/totype.c:460:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&rVal, zBlobRev, sizeof(double));
data/sqlcipher-3.4.1/ext/misc/totype.c:462:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&rVal, zBlob, sizeof(double));
data/sqlcipher-3.4.1/ext/misc/vfslog.c:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z1[40], z2[40], z3[2000];
data/sqlcipher-3.4.1/ext/misc/vfslog.c:296:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    pLog->out = fopen(pLog->zFilename, "a");
data/sqlcipher-3.4.1/ext/misc/vfslog.c:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zHost[200];
data/sqlcipher-3.4.1/ext/misc/vfslog.c:391:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zSig[40];
data/sqlcipher-3.4.1/ext/misc/vfslog.c:411:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zStr[12];
data/sqlcipher-3.4.1/ext/misc/vfslog.c:435:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zSig[40];
data/sqlcipher-3.4.1/ext/misc/vfslog.c:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zStr[12];
data/sqlcipher-3.4.1/ext/misc/vtshim.c:447:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, pMod, sizeof(*p));
data/sqlcipher-3.4.1/ext/rbu/rbu.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[200];                 /* Buffer for printf() */
data/sqlcipher-3.4.1/ext/rbu/rbu.c:95:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nStep = atoi(argv[i]);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zStateDb[5];               /* Db name for state ("stat" or "main") */
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:555:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zOut, &zSrc[ofst], cnt);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:570:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zOut, zDelta, cnt);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:1060:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zRet, zStr, nCopy);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:1213:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pIter->abIndexed, pIter->abTblPk, sizeof(u8)*pIter->nTblCol);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:2202:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pUp->zMask, zMask, pIter->nTblCol);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:2355:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zStateDb, "stat", 4);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:2357:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zStateDb, "main", 4);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:2695:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  nChar = MultiByteToWideChar(CP_UTF8, 0, zFilename, -1, NULL, 0);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:2704:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  nChar = MultiByteToWideChar(CP_UTF8, 0, zFilename, -1, zWideFilename,
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:3356:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zRnd[64];
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:3498:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p->zTarget, zTarget, nTarget+1);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:3502:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p->zRbu, zRbu, nRbu+1);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:4450:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(zCopy, zBase, nCopy);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:4703:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pNew->base, &vfs_template, sizeof(sqlite3_vfs));
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:4708:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zSpace, zName, nName);
data/sqlcipher-3.4.1/ext/rbu/test_rbu.c:168:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zBuf[50];
data/sqlcipher-3.4.1/ext/rtree/rtree.c:547:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNode->zData, zBlob, pRtree->iNodeSize);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:925:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&c.u,a,4);                                           \
data/sqlcipher-3.4.1/ext/rtree/rtree.c:933:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&c.u,a,4);                                           \
data/sqlcipher-3.4.1/ext/rtree/rtree.c:1495:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBlob, sqlite3_value_blob(pValue), nBlob);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:1677:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zIdxStr[RTREE_MAX_DIMENSIONS*8+1];
data/sqlcipher-3.4.1/ext/rtree/rtree.c:1819:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&cell, p, sizeof(RtreeCell));
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2001:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aSpare, aLeft, sizeof(int)*nLeft);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2070:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aSpare, aLeft, sizeof(int)*nLeft);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2161:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&left, &aCell[aaSorted[ii][0]], sizeof(RtreeCell));
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2162:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&right, &aCell[aaSorted[ii][nCell-1]], sizeof(RtreeCell));
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2191:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBboxLeft, &aCell[aaSorted[iBestDim][0]], sizeof(RtreeCell));
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2192:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pBboxRight, &aCell[aaSorted[iBestDim][iBestSplit]], sizeof(RtreeCell));
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2259:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&aCell[nCell], pCell, sizeof(RtreeCell));
data/sqlcipher-3.4.1/ext/rtree/rtree.c:2551:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&aCell[ii], pCell, sizeof(RtreeCell));
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3083:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char *azSql[N_STATEMENT] = {
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3272:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRtree->zDb, argv[1], nDb);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3273:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pRtree->zName, argv[2], nName);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zCell[512];
data/sqlcipher-3.4.1/ext/session/changeset.c:47:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(zFilename, "rb");
data/sqlcipher-3.4.1/ext/session/changeset.c:86:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[50];
data/sqlcipher-3.4.1/ext/session/changeset.c:229:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(zOut, "wb");
data/sqlcipher-3.4.1/ext/session/changeset.c:300:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(zOut, "wb");
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:353:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&i, &r, 8);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:377:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aBuf[nVarint + 1], eType==SQLITE_TEXT ? 
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:485:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&iVal, &rVal, 8);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:640:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aOut, a2, n2);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:643:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aOut, a1, n1);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:738:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(aOut, aOld, nOld);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:766:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aOut, aNew, nNew);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:828:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&rVal, &iVal, 8);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:976:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pAlloc, zThis, nThis+1);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:986:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pAlloc, zName, nName+1);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:1572:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zDb, zDb, nDb+1);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:1696:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTab->zName, zName, nName+1);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:1796:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->aBuf[p->nBuf], aBlob, nBlob);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:1816:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->aBuf[p->nBuf], zStr, nStr);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:1834:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aBuf[24];
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:1889:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&i, &r, 8);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:1972:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&dVal, &iVal, 8);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:2164:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&rVal, &iVal, 8);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:2588:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aCopy, aData, nData);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:2658:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&d, &v, 8);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:2778:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->tblhdr.aBuf[iPK], &p->in.aData[p->in.iNext], nCopy);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:4226:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew->aRecord, aRec, nRec);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:4280:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aCsr, aRec, nRec);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:4305:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aCsr, aRec, nRec);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:4375:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTab->abPK, abPK, nCol);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:4377:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTab->zName, zNew, nNew+1);
data/sqlcipher-3.4.1/ext/session/test_session.c:204:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pNew[pBlob->n], pData, nData);
data/sqlcipher-3.4.1/ext/session/test_session.c:705:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pData, &p->aData[p->iData], nRet);
data/sqlcipher-3.4.1/ext/userauth/userauth.c:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zSalt[8];
data/sqlcipher-3.4.1/ext/userauth/userauth.c:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zOut, zSalt, sizeof(zSalt));
data/sqlcipher-3.4.1/ext/userauth/userauth.c:209:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(db->auth.zAuthPW,zPW,nPW);
data/sqlcipher-3.4.1/mptest/mptest.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zName[32];        /* Symbolic name of this process */
data/sqlcipher-3.4.1/mptest/mptest.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zPrefix[30];
data/sqlcipher-3.4.1/mptest/mptest.c:244:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zPrefix[30];
data/sqlcipher-3.4.1/mptest/mptest.c:279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zPrefix[30];
data/sqlcipher-3.4.1/mptest/mptest.c:431:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->z+p->n, z, n);
data/sqlcipher-3.4.1/mptest/mptest.c:498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zErr[30];
data/sqlcipher-3.4.1/mptest/mptest.c:685:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *in = fopen(zFilename, "rb");
data/sqlcipher-3.4.1/mptest/mptest.c:849:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( i>0 && zArg[i]==0 ) return atoi(zArg);
data/sqlcipher-3.4.1/mptest/mptest.c:886:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zCmd[30];
data/sqlcipher-3.4.1/mptest/mptest.c:887:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zError[1000];
data/sqlcipher-3.4.1/mptest/mptest.c:888:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char azArg[MX_ARG][100];
data/sqlcipher-3.4.1/mptest/mptest.c:929:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      sqlite3_sleep(atoi(azArg[0]));
data/sqlcipher-3.4.1/mptest/mptest.c:939:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int rc = atoi(azArg[0]);
data/sqlcipher-3.4.1/mptest/mptest.c:1104:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int iNewClient = atoi(azArg[0]);
data/sqlcipher-3.4.1/mptest/mptest.c:1118:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int iTimeout = nArg>=2 ? atoi(azArg[1]) : 10000;
data/sqlcipher-3.4.1/mptest/mptest.c:1121:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      waitForClient(atoi(azArg[0]), iTimeout, zError);
data/sqlcipher-3.4.1/mptest/mptest.c:1133:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int iTarget = atoi(azArg[0]);
data/sqlcipher-3.4.1/mptest/mptest.c:1311:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( zNRep ) nRep = atoi(zNRep);
data/sqlcipher-3.4.1/mptest/mptest.c:1318:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( zTrace ) g.iTrace = atoi(zTrace);
data/sqlcipher-3.4.1/mptest/mptest.c:1321:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( zTmout ) iTmout = atoi(zTmout);
data/sqlcipher-3.4.1/mptest/mptest.c:1325:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    g.pErrLog = fopen(g.zErrLog, "a");
data/sqlcipher-3.4.1/mptest/mptest.c:1330:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    g.pLog = fopen(g.zLog, "a");
data/sqlcipher-3.4.1/mptest/mptest.c:1337:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iClient = atoi(zClient);
data/sqlcipher-3.4.1/src/alter.c:787:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->aCol, pTab->aCol, sizeof(Column)*pNew->nCol);
data/sqlcipher-3.4.1/src/analyze.c:319:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->u.aRowid, pData, n);
data/sqlcipher-3.4.1/src/analyze.c:346:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->anEq, pFrom->anEq, sizeof(tRowcnt)*p->nCol);
data/sqlcipher-3.4.1/src/analyze.c:347:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->anLt, pFrom->anLt, sizeof(tRowcnt)*p->nCol);
data/sqlcipher-3.4.1/src/analyze.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->anDLt, pFrom->anDLt, sizeof(tRowcnt)*p->nCol);
data/sqlcipher-3.4.1/src/analyze.c:1769:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pSample->p, sqlite3_column_blob(pStmt, 4), pSample->n);
data/sqlcipher-3.4.1/src/attach.c:78:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zFile = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/src/attach.c:79:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zName = (const char *)sqlite3_value_text(argv[1]);
data/sqlcipher-3.4.1/src/attach.c:114:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aNew, db->aDb, sizeof(db->aDb[0])*2);
data/sqlcipher-3.4.1/src/attach.c:188:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        zKey = (char *)sqlite3_value_blob(argv[2]);
data/sqlcipher-3.4.1/src/attach.c:266:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *zName = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/src/attach.c:270:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zErr[128];
data/sqlcipher-3.4.1/src/backup.c:303:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zOut, zIn, nCopy);
data/sqlcipher-3.4.1/src/bitvec.c:217:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(aiValues, p->u.aHash, sizeof(p->u.aHash));
data/sqlcipher-3.4.1/src/bitvec.c:257:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aiValues, p->u.aHash, sizeof(p->u.aHash));
data/sqlcipher-3.4.1/src/btree.c:766:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aSpace[384];          /* Temp space for pIdxKey - to avoid a malloc */
data/sqlcipher-3.4.1/src/btree.c:1391:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&temp[x], &data[x], (cbrk+size) - x);
data/sqlcipher-3.4.1/src/btree.c:1394:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data[cbrk], &src[pc], size);
data/sqlcipher-3.4.1/src/btree.c:1457:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&aData[iAddr], &aData[pc], 2);
data/sqlcipher-3.4.1/src/btree.c:2154:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zDbHeader[100];  /* Database header content */
data/sqlcipher-3.4.1/src/btree.c:2216:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zFullPathname, zFilename, nFilename);
data/sqlcipher-3.4.1/src/btree.c:3061:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data, zMagicHeader, sizeof(zMagicHeader));
data/sqlcipher-3.4.1/src/btree.c:4405:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPayload, pBuf, nByte);
data/sqlcipher-3.4.1/src/btree.c:4408:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pBuf, pPayload, nByte);
data/sqlcipher-3.4.1/src/btree.c:4610:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aSave, aWrite, 4);
data/sqlcipher-3.4.1/src/btree.c:4613:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(aWrite, aSave, 4);
data/sqlcipher-3.4.1/src/btree.c:5629:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pPage1->aData[32], &pTrunk->aData[0], 4);
data/sqlcipher-3.4.1/src/btree.c:5653:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pPage1->aData[32], &pTrunk->aData[0], 4);
data/sqlcipher-3.4.1/src/btree.c:5659:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pPrevTrunk->aData[0], &pTrunk->aData[0], 4);
data/sqlcipher-3.4.1/src/btree.c:5682:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&pNewTrunk->aData[0], &pTrunk->aData[0], 4);
data/sqlcipher-3.4.1/src/btree.c:5684:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&pNewTrunk->aData[8], &pTrunk->aData[12], (k-1)*4);
data/sqlcipher-3.4.1/src/btree.c:5749:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&aData[8+closest*4], &aData[4+k*4], 4);
data/sqlcipher-3.4.1/src/btree.c:6223:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pPayload, pSrc, n);
data/sqlcipher-3.4.1/src/btree.c:6330:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTemp, pCell, sz);
data/sqlcipher-3.4.1/src/btree.c:6365:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&data[idx], pCell, sz);
data/sqlcipher-3.4.1/src/btree.c:6462:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pTmp[i], &aData[i], usableSize - i);
data/sqlcipher-3.4.1/src/btree.c:6474:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pData, pCell, szCell[i]);
data/sqlcipher-3.4.1/src/btree.c:6637:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTmp, aData, pPg->pBt->usableSize);
data/sqlcipher-3.4.1/src/btree.c:6913:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aTo[iData], &aFrom[iData], pBt->usableSize-iData);
data/sqlcipher-3.4.1/src/btree.c:6914:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aTo[iToHdr], &aFrom[iFromHdr], pFrom->cellOffset + 2*pFrom->nCell);
data/sqlcipher-3.4.1/src/btree.c:7108:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&aOvflSpace[iOff], apDiv[i], szNew[i]);
data/sqlcipher-3.4.1/src/btree.c:7224:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTemp, apDiv[i], sz);
data/sqlcipher-3.4.1/src/btree.c:7233:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(b.apCell[b.nCell], &pOld->aData[8], 4);
data/sqlcipher-3.4.1/src/btree.c:7472:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&apNew[nNew-1]->aData[8], &pOld->aData[8], 4);
data/sqlcipher-3.4.1/src/btree.c:7546:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pNew->aData[8], pCell, 4);
data/sqlcipher-3.4.1/src/btree.c:7774:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pChild->aiOvfl, pRoot->aiOvfl,
data/sqlcipher-3.4.1/src/btree.c:7776:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pChild->apOvfl, pRoot->apOvfl,
data/sqlcipher-3.4.1/src/btree.c:8039:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newCell, oldCell, 4);
data/sqlcipher-3.4.1/src/btree.c:9329:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zErr[100];
data/sqlcipher-3.4.1/src/build.c:254:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char saveBuf[PARSE_TAIL_SZ];
data/sqlcipher-3.4.1/src/build.c:265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(saveBuf, PARSE_TAIL(pParse), PARSE_TAIL_SZ);
data/sqlcipher-3.4.1/src/build.c:270:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(PARSE_TAIL(pParse), saveBuf, PARSE_TAIL_SZ);
data/sqlcipher-3.4.1/src/build.c:497:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(db->aDbStatic, db->aDb, 2*sizeof(db->aDb[0]));
data/sqlcipher-3.4.1/src/build.c:1051:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(z, pName->z, pName->n);
data/sqlcipher-3.4.1/src/build.c:1082:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zType, pType->z, pType->n);
data/sqlcipher-3.4.1/src/build.c:1576:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zStmt[k], zType, len);
data/sqlcipher-3.4.1/src/build.c:1596:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zExtra, pIdx->azColl, sizeof(char*)*pIdx->nColumn);
data/sqlcipher-3.4.1/src/build.c:1599:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zExtra, pIdx->aiColumn, sizeof(i16)*pIdx->nColumn);
data/sqlcipher-3.4.1/src/build.c:1602:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zExtra, pIdx->aSortOrder, pIdx->nColumn);
data/sqlcipher-3.4.1/src/build.c:2407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zTab[24];
data/sqlcipher-3.4.1/src/build.c:2659:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(z, pTo->z, pTo->n);
data/sqlcipher-3.4.1/src/build.c:2687:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(z, pToCol->a[i].zName, n);
data/sqlcipher-3.4.1/src/build.c:3102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pIndex->zName, zName, nName+1);
data/sqlcipher-3.4.1/src/build.c:3175:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zExtra, zColl, nColl);
data/sqlcipher-3.4.1/src/build.c:3451:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&a[1], aVal, nCopy*sizeof(LogEst));
data/sqlcipher-3.4.1/src/callback.c:60:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pColl, pColl2, sizeof(CollSeq));
data/sqlcipher-3.4.1/src/callback.c:170:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pColl[0].zName, zName, nName);
data/sqlcipher-3.4.1/src/callback.c:411:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char*)&pBest[1], zName, nName+1);
data/sqlcipher-3.4.1/src/crypto.c:162:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      sqlcipher_set_default_kdf_iter(atoi(zRight)); // change default KDF iterations
data/sqlcipher-3.4.1/src/crypto.c:172:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sqlcipher_codec_ctx_set_kdf_iter(ctx, atoi(zRight), 2); // change of RW PBKDF2 iteration 
data/sqlcipher-3.4.1/src/crypto.c:183:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sqlcipher_codec_ctx_set_fast_kdf_iter(ctx, atoi(zRight), 2); // change of RW PBKDF2 iteration 
data/sqlcipher-3.4.1/src/crypto.c:192:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if(ctx) sqlcipher_codec_ctx_set_kdf_iter(ctx, atoi(zRight), 1); // write iterations only
data/sqlcipher-3.4.1/src/crypto.c:197:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int size = atoi(zRight);
data/sqlcipher-3.4.1/src/crypto.c:211:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      sqlcipher_set_default_pagesize(atoi(zRight));
data/sqlcipher-3.4.1/src/crypto.c:318:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if(pgno == 1) memcpy(buffer, SQLITE_FILE_HEADER, FILE_HEADER_SZ); /* copy file header to the first 16 bytes of the page */ 
data/sqlcipher-3.4.1/src/crypto.c:321:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pData, buffer, page_sz); /* copy buffer data back to pData and return */
data/sqlcipher-3.4.1/src/crypto.c:325:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if(pgno == 1) memcpy(buffer, kdf_salt, FILE_HEADER_SZ); /* copy salt to output buffer */ 
data/sqlcipher-3.4.1/src/crypto.c:331:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if(pgno == 1) memcpy(buffer, kdf_salt, FILE_HEADER_SZ); /* copy salt to output buffer */ 
data/sqlcipher-3.4.1/src/crypto_impl.c:277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ctx->provider, default_provider, sizeof(sqlcipher_provider));
data/sqlcipher-3.4.1/src/crypto_impl.c:384:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(target, source, sizeof(cipher_ctx));
data/sqlcipher-3.4.1/src/crypto_impl.c:387:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(target->key, source->key, CIPHER_MAX_KEY_SZ);
data/sqlcipher-3.4.1/src/crypto_impl.c:390:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(target->hmac_key, source->hmac_key, CIPHER_MAX_KEY_SZ);
data/sqlcipher-3.4.1/src/crypto_impl.c:393:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(target->provider, source->provider, sizeof(sqlcipher_provider));
data/sqlcipher-3.4.1/src/crypto_impl.c:401:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(target->pass, source->pass, source->pass_sz);
data/sqlcipher-3.4.1/src/crypto_impl.c:406:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(target->keyspec, source->keyspec, source->keyspec_sz);
data/sqlcipher-3.4.1/src/crypto_impl.c:468:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->pass, zKey, nKey);
data/sqlcipher-3.4.1/src/crypto_impl.c:753:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char pgno_raw[sizeof(pgno)];
data/sqlcipher-3.4.1/src/crypto_impl.c:767:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pgno_raw, &pgno, sizeof(pgno));
data/sqlcipher-3.4.1/src/crypto_impl.c:819:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(iv_out, iv_in, c_ctx->iv_sz); /* copy the iv from the input to output buffer */
data/sqlcipher-3.4.1/src/crypto_impl.c:922:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ctx->hmac_kdf_salt, ctx->kdf_salt, ctx->kdf_salt_sz);
data/sqlcipher-3.4.1/src/crypto_impl.c:1051:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(key, ctx->read_ctx->pass, ctx->read_ctx->pass_sz);
data/sqlcipher-3.4.1/src/crypto_impl.c:1219:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(destination, "a");
data/sqlcipher-3.4.1/src/crypto_libtomcrypt.c:70:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char random_buffer[FORTUNA_MAX_SZ];
data/sqlcipher-3.4.1/src/crypto_openssl.c:246:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(target_ctx, source_ctx, sizeof(openssl_ctx));
data/sqlcipher-3.4.1/src/date.c:584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *z, zBuf[30];
data/sqlcipher-3.4.1/src/date.c:855:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/date.c:875:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/date.c:894:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/date.c:931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/date.c:1118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[20];
data/sqlcipher-3.4.1/src/expr.c:752:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        if( pToken->n ) memcpy(pNew->u.zToken, pToken->z, pToken->n);
data/sqlcipher-3.4.1/src/expr.c:1192:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zAlloc, p, nNewSize);
data/sqlcipher-3.4.1/src/expr.c:1195:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zAlloc, p, nSize);
data/sqlcipher-3.4.1/src/expr.c:1209:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zToken, p->u.zToken, nToken);
data/sqlcipher-3.4.1/src/fkey.c:1289:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((char *)pStep->zTarget, zFrom, nFrom);
data/sqlcipher-3.4.1/src/func.c:979:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[50];
data/sqlcipher-3.4.1/src/func.c:1223:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&zOut[j], zRep, nRep);
data/sqlcipher-3.4.1/src/func.c:1229:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&zOut[j], &zStr[i], nStr-i);
data/sqlcipher-3.4.1/src/func.c:1357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zResult[8];
data/sqlcipher-3.4.1/src/func.c:1406:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *zFile = (const char *)sqlite3_value_text(argv[0]);
data/sqlcipher-3.4.1/src/func.c:1420:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    zProc = (const char *)sqlite3_value_text(argv[1]);
data/sqlcipher-3.4.1/src/func.c:1728:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aWc, pDef->pUserData, 3);
data/sqlcipher-3.4.1/src/global.c:91:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char sqlite3CtypeMap[256] = {
data/sqlcipher-3.4.1/src/legacy.c:132:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(*pzErrMsg, sqlite3_errmsg(db), nErrMsg);
data/sqlcipher-3.4.1/src/loadext.c:528:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zAltEntry, "sqlite3_", 8);
data/sqlcipher-3.4.1/src/loadext.c:537:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zAltEntry+iEntry, "_init", 6);
data/sqlcipher-3.4.1/src/loadext.c:573:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aHandle, db->aExtension, sizeof(handle)*db->nExtension);
data/sqlcipher-3.4.1/src/main.c:274:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&y, &x, 8);
data/sqlcipher-3.4.1/src/main.c:1371:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char zBuf[50];
data/sqlcipher-3.4.1/src/main.c:2727:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zFile, zUri, nUri);
data/sqlcipher-3.4.1/src/main.c:3070:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zKey[40];
data/sqlcipher-3.4.1/src/malloc.c:685:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNew, p, db->lookaside.sz);
data/sqlcipher-3.4.1/src/malloc.c:733:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zNew, z, n);
data/sqlcipher-3.4.1/src/malloc.c:746:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zNew, z, (size_t)n);
data/sqlcipher-3.4.1/src/mem2.c:105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTitle[100];  /* The title text */
data/sqlcipher-3.4.1/src/mem2.c:275:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBt, &aAddr[1], pHdr->nBacktrace*sizeof(void*));
data/sqlcipher-3.4.1/src/mem2.c:284:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(z, mem.zTitle, mem.nTitle);
data/sqlcipher-3.4.1/src/mem2.c:351:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew, pPrior, (int)(nByte<pOldHdr->iSize ? nByte : pOldHdr->iSize));
data/sqlcipher-3.4.1/src/mem2.c:457:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(mem.zTitle, zTitle, n);
data/sqlcipher-3.4.1/src/mem2.c:481:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(zFilename, "w");
data/sqlcipher-3.4.1/src/mem3.c:539:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, pPrior, nOld);
data/sqlcipher-3.4.1/src/mem3.c:541:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, pPrior, nBytes);
data/sqlcipher-3.4.1/src/mem3.c:597:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(zFilename, "w");
data/sqlcipher-3.4.1/src/mem5.c:406:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, pPrior, nOld);
data/sqlcipher-3.4.1/src/mem5.c:527:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(zFilename, "w");
data/sqlcipher-3.4.1/src/memjournal.c:124:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zOut, (u8*)pChunk->zChunk + iChunkOffset, nCopy);
data/sqlcipher-3.4.1/src/memjournal.c:221:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy((u8*)p->pFirst->zChunk, zBuf, iAmt);
data/sqlcipher-3.4.1/src/memjournal.c:249:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((u8*)p->endpoint.pChunk->zChunk + iChunkOffset, zWrite, iSpace);
data/sqlcipher-3.4.1/src/notify.c:263:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pNew, aArg, nArg*sizeof(void *));
data/sqlcipher-3.4.1/src/os_unix.c:254:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aPadding[32];
data/sqlcipher-3.4.1/src/os_unix.c:340:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return open(zFile, flags, mode);
data/sqlcipher-3.4.1/src/os_unix.c:915:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zCanonicalName, zAbsoluteName, n+1);
data/sqlcipher-3.4.1/src/os_unix.c:1093:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aSemName[MAX_PATHNAME+2];  /* Name of that semaphore */
data/sqlcipher-3.4.1/src/os_unix.c:1133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aErr[80];
data/sqlcipher-3.4.1/src/os_unix.c:1321:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pInode->fileId, &fileId, sizeof(fileId));
data/sqlcipher-3.4.1/src/os_unix.c:3190:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], amt);
data/sqlcipher-3.4.1/src/os_unix.c:3194:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], nCopy);
data/sqlcipher-3.4.1/src/os_unix.c:3309:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char oldCntr[4];
data/sqlcipher-3.4.1/src/os_unix.c:3325:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, amt);
data/sqlcipher-3.4.1/src/os_unix.c:3329:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, nCopy);
data/sqlcipher-3.4.1/src/os_unix.c:3512:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zDirname[MAX_PATHNAME+1];
data/sqlcipher-3.4.1/src/os_unix.c:5586:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zDb[MAX_PATHNAME+1];     /* Database file path */
data/sqlcipher-3.4.1/src/os_unix.c:5615:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDb, zPath, nDb);
data/sqlcipher-3.4.1/src/os_unix.c:5696:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTmpname[MAX_PATHNAME+2];
data/sqlcipher-3.4.1/src/os_unix.c:5876:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      useProxy = atoi(envforce)>0;
data/sqlcipher-3.4.1/src/os_unix.c:6078:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(zDel, zIn, n);
data/sqlcipher-3.4.1/src/os_unix.c:6193:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zBuf, &t, sizeof(t));
data/sqlcipher-3.4.1/src/os_unix.c:6194:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&zBuf[sizeof(t)], &randomnessPid, sizeof(randomnessPid));
data/sqlcipher-3.4.1/src/os_unix.c:6537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/sqlcipher-3.4.1/src/os_unix.c:6715:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tPath[MAXPATHLEN];
data/sqlcipher-3.4.1/src/os_unix.c:6716:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PROXY_MAXCONCHLEN];
data/sqlcipher-3.4.1/src/os_unix.c:6720:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmsg[64] = "";
data/sqlcipher-3.4.1/src/os_unix.c:6809:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tBuf[PROXY_MAXCONCHLEN];
data/sqlcipher-3.4.1/src/os_unix.c:6859:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char readBuf[PROXY_MAXCONCHLEN];
data/sqlcipher-3.4.1/src/os_unix.c:6860:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lockPath[MAXPATHLEN];
data/sqlcipher-3.4.1/src/os_unix.c:6916:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(lockPath, &readBuf[PROXY_PATHINDEX], pathLen);
data/sqlcipher-3.4.1/src/os_unix.c:6962:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char writeBuffer[PROXY_MAXCONCHLEN];
data/sqlcipher-3.4.1/src/os_unix.c:6966:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&writeBuffer[PROXY_HEADERLEN], myHostID, PROXY_HOSTIDLEN);
data/sqlcipher-3.4.1/src/os_unix.c:7113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(conchPath, dbPath, len+1);
data/sqlcipher-3.4.1/src/os_unix.c:7129:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&conchPath[i+1], "-conch", 7);
data/sqlcipher-3.4.1/src/os_unix.c:7189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dbPath, (char *)pFile->lockingContext, len + 1);
data/sqlcipher-3.4.1/src/os_unix.c:7208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbPath[MAXPATHLEN+1];       /* Name of the database file */
data/sqlcipher-3.4.1/src/os_win.c:898:41:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  { "MultiByteToWideChar",     (SYSCALL)MultiByteToWideChar,     0 },
data/sqlcipher-3.4.1/src/os_win.c:1316:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zDbgBuf[SQLITE_WIN32_DBG_BUF_SIZE];
data/sqlcipher-3.4.1/src/os_win.c:1329:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDbgBuf, zBuf, nMin);
data/sqlcipher-3.4.1/src/os_win.c:1345:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDbgBuf, zBuf, nMin);
data/sqlcipher-3.4.1/src/os_win.c:2031:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMsg[500];                 /* Human readable error text */
data/sqlcipher-3.4.1/src/os_win.c:2685:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], amt);
data/sqlcipher-3.4.1/src/os_win.c:2691:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pBuf, &((u8 *)(pFile->pMapRegion))[offset], nCopy);
data/sqlcipher-3.4.1/src/os_win.c:2763:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, amt);
data/sqlcipher-3.4.1/src/os_win.c:2769:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&((u8 *)(pFile->pMapRegion))[offset], pBuf, nCopy);
data/sqlcipher-3.4.1/src/pager.c:671:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dbFileVers[16];        /* Changes whenever database file changes */
data/sqlcipher-3.4.1/src/pager.c:981:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zRet[1024];
data/sqlcipher-3.4.1/src/pager.c:1062:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ac[4];
data/sqlcipher-3.4.1/src/pager.c:1081:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ac[4];
data/sqlcipher-3.4.1/src/pager.c:1253:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aMagic[8];   /* A buffer to hold the magic header */
data/sqlcipher-3.4.1/src/pager.c:1345:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static const char zeroHdr[28] = {0};
data/sqlcipher-3.4.1/src/pager.c:1433:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zHeader, aJournalMagic, sizeof(aJournalMagic));
data/sqlcipher-3.4.1/src/pager.c:1510:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aMagic[8];     /* A buffer to hold the magic header */
data/sqlcipher-3.4.1/src/pager.c:2392:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pData, (u8*)aData, pPager->pageSize);
data/sqlcipher-3.4.1/src/pager.c:4174:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zHeader, aJournalMagic, sizeof(aJournalMagic));
data/sqlcipher-3.4.1/src/pager.c:4689:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPager->zFilename, zPathname, nPathname);
data/sqlcipher-3.4.1/src/pager.c:4690:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if( nUri ) memcpy(&pPager->zFilename[nPathname+1], zUri, nUri);
data/sqlcipher-3.4.1/src/pager.c:4691:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPager->zJournal, zPathname, nPathname);
data/sqlcipher-3.4.1/src/pager.c:4692:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pPager->zJournal[nPathname], "-journal\000", 8+2);
data/sqlcipher-3.4.1/src/pager.c:4696:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPager->zWal, zPathname, nPathname);
data/sqlcipher-3.4.1/src/pager.c:4697:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pPager->zWal[nPathname], "-wal\000", 4+1);
data/sqlcipher-3.4.1/src/pager.c:5188:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dbFileVers[sizeof(pPager->dbFileVers)];
data/sqlcipher-3.4.1/src/pager.c:6096:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          const void *pCopy = (const void *)&((const char *)zBuf)[24];
data/sqlcipher-3.4.1/src/pragma.c:306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *aFcntl[4];       /* Argument to SQLITE_FCNTL_PRAGMA */
data/sqlcipher-3.4.1/src/pragma.c:1968:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zKey[40];
data/sqlcipher-3.4.1/src/prepare.c:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *azArg[4];
data/sqlcipher-3.4.1/src/printf.c:210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[etBUFSIZE];       /* Conversion buffer */
data/sqlcipher-3.4.1/src/printf.c:492:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf+(prefix!=0),"Inf",4);
data/sqlcipher-3.4.1/src/printf.c:791:42:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( !isMalloced(p) && p->nChar>0 ) memcpy(zNew, p->zText, p->nChar);
data/sqlcipher-3.4.1/src/printf.c:827:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->zText[p->nChar], z, N);
data/sqlcipher-3.4.1/src/printf.c:847:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->zText[p->nChar-N], z, N);
data/sqlcipher-3.4.1/src/printf.c:871:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p->zText, p->zBase, p->nChar+1);
data/sqlcipher-3.4.1/src/printf.c:923:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBase[SQLITE_PRINT_BUF_SIZE];
data/sqlcipher-3.4.1/src/printf.c:956:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBase[SQLITE_PRINT_BUF_SIZE];
data/sqlcipher-3.4.1/src/printf.c:1042:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMsg[SQLITE_PRINT_BUF_SIZE*3];    /* Complete log message */
data/sqlcipher-3.4.1/src/printf.c:1071:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[500];
data/sqlcipher-3.4.1/src/random.c:27:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char s[256];          /* State variables */
data/sqlcipher-3.4.1/src/random.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char k[256];
data/sqlcipher-3.4.1/src/random.c:121:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(
data/sqlcipher-3.4.1/src/random.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(
data/sqlcipher-3.4.1/src/resolve.c:96:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pExpr, pDup, sizeof(*pExpr));
data/sqlcipher-3.4.1/src/select.c:1740:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pCol->zName[n+1], zType, m+1);
data/sqlcipher-3.4.1/src/shell.c:369:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mainPrompt[20];     /* First line prompt. default: "sqlite> "*/
data/sqlcipher-3.4.1/src/shell.c:370:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char continuePrompt[20]; /* Continuation prompt. default: "   ...> " */
data/sqlcipher-3.4.1/src/shell.c:539:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zLine, zTrans, nTrans);
data/sqlcipher-3.4.1/src/shell.c:633:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTestcase[30];    /* Name of current test case */
data/sqlcipher-3.4.1/src/shell.c:634:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char colSeparator[20]; /* Column separator character for several modes */
data/sqlcipher-3.4.1/src/shell.c:635:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rowSeparator[20]; /* Row separator character for MODE_Ascii */
data/sqlcipher-3.4.1/src/shell.c:638:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nullValue[20];    /* The text to print when a NULL comes back from
data/sqlcipher-3.4.1/src/shell.c:640:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outfile[FILENAME_MAX]; /* Filename for *out */
data/sqlcipher-3.4.1/src/shell.c:928:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *az[4];
data/sqlcipher-3.4.1/src/shell.c:1344:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zIn[nIn], zAppend, nAppend);
data/sqlcipher-3.4.1/src/shell.c:1418:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zErrMsg, sqlite3_errmsg(db), nErrMsg);
data/sqlcipher-3.4.1/src/shell.c:1429:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[200];
data/sqlcipher-3.4.1/src/shell.c:1431:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(z, "rb");
data/sqlcipher-3.4.1/src/shell.c:2254:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *in = fopen(zName, "rb");
data/sqlcipher-3.4.1/src/shell.c:2313:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(zFile, "wb");
data/sqlcipher-3.4.1/src/shell.c:2562:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(zFile, "wb");
data/sqlcipher-3.4.1/src/shell.c:2777:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zInsert+i, ",?", 2);
data/sqlcipher-3.4.1/src/shell.c:2780:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zInsert+i, ");", 3);
data/sqlcipher-3.4.1/src/shell.c:3028:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aHdr[100];
data/sqlcipher-3.4.1/src/shell.c:3228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *azArg[50];
data/sqlcipher-3.4.1/src/shell.c:3662:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      sCtx.in = fopen(sCtx.zFile, "rb");
data/sqlcipher-3.4.1/src/shell.c:3853:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      iotrace = fopen(azArg[1], "w");
data/sqlcipher-3.4.1/src/shell.c:4121:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    alt = fopen(azArg[1], "rb");
data/sqlcipher-3.4.1/src/shell.c:4211:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *new_argv[2], *new_colv[2];
data/sqlcipher-3.4.1/src/shell.c:4225:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *new_argv[2], *new_colv[2];
data/sqlcipher-3.4.1/src/shell.c:4333:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      out = fopen(azCmd[1], "wb");
data/sqlcipher-3.4.1/src/shell.c:4494:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zBuf[200];
data/sqlcipher-3.4.1/src/shell.c:5135:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zLine,";",2);
data/sqlcipher-3.4.1/src/shell.c:5151:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zSql, zLine+i, nLine+1-i);
data/sqlcipher-3.4.1/src/shell.c:5156:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zSql+nSql, zLine, nLine+1);
data/sqlcipher-3.4.1/src/shell.c:5168:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zPrefix[100];
data/sqlcipher-3.4.1/src/shell.c:5270:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if( z ) memcpy(z, home_dir, n);
data/sqlcipher-3.4.1/src/shell.c:5303:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(sqliterc,"rb");
data/sqlcipher-3.4.1/src/shell.c:5372:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data->colSeparator,SEP_Column, 2);
data/sqlcipher-3.4.1/src/shell.c:5373:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data->rowSeparator,SEP_Row, 2);
data/sqlcipher-3.4.1/src/shell.c:5644:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(data.colSeparator,",",2);
data/sqlcipher-3.4.1/src/sqlite3ext.h:113:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int  (*open)(const char*,sqlite3**);
data/sqlcipher-3.4.1/src/sqlite3ext.h:386:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define sqlite3_open                   sqlite3_api->open
data/sqlcipher-3.4.1/src/sqliteInt.h:2654:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zSelName[12];     /* Symbolic name of this SELECT use for debugging */
data/sqlcipher-3.4.1/src/sqliteInt.h:2847:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef unsigned char yDbMask[(SQLITE_MAX_ATTACHED+9)/8];
data/sqlcipher-3.4.1/src/table.c:95:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(z, argv[i], n);
data/sqlcipher-3.4.1/src/tclsqlite.c:389:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zChannel[64];
data/sqlcipher-3.4.1/src/tclsqlite.c:458:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zName, zName, nName+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:566:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zVal[30];
data/sqlcipher-3.4.1/src/tclsqlite.c:570:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( rc!=TCL_OK || atoi(Tcl_GetStringResult(pDb->interp)) ){
data/sqlcipher-3.4.1/src/tclsqlite.c:586:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( rc!=TCL_OK || atoi(Tcl_GetStringResult(pDb->interp)) ){
data/sqlcipher-3.4.1/src/tclsqlite.c:697:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTm[100];
data/sqlcipher-3.4.1/src/tclsqlite.c:721:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( rc!=TCL_OK || atoi(Tcl_GetStringResult(pDb->interp)) ){
data/sqlcipher-3.4.1/src/tclsqlite.c:767:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[64];
data/sqlcipher-3.4.1/src/tclsqlite.c:890:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  return (atoi(Tcl_GetStringResult(p->interp)));
data/sqlcipher-3.4.1/src/tclsqlite.c:1319:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zCopy, zSql, pPreStmt->nSql);
data/sqlcipher-3.4.1/src/tclsqlite.c:1905:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zAuth, zAuth, len+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:1995:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zBusy, zBusy, len+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:2108:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pCollate->zScript, zScript, nScript+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:2161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zCommit, zCommit, len+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:2229:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLineNum[80];          /* Line number print buffer */
data/sqlcipher-3.4.1/src/tclsqlite.c:2308:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = fopen(zFile, "rb");
data/sqlcipher-3.4.1/src/tclsqlite.c:2501:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      if( objc==5 && *(char *)Tcl_GetString(objv[3]) ){
data/sqlcipher-3.4.1/src/tclsqlite.c:2651:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zNull, zNull, len);
data/sqlcipher-3.4.1/src/tclsqlite.c:2706:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zProgress, zProgress, len+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:2748:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zProfile, zProfile, len+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:2936:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zTrace, zTrace, len+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:3019:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pDb->zTraceV2, zTraceV2, len+1);
data/sqlcipher-3.4.1/src/tclsqlite.c:3555:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char in[64];
data/sqlcipher-3.4.1/src/tclsqlite.c:3708:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(p, buf, len);
data/sqlcipher-3.4.1/src/tclsqlite.c:3711:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(p, buf, t);
data/sqlcipher-3.4.1/src/tclsqlite.c:3721:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(ctx->in, buf, 64);
data/sqlcipher-3.4.1/src/tclsqlite.c:3730:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->in, buf, len);
data/sqlcipher-3.4.1/src/tclsqlite.c:3737:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5Final(unsigned char digest[16], MD5Context *ctx){
data/sqlcipher-3.4.1/src/tclsqlite.c:3768:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ctx->in + 14*4, ctx->bits, 8);
data/sqlcipher-3.4.1/src/tclsqlite.c:3772:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(digest, ctx->buf, 16);
data/sqlcipher-3.4.1/src/tclsqlite.c:3796:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5DigestToBase10x8(unsigned char digest[16], char zDigest[50]){
data/sqlcipher-3.4.1/src/tclsqlite.c:3796:59:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5DigestToBase10x8(unsigned char digest[16], char zDigest[50]){
data/sqlcipher-3.4.1/src/tclsqlite.c:3819:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[16];
data/sqlcipher-3.4.1/src/tclsqlite.c:3820:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/tclsqlite.c:3850:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[16];
data/sqlcipher-3.4.1/src/tclsqlite.c:3851:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[10240];
data/sqlcipher-3.4.1/src/tclsqlite.c:3858:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(argv[1],"rb");
data/sqlcipher-3.4.1/src/tclsqlite.c:3919:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[16];
data/sqlcipher-3.4.1/src/tclsqlite.c:3920:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[33];
data/sqlcipher-3.4.1/src/tclsqlite.c:4055:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/tclsqlite.c:4253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zArgc[32];
data/sqlcipher-3.4.1/src/test1.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test1.c:147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[200];
data/sqlcipher-3.4.1/src/test1.c:253:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      iotrace_file = fopen(argv[1], "w");
data/sqlcipher-3.4.1/src/test1.c:307:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[30];
data/sqlcipher-3.4.1/src/test1.c:345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zSql[501];
data/sqlcipher-3.4.1/src/test1.c:346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[30];
data/sqlcipher-3.4.1/src/test1.c:430:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[30];
data/sqlcipher-3.4.1/src/test1.c:545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zStr[100];
data/sqlcipher-3.4.1/src/test1.c:546:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int n = atoi(argv[1]);
data/sqlcipher-3.4.1/src/test1.c:548:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int a1 = atoi(argv[3]);
data/sqlcipher-3.4.1/src/test1.c:578:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[30];
data/sqlcipher-3.4.1/src/test1.c:635:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[30];
data/sqlcipher-3.4.1/src/test1.c:779:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[200];
data/sqlcipher-3.4.1/src/test1.c:791:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[400];
data/sqlcipher-3.4.1/src/test1.c:829:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&p->z[p->nUsed], z, n+1);
data/sqlcipher-3.4.1/src/test1.c:909:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCopy, zText1, nText);
data/sqlcipher-3.4.1/src/test1.c:2305:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/test1.c:2427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test1.c:2685:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[50];
data/sqlcipher-3.4.1/src/test1.c:2876:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char zNeededCollation[200];
data/sqlcipher-3.4.1/src/test1.c:3507:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&value, &x, 8);
data/sqlcipher-3.4.1/src/test1.c:3687:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[200];
data/sqlcipher-3.4.1/src/test1.c:3959:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test1.c:4017:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test1.c:4034:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCopy, zSql, bytes);
data/sqlcipher-3.4.1/src/test1.c:4038:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCopy, zSql, n);
data/sqlcipher-3.4.1/src/test1.c:4082:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test1.c:4128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50]; 
data/sqlcipher-3.4.1/src/test1.c:4188:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50]; 
data/sqlcipher-3.4.1/src/test1.c:4239:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test1.c:4269:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test1.c:4337:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test1.c:4923:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[30];
data/sqlcipher-3.4.1/src/test1.c:5613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char proxyPath[400];
data/sqlcipher-3.4.1/src/test1.c:5662:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[100];
data/sqlcipher-3.4.1/src/test1.c:5695:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[100];
data/sqlcipher-3.4.1/src/test1.c:5727:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[100];
data/sqlcipher-3.4.1/src/test1.c:5763:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[100];
data/sqlcipher-3.4.1/src/test1.c:5795:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[100];
data/sqlcipher-3.4.1/src/test1.c:6469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/sqlcipher-3.4.1/src/test1.c:6545:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[200];
data/sqlcipher-3.4.1/src/test2.c:55:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test2.c:270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/test2.c:290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test2.c:316:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test2.c:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test2.c:427:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test2.c:451:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test2.c:529:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zFile, argv[2], nFile+1);
data/sqlcipher-3.4.1/src/test2.c:584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zInt[30];
data/sqlcipher-3.4.1/src/test2.c:589:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(faultSimScript+faultSimScriptSize, "0", 2);
data/sqlcipher-3.4.1/src/test2.c:603:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(faultSimScript+faultSimScriptSize, zInt+i+1, sizeof(zInt)-i);
data/sqlcipher-3.4.1/src/test2.c:610:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    rc = atoi(Tcl_GetStringResult(faultSimInterp));
data/sqlcipher-3.4.1/src/test2.c:650:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(faultSimScript, zScript, nScript);
data/sqlcipher-3.4.1/src/test2.c:685:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    aProg[nProg++] = atoi(z);
data/sqlcipher-3.4.1/src/test3.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test3.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zFilename, argv[1], n+1);
data/sqlcipher-3.4.1/src/test3.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/test3.c:211:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[30];
data/sqlcipher-3.4.1/src/test3.c:300:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test3.c:335:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test3.c:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test3.c:398:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test3.c:437:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zBuf[100];
data/sqlcipher-3.4.1/src/test3.c:450:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zErr[200];
data/sqlcipher-3.4.1/src/test3.c:518:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test3.c:535:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    iDb = atoi(argv[2]);
data/sqlcipher-3.4.1/src/test4.c:52:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *argv[100];    /* result columns */
data/sqlcipher-3.4.1/src/test4.c:53:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *colv[100];    /* result column names */
data/sqlcipher-3.4.1/src/test4.c:263:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test4.c:610:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test4.c:673:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test5.c:168:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(z, zTmp, len);
data/sqlcipher-3.4.1/src/test6.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zCrashFile[500];        /* Crash during an xSync() on this file */ 
data/sqlcipher-3.4.1/src/test6.c:381:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew->zBuf, zBuf, nBuf);
data/sqlcipher-3.4.1/src/test6.c:418:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zBuf, &pCrash->zData[iOfst], nCopy);
data/sqlcipher-3.4.1/src/test6.c:453:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pCrash->zData[iOfst], zBuf, iAmt);
data/sqlcipher-3.4.1/src/test6.c:949:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(g.zCrashFile, zCrashFile, nCrashFile+1);
data/sqlcipher-3.4.1/src/test7.c:74:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *argv[100];   /* result columns */
data/sqlcipher-3.4.1/src/test7.c:75:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *colv[100];   /* result column names */
data/sqlcipher-3.4.1/src/test7.c:308:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test8.c:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zVarname[128];
data/sqlcipher-3.4.1/src/test_bestindex.c:189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zCmd, argv[3], strlen(argv[3])+1);
data/sqlcipher-3.4.1/src/test_blob.c:38:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[100];
data/sqlcipher-3.4.1/src/test_demovfs.c:286:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&p->aBuffer[p->nBuffer], z, nCopy);
data/sqlcipher-3.4.1/src/test_demovfs.c:434:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  p->fd = open(zName, oflags, 0600);
data/sqlcipher-3.4.1/src/test_demovfs.c:462:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zDir[MAXPATHNAME+1];     /* Name of directory containing file zPath */
data/sqlcipher-3.4.1/src/test_demovfs.c:471:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    dfd = open(zDir, O_RDONLY, 0);
data/sqlcipher-3.4.1/src/test_demovfs.c:535:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zDir[MAXPATHNAME+1];
data/sqlcipher-3.4.1/src/test_fs.c:243:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pCsr->entry, pRes, sizeof(struct DIRENT));
data/sqlcipher-3.4.1/src/test_fs.c:286:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pCsr->zDir, zDir, nDir+1);
data/sqlcipher-3.4.1/src/test_fs.c:468:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    pCsr->fd = open((const char*)sqlite3_column_text(pCsr->pStmt, 0), O_RDONLY);
data/sqlcipher-3.4.1/src/test_fs.c:499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aWild[2] = { '\0', '\0' };
data/sqlcipher-3.4.1/src/test_fs.c:650:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pVtab->zTbl, zTbl, strlen(zTbl));
data/sqlcipher-3.4.1/src/test_fs.c:651:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pVtab->zDb, zDb, strlen(zDb));
data/sqlcipher-3.4.1/src/test_fs.c:741:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(zFile, O_RDONLY);
data/sqlcipher-3.4.1/src/test_func.c:52:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zBuf[1000];
data/sqlcipher-3.4.1/src/test_func.c:118:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zVal, sqlite3_value_text(argv[0]), len);
data/sqlcipher-3.4.1/src/test_func.c:141:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zVal, sqlite3_value_text16(argv[0]), len);
data/sqlcipher-3.4.1/src/test_func.c:212:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zAux, z, n);
data/sqlcipher-3.4.1/src/test_func.c:444:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char x[8];
data/sqlcipher-3.4.1/src/test_func.c:446:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zOut[20];
data/sqlcipher-3.4.1/src/test_func.c:567:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char hex[3];
data/sqlcipher-3.4.1/src/test_hexio.c:124:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zFile, "rb");
data/sqlcipher-3.4.1/src/test_hexio.c:126:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = fopen(zFile, "r");
data/sqlcipher-3.4.1/src/test_hexio.c:170:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zIn = (const unsigned char *)Tcl_GetStringFromObj(objv[3], &nIn);
data/sqlcipher-3.4.1/src/test_hexio.c:176:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(zFile, "r+b");
data/sqlcipher-3.4.1/src/test_hexio.c:178:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen(zFile, "r+");
data/sqlcipher-3.4.1/src/test_hexio.c:209:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aNum[4];
data/sqlcipher-3.4.1/src/test_hexio.c:215:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zIn = (const unsigned char *)Tcl_GetStringFromObj(objv[1], &nIn);
data/sqlcipher-3.4.1/src/test_hexio.c:222:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aNum, aOut, 4);
data/sqlcipher-3.4.1/src/test_hexio.c:225:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aNum[4-nOut], aOut, nOut);
data/sqlcipher-3.4.1/src/test_hexio.c:246:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aNum[10];
data/sqlcipher-3.4.1/src/test_hexio.c:273:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aNum[10];
data/sqlcipher-3.4.1/src/test_hexio.c:311:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  zOrig = (unsigned char *)Tcl_GetStringFromObj(objv[1], &n);
data/sqlcipher-3.4.1/src/test_intarray.c:306:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zPtr[100];
data/sqlcipher-3.4.1/src/test_journal.c:435:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zBuf[28];
data/sqlcipher-3.4.1/src/test_malloc.c:264:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&n, &p, sizeof(p));
data/sqlcipher-3.4.1/src/test_malloc.c:298:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pp, &n, sizeof(n));
data/sqlcipher-3.4.1/src/test_malloc.c:301:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pp, &u, sizeof(u));
data/sqlcipher-3.4.1/src/test_malloc.c:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zOut[100];
data/sqlcipher-3.4.1/src/test_malloc.c:346:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zOut[100];
data/sqlcipher-3.4.1/src/test_malloc.c:408:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBin[100];
data/sqlcipher-3.4.1/src/test_malloc.c:453:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zHex[100];
data/sqlcipher-3.4.1/src/test_malloc.c:477:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zHex, zBin, n);
data/sqlcipher-3.4.1/src/test_malloc.c:770:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(aKey, aFrame, nKey);
data/sqlcipher-3.4.1/src/test_malloc.c:1089:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char azBuf[2][10000];
data/sqlcipher-3.4.1/src/test_multiplex.c:260:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zOut, zBase, n+1);
data/sqlcipher-3.4.1/src/test_multiplex.c:550:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pGroup->zName, zName, nName+1);
data/sqlcipher-3.4.1/src/test_mutex.c:32:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *aName[MAX_MUTEXES+1] = {
data/sqlcipher-3.4.1/src/test_mutex.c:323:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test_onefile.c:276:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zBuf, &pTmp->zAlloc[iOfst], iAmt);
data/sqlcipher-3.4.1/src/test_onefile.c:299:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pTmp->zAlloc[iOfst], zBuf, iAmt);
data/sqlcipher-3.4.1/src/test_onefile.c:426:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      rc = pF->pMethods->xRead(pF, &((char *)zBuf)[iBuf], iRealAmt, iRealOff);
data/sqlcipher-3.4.1/src/test_onefile.c:471:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        rc = pF->pMethods->xWrite(pF, &((char *)zBuf)[iBuf], iRealAmt,iRealOff);
data/sqlcipher-3.4.1/src/test_onefile.c:509:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char zSize[4];
data/sqlcipher-3.4.1/src/test_onefile.c:643:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char zS[4];
data/sqlcipher-3.4.1/src/test_osinst.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aBuf[VFSLOG_BUFFERSIZE];   /* Write buffer */
data/sqlcipher-3.4.1/src/test_osinst.c:686:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zRec[4], zStr, nStr);
data/sqlcipher-3.4.1/src/test_osinst.c:735:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&p->base, &vfslog_vfs, sizeof(sqlite3_vfs));
data/sqlcipher-3.4.1/src/test_osinst.c:738:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)p->base.zName, zVfs, nVfs);
data/sqlcipher-3.4.1/src/test_osinst.c:747:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->aBuf, "sqlite_ostrace1.....", 20);
data/sqlcipher-3.4.1/src/test_osinst.c:827:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aBuf[1024];       /* Current vfs log entry (read from file) */
data/sqlcipher-3.4.1/src/test_osinst.c:983:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[4];
data/sqlcipher-3.4.1/src/test_quota.c:362:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pFile->zFilename, zName, nName+1);
data/sqlcipher-3.4.1/src/test_quota.c:387:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  nWide = MultiByteToWideChar(CP_UTF8, 0, zUtf8, -1, NULL, 0);
data/sqlcipher-3.4.1/src/test_quota.c:391:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  MultiByteToWideChar(CP_UTF8, 0, zUtf8, -1, zTmpWide, nWide);
data/sqlcipher-3.4.1/src/test_quota.c:869:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)pGroup->zPattern, zPattern, nPattern+1);
data/sqlcipher-3.4.1/src/test_quota.c:904:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    zFull = &((char *)fd)[gQuota.sThisVfs.szOsFile];
data/sqlcipher-3.4.1/src/test_quota.c:954:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  p->f = fopen(zFullTranslated, zMode);
data/sqlcipher-3.4.1/src/test_quota.c:1516:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zTemp[1000];
data/sqlcipher-3.4.1/src/test_quota.c:1549:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zReturn[50];               /* Name of pointer to return */
data/sqlcipher-3.4.1/src/test_sqllog.c:128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zPrefix[SQLLOG_NAMESZ];    /* Prefix for all created files */
data/sqlcipher-3.4.1/src/test_sqllog.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zIdx[SQLLOG_NAMESZ];       /* Full path to *.idx file */
data/sqlcipher-3.4.1/src/test_sqllog.c:180:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = fopen(sqllogglobal.zIdx, "r");
data/sqlcipher-3.4.1/src/test_sqllog.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLine[SQLLOG_NAMESZ*2+5];
data/sqlcipher-3.4.1/src/test_sqllog.c:204:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zBuf[16];
data/sqlcipher-3.4.1/src/test_sqllog.c:248:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zName, zVal1, nVal1+1);
data/sqlcipher-3.4.1/src/test_sqllog.c:253:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zFile, zVal2, nVal2+1);
data/sqlcipher-3.4.1/src/test_sqllog.c:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zName[SQLLOG_NAMESZ];      /* Attached database name */
data/sqlcipher-3.4.1/src/test_sqllog.c:293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zFile[SQLLOG_NAMESZ];      /* Database file name */
data/sqlcipher-3.4.1/src/test_sqllog.c:338:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *fd = fopen(sqllogglobal.zIdx, "a");
data/sqlcipher-3.4.1/src/test_sqllog.c:383:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        sqllogglobal.bReuse = atoi(getenv(ENVIRONMENT_VARIABLE2_NAME));
data/sqlcipher-3.4.1/src/test_sqllog.c:385:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = fopen(sqllogglobal.zIdx, "w");
data/sqlcipher-3.4.1/src/test_sqllog.c:391:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    p->fd = fopen(zLog, "w");
data/sqlcipher-3.4.1/src/test_sqllog.c:429:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zFile[SQLLOG_NAMESZ];      /* Attached database name */
data/sqlcipher-3.4.1/src/test_sqllog.c:439:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&zFile[nFile], "-sqllog", 8);
data/sqlcipher-3.4.1/src/test_syscall.c:155:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define orig_open      ((int(*)(const char *, int, int))aSyscall[0].xOrig)
data/sqlcipher-3.4.1/src/test_thread.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pEvent->zScript, zMsg, nMsg+1);
data/sqlcipher-3.4.1/src/test_thread.c:201:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zVarname, zVarname, nVarname+1);
data/sqlcipher-3.4.1/src/test_thread.c:202:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew->zScript, zScript, nScript+1);
data/sqlcipher-3.4.1/src/test_thread.c:251:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pEvent->zScript, zMsg, nMsg+1);
data/sqlcipher-3.4.1/src/test_thread.c:282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test_thread.c:587:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test_vfs.c:477:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLock[30];
data/sqlcipher-3.4.1/src/test_vfs.c:492:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLock[30];
data/sqlcipher-3.4.1/src/test_vfs.c:527:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int x = atoi(z);
data/sqlcipher-3.4.1/src/test_vfs.c:649:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pMethods, &tvfs_io_methods, nByte);
data/sqlcipher-3.4.1/src/test_vfs.c:834:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pBuffer->zFile, pFd->zFilename, szName+1);
data/sqlcipher-3.4.1/src/test_vfs.c:912:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zLock[80];
data/sqlcipher-3.4.1/src/test_vfs.c:922:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(&zLock[nLock], " lock");
data/sqlcipher-3.4.1/src/test_vfs.c:924:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(&zLock[nLock], " unlock");
data/sqlcipher-3.4.1/src/test_vfs.c:928:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(&zLock[nLock], " shared");
data/sqlcipher-3.4.1/src/test_vfs.c:930:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(&zLock[nLock], " exclusive");
data/sqlcipher-3.4.1/src/test_vfs.c:1123:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(pBuffer->aPage[i], &a[i*pgsz], nByte);
data/sqlcipher-3.4.1/src/test_vfs.c:1514:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->zName, zVfs, strlen(zVfs)+1);
data/sqlcipher-3.4.1/src/test_vfs.c:1517:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pVfs, &tvfs_vfs, sizeof(sqlite3_vfs));
data/sqlcipher-3.4.1/src/test_vfstrace.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[50];
data/sqlcipher-3.4.1/src/test_vfstrace.c:365:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test_vfstrace.c:366:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zBuf, "|0", 3);
data/sqlcipher-3.4.1/src/test_vfstrace.c:459:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/src/test_vfstrace.c:547:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zLck[100];
data/sqlcipher-3.4.1/src/test_vfstrace.c:549:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(zLck, "|0", 3);
data/sqlcipher-3.4.1/src/test_vfstrace.c:858:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char*)&pInfo[1], zTraceName, nName+1);
data/sqlcipher-3.4.1/src/test_windirent.c:27:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char value[32768]; /* Maximum length, per MSDN */
data/sqlcipher-3.4.1/src/test_windirent.h:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char d_name[NAME_MAX + 1]; /* Name within the directory. */
data/sqlcipher-3.4.1/src/test_wsd.c:78:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pVar[1], K, L);
data/sqlcipher-3.4.1/src/treeview.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[500];
data/sqlcipher-3.4.1/src/treeview.c:98:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zLine[1000];
data/sqlcipher-3.4.1/src/treeview.c:161:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zLine[100];
data/sqlcipher-3.4.1/src/treeview.c:236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zFlgs[30];
data/sqlcipher-3.4.1/src/trigger.c:376:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(z, pName->z, pName->n);
data/sqlcipher-3.4.1/src/utf.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/utf.c:328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];
data/sqlcipher-3.4.1/src/utf.c:485:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zBuf[20];
data/sqlcipher-3.4.1/src/util.c:668:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pOut, &u, 8);
data/sqlcipher-3.4.1/src/util.c:709:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pValue, &u, 4);
data/sqlcipher-3.4.1/src/util.c:1141:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x,p,4);
data/sqlcipher-3.4.1/src/util.c:1146:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x,p,4);
data/sqlcipher-3.4.1/src/util.c:1151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&x,p,4);
data/sqlcipher-3.4.1/src/util.c:1160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p,&v,4);
data/sqlcipher-3.4.1/src/util.c:1164:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p,&x,4);
data/sqlcipher-3.4.1/src/util.c:1168:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p,&x,4);
data/sqlcipher-3.4.1/src/util.c:1424:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&a, &x, 8);
data/sqlcipher-3.4.1/src/vdbe.c:483:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[200];
data/sqlcipher-3.4.1/src/vdbe.c:1435:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pOut->z, pIn2->z, pIn2->n);
data/sqlcipher-3.4.1/src/vdbe.c:1437:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pOut->z[pIn2->n], pIn1->z, pIn1->n);
data/sqlcipher-3.4.1/src/vdbe.c:2645:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pDest->z, zData, len);
data/sqlcipher-3.4.1/src/vdbe.c:2941:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pNew->zName, zName, nName+1);
data/sqlcipher-3.4.1/src/vdbe.c:3994:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char aTempRec[ROUND8(sizeof(UnpackedRecord)) + sizeof(Mem)*4 + 7];
data/sqlcipher-3.4.1/src/vdbeapi.c:265:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pNew, pOrig, MEMCELLSIZE);
data/sqlcipher-3.4.1/src/vdbeaux.c:286:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if( p4copy ) memcpy(p4copy, zP4, 8);
data/sqlcipher-3.4.1/src/vdbeaux.c:1096:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zAlt[50];
data/sqlcipher-3.4.1/src/vdbeaux.c:1440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zPtr[50];
data/sqlcipher-3.4.1/src/vdbeaux.c:1441:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zCom[100];
data/sqlcipher-3.4.1/src/vdbeaux.c:1760:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char z[1000];
data/sqlcipher-3.4.1/src/vdbeaux.c:2854:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *out = fopen("vdbe_profile.out", "a");
data/sqlcipher-3.4.1/src/vdbeaux.c:2873:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zHdr[100];
data/sqlcipher-3.4.1/src/vdbeaux.c:3309:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if( len>0 ) memcpy(buf, pMem->z, len);
data/sqlcipher-3.4.1/src/vdbeaux.c:3366:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pMem->u.r, &x, sizeof(x));
data/sqlcipher-3.4.1/src/vdbemem.c:148:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pMem->zMalloc, pMem->z, pMem->n);
data/sqlcipher-3.4.1/src/vdbemem.c:345:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pMem, &t, sizeof(t));
data/sqlcipher-3.4.1/src/vdbemem.c:790:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, MEMCELLSIZE);
data/sqlcipher-3.4.1/src/vdbemem.c:807:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, MEMCELLSIZE);
data/sqlcipher-3.4.1/src/vdbemem.c:831:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, sizeof(Mem));
data/sqlcipher-3.4.1/src/vdbemem.c:906:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pMem->z, z, nAlloc);
data/sqlcipher-3.4.1/src/vdbesort.c:550:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->aAlloc, &p->aBuffer[iBuf], nAvail);
data/sqlcipher-3.4.1/src/vdbesort.c:566:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&p->aAlloc[nByte - nRem], aNext, nCopy);
data/sqlcipher-3.4.1/src/vdbesort.c:973:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pKeyInfo, pCsr->pKeyInfo, szKeyInfo);
data/sqlcipher-3.4.1/src/vdbesort.c:1488:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->aBuffer[p->iBufEnd], &pData[nData-nRem], nCopy);
data/sqlcipher-3.4.1/src/vdbesort.c:1865:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(SRVAL(pNew), pVal->z, pVal->n);
data/sqlcipher-3.4.1/src/vdbesort.c:2698:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pOut->z, pKey, nKey);
data/sqlcipher-3.4.1/src/vdbetrace.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBase[100];         /* Initial working space */
data/sqlcipher-3.4.1/src/vtab.c:56:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zCopy, zName, nName+1);
data/sqlcipher-3.4.1/src/vtab.c:1074:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char*)&pNew[1], pDef->zName, sqlite3Strlen30(pDef->zName)+1);
data/sqlcipher-3.4.1/src/wal.c:672:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)&aHdr[1], (const void*)&pWal->hdr, sizeof(WalIndexHdr));
data/sqlcipher-3.4.1/src/wal.c:674:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)&aHdr[0], (const void*)&pWal->hdr, sizeof(WalIndexHdr));
data/sqlcipher-3.4.1/src/wal.c:703:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aFrame[8], pWal->hdr.aSalt, 8);
data/sqlcipher-3.4.1/src/wal.c:784:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char zName[15];
data/sqlcipher-3.4.1/src/wal.c:1152:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pWal->hdr.aSalt, &aBuf[16], 8);
data/sqlcipher-3.4.1/src/wal.c:1457:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aLeft, aTmp, sizeof(aTmp[0])*iOut);
data/sqlcipher-3.4.1/src/wal.c:1684:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pWal->hdr.aSalt[1], &salt1, 4);
data/sqlcipher-3.4.1/src/wal.c:2037:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pWal->hdr, &h1, sizeof(WalIndexHdr));
data/sqlcipher-3.4.1/src/wal.c:2451:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&pWal->hdr, pSnapshot, sizeof(WalIndexHdr));
data/sqlcipher-3.4.1/src/wal.c:2703:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&pWal->hdr, (void *)walIndexHdr(pWal), sizeof(WalIndexHdr));
data/sqlcipher-3.4.1/src/wal.c:3011:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&aWalHdr[16], pWal->hdr.aSalt, 8);
data/sqlcipher-3.4.1/src/wal.c:3395:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pRet, &pWal->hdr, sizeof(WalIndexHdr));
data/sqlcipher-3.4.1/src/where.c:101:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(aiCur, pWInfo->aiCurOnePass, sizeof(int)*2);
data/sqlcipher-3.4.1/src/where.c:117:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pDest->a, pSrc->a, pDest->n*sizeof(pDest->a[0]));
data/sqlcipher-3.4.1/src/where.c:1664:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zType[4];
data/sqlcipher-3.4.1/src/where.c:1665:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLeft[50];
data/sqlcipher-3.4.1/src/where.c:1666:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zType, "...", 4);
data/sqlcipher-3.4.1/src/where.c:1803:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(paNew, p->aLTerm, sizeof(p->aLTerm[0])*p->nLSlot);
data/sqlcipher-3.4.1/src/where.c:1819:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo, pFrom, WHERE_LOOP_XFER_SZ);
data/sqlcipher-3.4.1/src/where.c:1820:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pTo->aLTerm, pFrom->aLTerm, pTo->nLTerm*sizeof(pTo->aLTerm[0]));
data/sqlcipher-3.4.1/src/where.c:3752:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zName[65];
data/sqlcipher-3.4.1/src/where.c:4044:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pTo->aLoop, pFrom->aLoop, sizeof(WhereLoop*)*iLoop);
data/sqlcipher-3.4.1/src/wherecode.c:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[100];               /* Initial space for EQP output string */
data/sqlcipher-3.4.1/src/wherecode.c:797:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char d2[3];
data/sqlcipher-3.4.1/src/wherecode.c:1713:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pOrTab->a, pTabItem, sizeof(*pTabItem));
data/sqlcipher-3.4.1/src/whereexpr.c:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pWC->a, pOld, sizeof(pWC->a[0])*pWC->nTerm);
data/sqlcipher-3.4.1/src/whereexpr.c:202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wc[3];                /* Wildcard characters */
data/sqlcipher-3.4.1/test/fuzzcheck.c:108:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char a[1];     /* Blob content.  Extra space allocated as needed. */
data/sqlcipher-3.4.1/test/fuzzcheck.c:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTestName[100];             /* Name of current test */
data/sqlcipher-3.4.1/test/fuzzcheck.c:261:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew->zFilename, zName, nName);
data/sqlcipher-3.4.1/test/fuzzcheck.c:268:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  if( sz>0 ) memcpy(pNew->a, pData, sz);
data/sqlcipher-3.4.1/test/fuzzcheck.c:290:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zName, "rb");
data/sqlcipher-3.4.1/test/fuzzcheck.c:323:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(zFile, "wb");
data/sqlcipher-3.4.1/test/fuzzcheck.c:370:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pNew->a, sqlite3_column_blob(pStmt,1), sz);
data/sqlcipher-3.4.1/test/fuzzcheck.c:436:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pData, pVFile->a, iAmt);
data/sqlcipher-3.4.1/test/fuzzcheck.c:439:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pData, pVFile->a + iOfst, iAmt);
data/sqlcipher-3.4.1/test/fuzzcheck.c:460:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pVFile->a + iOfst, pData, iAmt);
data/sqlcipher-3.4.1/test/speedtest1.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zResult[3000];        /* Text of the current result */
data/sqlcipher-3.4.1/test/speedtest1.c:405:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(g.zResult + g.nResult, z, len+1);
data/sqlcipher-3.4.1/test/speedtest1.c:466:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zNum[2000];              /* A number name */
data/sqlcipher-3.4.1/test/speedtest1.c:1074:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    aCheck[i] = atoi(g.zResult);
data/sqlcipher-3.4.1/test/speedtest1.c:1087:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if( aCheck[i]!=atoi(g.zResult) ){
data/sqlcipher-3.4.1/test/speedtest1.c:1089:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    i, i*iStep, (i+1)*iStep, aCheck[i], atoi(g.zResult));
data/sqlcipher-3.4.1/test/speedtest1.c:1103:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    aCheck[i] = atoi(g.zResult);
data/sqlcipher-3.4.1/test/speedtest1.c:1116:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if( aCheck[i]!=atoi(g.zResult) ){
data/sqlcipher-3.4.1/test/speedtest1.c:1118:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                    i, i*iStep, (i+1)*iStep, aCheck[i], atoi(g.zResult));
data/sqlcipher-3.4.1/test/speedtest1.c:1134:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    if( aCheck[i]!=atoi(g.zResult) ){
data/sqlcipher-3.4.1/test/speedtest1.c:1136:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  i, i*iStep, (i+1)*iStep, aCheck[i], atoi(g.zResult));
data/sqlcipher-3.4.1/test/speedtest1.c:1150:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    aCheck[i] = atoi(g.zResult);
data/sqlcipher-3.4.1/test/speedtest1.c:1171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zNum[2000];              /* A number name */
data/sqlcipher-3.4.1/test/speedtest1.c:1191:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[200];
data/sqlcipher-3.4.1/test/speedtest1.c:1193:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(z, "rb");
data/sqlcipher-3.4.1/test/threadtest1.c:198:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  int t = atoi(zFilename);
data/sqlcipher-3.4.1/test/threadtest1.c:227:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char z1[30], z2[30];
data/sqlcipher-3.4.1/test/threadtest1.c:229:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(z1, "%d", i*2);
data/sqlcipher-3.4.1/test/threadtest1.c:230:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(z2, "%d", i*i);
data/sqlcipher-3.4.1/test/threadtest1.c:257:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if( argc<2 || (n=atoi(argv[1]))<1 ) n = 10;
data/sqlcipher-3.4.1/test/threadtest1.c:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[200];
data/sqlcipher-3.4.1/test/threadtest1.c:260:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zBuf, "testdb-%d", (i+1)/2);
data/sqlcipher-3.4.1/test/threadtest1.c:284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[200];
data/sqlcipher-3.4.1/test/threadtest1.c:285:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zBuf, "testdb-%d", (i+1)/2);
data/sqlcipher-3.4.1/test/threadtest3.c:132:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char in[64];
data/sqlcipher-3.4.1/test/threadtest3.c:287:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, buf, len);
data/sqlcipher-3.4.1/test/threadtest3.c:290:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, buf, t);
data/sqlcipher-3.4.1/test/threadtest3.c:300:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->u.in, buf, 64);
data/sqlcipher-3.4.1/test/threadtest3.c:309:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ctx->u.in, buf, len);
data/sqlcipher-3.4.1/test/threadtest3.c:316:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void MD5Final(unsigned char digest[16], MD5Context *ctx){
data/sqlcipher-3.4.1/test/threadtest3.c:352:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digest, ctx->buf, 16);
data/sqlcipher-3.4.1/test/threadtest3.c:393:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[16];
data/sqlcipher-3.4.1/test/threadtest3.c:394:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[33];
data/sqlcipher-3.4.1/test/threadtest3.c:834:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char aBuf[1024];
data/sqlcipher-3.4.1/test/threadtest3.c:839:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd1 = open(zFrom, O_RDONLY);
data/sqlcipher-3.4.1/test/threadtest3.c:844:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd2 = open(zTo, O_RDWR|O_CREAT|O_EXCL, 0644);
data/sqlcipher-3.4.1/test/threadtest4.c:178:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const unsigned char aOrder[6][3] = {
data/sqlcipher-3.4.1/test/threadtest4.c:393:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nWorker = atoi(z);
data/sqlcipher-3.4.1/test/wordcount.c:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zResult[24];
data/sqlcipher-3.4.1/test/wordcount.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zInput[2000];            /* A single line of input */
data/sqlcipher-3.4.1/test/wordcount.c:265:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        cacheSize = atoi(argv[i]);
data/sqlcipher-3.4.1/test/wordcount.c:268:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        pageSize = atoi(argv[i]);
data/sqlcipher-3.4.1/test/wordcount.c:271:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        commitInterval = atoi(argv[i]);
data/sqlcipher-3.4.1/test/wordcount.c:298:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = fopen(zFileToRead, "rb");
data/sqlcipher-3.4.1/tool/checkSpacing.c:18:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *in = fopen(zFile, "rb");
data/sqlcipher-3.4.1/tool/checkSpacing.c:24:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zLine[2000];
data/sqlcipher-3.4.1/tool/dbhash.c:35:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[64];
data/sqlcipher-3.4.1/tool/dbhash.c:118:58:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void SHA1Transform(unsigned int state[5], const unsigned char buffer[64]){
data/sqlcipher-3.4.1/tool/dbhash.c:122:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(block, buffer, 64);
data/sqlcipher-3.4.1/tool/dbhash.c:123:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(qq,state,5*sizeof(unsigned int));
data/sqlcipher-3.4.1/tool/dbhash.c:193:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(&g.cx.buffer[j], data, (i = 64-j));
data/sqlcipher-3.4.1/tool/dbhash.c:202:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void)memcpy(&g.cx.buffer[j], &data[i], len - i);
data/sqlcipher-3.4.1/tool/dbhash.c:209:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char finalcount[8];
data/sqlcipher-3.4.1/tool/dbhash.c:210:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[20];
data/sqlcipher-3.4.1/tool/dbhash.c:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zOut[41];
data/sqlcipher-3.4.1/tool/dbhash.c:320:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          unsigned char x[8];
data/sqlcipher-3.4.1/tool/dbhash.c:322:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&u, &v, 8);
data/sqlcipher-3.4.1/tool/dbhash.c:337:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          unsigned char x[8];
data/sqlcipher-3.4.1/tool/dbhash.c:339:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&u, &r, 8);
data/sqlcipher-3.4.1/tool/extract.c:24:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  f = fopen(argv[1], "rb");
data/sqlcipher-3.4.1/tool/extract.c:29:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  ofst = atoi(argv[2]);
data/sqlcipher-3.4.1/tool/extract.c:30:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  n = atoi(argv[3]);
data/sqlcipher-3.4.1/tool/fuzzershell.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTestName[100];             /* Name of current test */
data/sqlcipher-3.4.1/tool/fuzzershell.c:265:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&p->z[p->nUsed], p->zSep, p->szSep);
data/sqlcipher-3.4.1/tool/fuzzershell.c:268:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&p->z[p->nUsed], z, sz);
data/sqlcipher-3.4.1/tool/fuzzershell.c:771:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zErrBuf[200];            /* Space for the error message */
data/sqlcipher-3.4.1/tool/fuzzershell.c:938:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      in = fopen(azInFile[jj],"rb");
data/sqlcipher-3.4.1/tool/fuzzershell.c:1163:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *out = fopen(zDataOut, "wb");
data/sqlcipher-3.4.1/tool/getlock.c:76:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aHdr[100];   /* Database header */
data/sqlcipher-3.4.1/tool/getlock.c:81:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  hDb = open(argv[1], O_RDONLY, 0);
data/sqlcipher-3.4.1/tool/getlock.c:114:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zShm, argv[1], nName);
data/sqlcipher-3.4.1/tool/getlock.c:115:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zShm[nName], "-shm", 5);
data/sqlcipher-3.4.1/tool/getlock.c:116:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    hShm = open(zShm, O_RDONLY, 0);
data/sqlcipher-3.4.1/tool/lemon.c:88:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&zBuf[*pnUsed], zIn, nIn);
data/sqlcipher-3.4.1/tool/lemon.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTemp[50];
data/sqlcipher-3.4.1/tool/lemon.c:1483:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  azDefine = (char **) realloc(azDefine, sizeof(azDefine[0])*nDefine);
data/sqlcipher-3.4.1/tool/lemon.c:1835:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *set[LISTSIZE];
data/sqlcipher-3.4.1/tool/lemon.c:1929:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    (*(void(*)(char *))(op[j].arg))(&argv[i][2]);
data/sqlcipher-3.4.1/tool/lemon.c:2023:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        (*(void(*)(char *))(op[j].arg))(sv);
data/sqlcipher-3.4.1/tool/lemon.c:2173:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char *alias[MAXRHS]; /* Aliases for each RHS symbol (or NULL) */
data/sqlcipher-3.4.1/tool/lemon.c:2553:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zLine[50];
data/sqlcipher-3.4.1/tool/lemon.c:2580:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(zBuf, zLine, nLine);
data/sqlcipher-3.4.1/tool/lemon.c:2595:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zBuf, zNew, nNew);
data/sqlcipher-3.4.1/tool/lemon.c:2763:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(ps.filename,"rb");
data/sqlcipher-3.4.1/tool/lemon.c:2991:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(lemp->outname,mode);
data/sqlcipher-3.4.1/tool/lemon.c:3197:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[20];
data/sqlcipher-3.4.1/tool/lemon.c:3322:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[LINESIZE];
data/sqlcipher-3.4.1/tool/lemon.c:3347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/sqlcipher-3.4.1/tool/lemon.c:3360:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    in = fopen(user_templatename,"rb");
data/sqlcipher-3.4.1/tool/lemon.c:3389:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(tpltname,"rb");
data/sqlcipher-3.4.1/tool/lemon.c:3503:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char empty[1] = { 0 };
data/sqlcipher-3.4.1/tool/lemon.c:3508:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zInt[40];
data/sqlcipher-3.4.1/tool/lemon.c:3558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char used[MAXRHS];     /* True for each RHS element which is used */
data/sqlcipher-3.4.1/tool/lemon.c:3559:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zLhs[50];         /* Convert the LHS symbol into this string */
data/sqlcipher-3.4.1/tool/lemon.c:3560:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zOvwrt[900];      /* Comment that to allow LHS to overwrite RHS */
data/sqlcipher-3.4.1/tool/lemon.c:3566:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char newlinestr[2] = { '\n', '\0' };
data/sqlcipher-3.4.1/tool/lemon.c:3618:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zLhs, "yymsp[%d].minor.yy%d",1-rp->nrhs,rp->lhs->dtnum);
data/sqlcipher-3.4.1/tool/lemon.c:3621:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zLhs, "yylhsminor.yy%d",rp->lhs->dtnum);
data/sqlcipher-3.4.1/tool/lemon.c:3997:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[LINESIZE];
data/sqlcipher-3.4.1/tool/lemon.c:4498:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[LINESIZE];
data/sqlcipher-3.4.1/tool/lemon.c:4499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pattern[LINESIZE];
data/sqlcipher-3.4.1/tool/loadfts.c:45:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zName, "rb");
data/sqlcipher-3.4.1/tool/loadfts.c:179:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      iFts = atoi(zArg);
data/sqlcipher-3.4.1/tool/loadfts.c:183:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      nRowPerTrans = atoi(zArg);
data/sqlcipher-3.4.1/tool/loadfts.c:186:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      bMap = atoi(zArg);
data/sqlcipher-3.4.1/tool/logest.c:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&a, &x, 8);
data/sqlcipher-3.4.1/tool/logest.c:150:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      a[n++] = (LogEst)atoi(z+1);
data/sqlcipher-3.4.1/tool/logest.c:152:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      a[n++] = logEstFromInteger(atoi(z));
data/sqlcipher-3.4.1/tool/mkkeywordhash.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zOrigName[20];  /* Original keyword name before processing */
data/sqlcipher-3.4.1/tool/mkkeywordhash.c:340:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[2000];
data/sqlcipher-3.4.1/tool/mkkeywordhash.c:357:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p->zOrigName, p->zName, p->len+1);
data/sqlcipher-3.4.1/tool/mkkeywordhash.c:474:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zText[k], p->zName, p->len);
data/sqlcipher-3.4.1/tool/offsets.c:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMsg[200];
data/sqlcipher-3.4.1/tool/offsets.c:318:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  g.f = fopen(argv[1], "rb");
data/sqlcipher-3.4.1/tool/pagesig.c:36:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    for(i=0; i<n; i++) sprintf(zCksum+i*2, "%02x", p[i]);
data/sqlcipher-3.4.1/tool/pagesig.c:44:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    for(i=0; i<8; i++) sprintf(zCksum+i*2, "%02x", p[i]);
data/sqlcipher-3.4.1/tool/pagesig.c:45:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zCksum+i*2, "-%08x%08x", s0, s1);
data/sqlcipher-3.4.1/tool/pagesig.c:54:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *in = fopen(zFilename, "rb");
data/sqlcipher-3.4.1/tool/pagesig.c:58:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aBuf[50];
data/sqlcipher-3.4.1/tool/pagesig.c:59:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char aPage[65536];
data/sqlcipher-3.4.1/tool/rollback-test.c:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char zReply[1000];
data/sqlcipher-3.4.1/tool/rollback-test.c:53:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&zReply[nReply], z, n);
data/sqlcipher-3.4.1/tool/rollback-test.c:90:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int szPg = atoi(&argv[i][10]);
data/sqlcipher-3.4.1/tool/rollback-test.c:91:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zBuf[100];
data/sqlcipher-3.4.1/tool/rollback-test.c:92:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zBuf, "PRAGMA pagesize=%d", szPg);
data/sqlcipher-3.4.1/tool/showdb.c:113:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    g.dbfd = open(zName, O_RDONLY);
data/sqlcipher-3.4.1/tool/showdb.c:253:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/tool/showdb.c:254:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(zBuf, " %03x: %02x", ofst, aData[ofst]);
data/sqlcipher-3.4.1/tool/showdb.c:258:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&zBuf[i], "   ");
data/sqlcipher-3.4.1/tool/showdb.c:260:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&zBuf[i], " %02x", aData[ofst+j]);
data/sqlcipher-3.4.1/tool/showdb.c:265:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(&zBuf[i], "   %9d", val);
data/sqlcipher-3.4.1/tool/showdb.c:342:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zDesc, "%lld", v);
data/sqlcipher-3.4.1/tool/showdb.c:344:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zDesc, "real");
data/sqlcipher-3.4.1/tool/showdb.c:353:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zDesc, "blob(%lld)", size);
data/sqlcipher-3.4.1/tool/showdb.c:355:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zDesc, "txt(%lld)", size);
data/sqlcipher-3.4.1/tool/showdb.c:415:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zDesc[1000];
data/sqlcipher-3.4.1/tool/showdb.c:421:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zDesc, "lx: %d ", leftChild);
data/sqlcipher-3.4.1/tool/showdb.c:428:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zDesc[nDesc], "n: %lld ", nPayload);
data/sqlcipher-3.4.1/tool/showdb.c:438:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zDesc[nDesc], "r: %lld ", rowid);
data/sqlcipher-3.4.1/tool/showdb.c:445:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zDesc[nDesc], "ov: %d ", ovfl);
data/sqlcipher-3.4.1/tool/showdb.c:541:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char zNm[30];
data/sqlcipher-3.4.1/tool/showdb.c:595:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char zConst[32];
data/sqlcipher-3.4.1/tool/showdb.c:600:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(zConst+ii, "%02x", pData[jj]);
data/sqlcipher-3.4.1/tool/showdb.c:610:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(zConst+ii, "...'", 5);
data/sqlcipher-3.4.1/tool/showdb.c:612:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(zConst+ii, "'", 2);
data/sqlcipher-3.4.1/tool/showdb.c:705:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[30];
data/sqlcipher-3.4.1/tool/showdb.c:709:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf, "%d", i);
data/sqlcipher-3.4.1/tool/showdb.c:711:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( j<=n-2 ) memcpy(&zMap[cofst+1], zBuf, j);
data/sqlcipher-3.4.1/tool/showdb.c:747:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zIdx[10];
data/sqlcipher-3.4.1/tool/showdb.c:748:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zIdx, "[%d]", i);
data/sqlcipher-3.4.1/tool/showdb.c:947:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zQuery[200];
data/sqlcipher-3.4.1/tool/showjournal.c:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/tool/showjournal.c:55:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(zBuf, " %05x: %02x", ofst, aData[ofst]);
data/sqlcipher-3.4.1/tool/showjournal.c:59:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&zBuf[i], "   ");
data/sqlcipher-3.4.1/tool/showjournal.c:61:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&zBuf[i], " %02x", aData[ofst+j]);
data/sqlcipher-3.4.1/tool/showjournal.c:66:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(&zBuf[i], "   %10u", val);
data/sqlcipher-3.4.1/tool/showjournal.c:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zTitle[50];
data/sqlcipher-3.4.1/tool/showjournal.c:102:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(zTitle, "page number for page at offset %d", iOfst);
data/sqlcipher-3.4.1/tool/showjournal.c:114:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  db = fopen(argv[1], "rb");
data/sqlcipher-3.4.1/tool/showlocks.c:55:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(argv[1], O_RDWR, 0);
data/sqlcipher-3.4.1/tool/showwal.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[100];
data/sqlcipher-3.4.1/tool/showwal.c:183:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(zBuf, " %03x: %02x", ofst, aData[ofst]);
data/sqlcipher-3.4.1/tool/showwal.c:187:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&zBuf[i], "   ");
data/sqlcipher-3.4.1/tool/showwal.c:189:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&zBuf[i], " %02x", aData[ofst+j]);
data/sqlcipher-3.4.1/tool/showwal.c:195:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zBuf[i], "  0x%08x", val);
data/sqlcipher-3.4.1/tool/showwal.c:197:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zBuf[i], "   %9d", val);
data/sqlcipher-3.4.1/tool/showwal.c:323:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zDesc, "%lld", v);
data/sqlcipher-3.4.1/tool/showwal.c:325:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zDesc, "real");
data/sqlcipher-3.4.1/tool/showwal.c:334:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zDesc, "blob(%lld)", size);
data/sqlcipher-3.4.1/tool/showwal.c:336:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zDesc, "txt(%lld)", size);
data/sqlcipher-3.4.1/tool/showwal.c:395:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zDesc[1000];
data/sqlcipher-3.4.1/tool/showwal.c:401:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zDesc, "lx: %d ", leftChild);
data/sqlcipher-3.4.1/tool/showwal.c:408:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zDesc[nDesc], "n: %lld ", nPayload);
data/sqlcipher-3.4.1/tool/showwal.c:418:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zDesc[nDesc], "r: %lld ", rowid);
data/sqlcipher-3.4.1/tool/showwal.c:425:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&zDesc[nDesc], "ov: %d ", ovfl);
data/sqlcipher-3.4.1/tool/showwal.c:496:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[30];
data/sqlcipher-3.4.1/tool/showwal.c:500:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf, "%d", i);
data/sqlcipher-3.4.1/tool/showwal.c:502:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if( j<=n-2 ) memcpy(&zMap[cofst+1], zBuf, j);
data/sqlcipher-3.4.1/tool/showwal.c:516:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zPgSz[4];
data/sqlcipher-3.4.1/tool/showwal.c:521:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(argv[1], O_RDONLY);
data/sqlcipher-3.4.1/tool/speedtest16.c:119:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(argv[2], "r");
data/sqlcipher-3.4.1/tool/speedtest8.c:137:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int new_priority = atoi(argv[2]);
data/sqlcipher-3.4.1/tool/speedtest8.c:151:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      myParam.sched_priority = atoi(argv[2]);
data/sqlcipher-3.4.1/tool/speedtest8.c:186:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(argv[2], "r");
data/sqlcipher-3.4.1/tool/speedtest8inst1.c:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMessage[1024];
data/sqlcipher-3.4.1/tool/sqldiff.c:385:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[50];
data/sqlcipher-3.4.1/tool/sqldiff.c:805:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char z[NHASH];    /* The values that have been hashed */
data/sqlcipher-3.4.1/tool/sqldiff.c:850:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[20];
data/sqlcipher-3.4.1/tool/sqldiff.c:995:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDelta, zOut, lenOut);
data/sqlcipher-3.4.1/tool/sqldiff.c:1100:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(zDelta, &zOut[base], bestLitsz);
data/sqlcipher-3.4.1/tool/sqldiff.c:1122:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(zDelta, &zOut[base], lenOut-base);
data/sqlcipher-3.4.1/tool/sqldiff.c:1139:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zDelta, &zOut[base], lenOut-base);
data/sqlcipher-3.4.1/tool/sqldiff.c:1309:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zOtaControl, sqlite3_column_text(pStmt, nCol), nOtaControl+1);
data/sqlcipher-3.4.1/tool/sqldiff.c:1503:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char p[12];
data/sqlcipher-3.4.1/tool/sqldiff.c:1537:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&uX, &iX, 8);
data/sqlcipher-3.4.1/tool/sqldiff.c:1542:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&uX, &rX, 8);
data/sqlcipher-3.4.1/tool/sqldiff.c:1799:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zToken[32];
data/sqlcipher-3.4.1/tool/sqldiff.c:1927:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        out = fopen(argv[++i], "wb");
data/sqlcipher-3.4.1/tool/srcck1.c:36:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zFilename, "rb");
data/sqlcipher-3.4.1/tool/varint.c:30:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[10];
data/sqlcipher-3.4.1/tool/varint.c:59:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char zHex[20];
data/sqlcipher-3.4.1/tool/varint.c:111:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&iX, &uX, 8);
data/sqlcipher-3.4.1/tool/varint.c:113:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&uX, &iX, 8);
data/sqlcipher-3.4.1/autoconf/tea/win/nmakehlp.c:647:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		    op += strlen(p->key);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:1052:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nName = (int)strlen(zName);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:1178:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return addNewAsyncWrite(0, ASYNC_DELETE, syncDir, (int)strlen(z)+1, z);
data/sqlcipher-3.4.1/ext/async/sqlite3async.c:1245:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(z);
data/sqlcipher-3.4.1/ext/fts1/ft_hash.c:115:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( nKey<=0 ) nKey = (int) strlen(z);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:92:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nappend(sb, zFrom, strlen(zFrom));
data/sqlcipher-3.4.1/ext/fts1/fts1.c:883:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return string_dup_n(s, strlen(s));
data/sqlcipher-3.4.1/ext/fts1/fts1.c:894:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nDb = strlen(zDb);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:895:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nName = strlen(zName);
data/sqlcipher-3.4.1/ext/fts1/fts1.c:1636:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Token *aToken = malloc( strlen(z) * sizeof(aToken[0]) );
data/sqlcipher-3.4.1/ext/fts1/fts1.c:1836:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(argv[i]) + 1;
data/sqlcipher-3.4.1/ext/fts1/fts1.c:1846:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    z += strlen(z)+1;
data/sqlcipher-3.4.1/ext/fts1/fts1.c:2738:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( nInput<0 ) nInput = strlen(zInput);
data/sqlcipher-3.4.1/ext/fts1/fts1_hash.c:95:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( nKey<=0 ) nKey = (int) strlen(z);
data/sqlcipher-3.4.1/ext/fts1/fts1_porter.c:104:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nInput = (int)strlen(zInput);
data/sqlcipher-3.4.1/ext/fts1/fts1_porter.c:550:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *pnOut = i = strlen(z);
data/sqlcipher-3.4.1/ext/fts1/fts1_tokenizer1.c:69:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int i, n = strlen(argv[1]);
data/sqlcipher-3.4.1/ext/fts1/fts1_tokenizer1.c:119:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nBytes = (int)strlen(pInput);
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:471:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return string_dup_n(s, strlen(s));
data/sqlcipher-3.4.1/ext/fts1/fulltext.c:481:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nName = strlen(zName);
data/sqlcipher-3.4.1/ext/fts1/simple_tokenizer.c:26:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *str = malloc(strlen(s) + 1);
data/sqlcipher-3.4.1/ext/fts1/simple_tokenizer.c:99:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  c->nBytes = nBytes<0 ? (int) strlen(pInput) : nBytes;
data/sqlcipher-3.4.1/ext/fts2/fts2.c:547:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nappend(sb, zFrom, strlen(zFrom));
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1625:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return string_dup_n(s, strlen(s));
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1636:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nDb = strlen(zDb);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:1637:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nName = strlen(zName);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:2504:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Token *aToken = sqlite3_malloc( strlen(z) * sizeof(aToken[0]) );
data/sqlcipher-3.4.1/ext/fts2/fts2.c:2704:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(argv[i]) + 1;
data/sqlcipher-3.4.1/ext/fts2/fts2.c:2714:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    z += strlen(z)+1;
data/sqlcipher-3.4.1/ext/fts2/fts2.c:2841:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nTok = strlen(zTok)+1;
data/sqlcipher-3.4.1/ext/fts2/fts2.c:3604:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( nInput<0 ) nInput = strlen(zInput);
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6493:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dataBufferAppend(&dump, buf, strlen(buf));
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6499:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      dataBufferAppend(&dump, buf, strlen(buf));
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6508:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          dataBufferAppend(&dump, buf, strlen(buf));
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6519:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        dataBufferAppend(&dump, buf, strlen(buf));
data/sqlcipher-3.4.1/ext/fts2/fts2.c:6579:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int nTerm = strlen(pTerm);
data/sqlcipher-3.4.1/ext/fts2/fts2_hash.c:102:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( nKey<=0 ) nKey = (int) strlen(z);
data/sqlcipher-3.4.1/ext/fts2/fts2_icu.c:63:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(argv[0])+1;
data/sqlcipher-3.4.1/ext/fts2/fts2_icu.c:116:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nInput = strlen(zInput);
data/sqlcipher-3.4.1/ext/fts2/fts2_porter.c:106:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nInput = (int)strlen(zInput);
data/sqlcipher-3.4.1/ext/fts2/fts2_porter.c:552:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *pnOut = i = strlen(z);
data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer1.c:80:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int i, n = strlen(argv[1]);
data/sqlcipher-3.4.1/ext/fts2/fts2_tokenizer1.c:131:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nBytes = (int)strlen(pInput);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:799:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nRet = 2 + (int)strlen(zInput)*2 + 1;
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1070:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nStr += (int)strlen(zCol) + 1;
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1081:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int n = (int)strlen(zCol)+1;
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1147:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( strlen(argv[0])==4 );
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1152:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = (int)strlen(argv[1]) + 1;
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1153:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = (int)strlen(argv[2]) + 1;
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1187:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     && strlen(z)>8
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1226:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if( strlen(zVal)!=4 || sqlite3_strnicmp(zVal, "fts3", 4) ){
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1252:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if( (strlen(zVal)!=3 || sqlite3_strnicmp(zVal, "asc", 3)) 
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1253:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               && (strlen(zVal)!=4 || sqlite3_strnicmp(zVal, "desc", 4)) 
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1286:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nString += (int)(strlen(z) + 1);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1409:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(p->azColumn[iCol]);
data/sqlcipher-3.4.1/ext/fts3/fts3.c:1412:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( zNot && n==(int)strlen(zNot)
data/sqlcipher-3.4.1/ext/fts3/fts3_aux.c:83:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = (int)strlen(zDb);
data/sqlcipher-3.4.1/ext/fts3/fts3_aux.c:87:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nDb = (int)strlen(zDb);
data/sqlcipher-3.4.1/ext/fts3/fts3_aux.c:95:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nFts3 = (int)strlen(zFts3);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:526:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nStr = (int)strlen(zStr);
data/sqlcipher-3.4.1/ext/fts3/fts3_expr.c:986:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (int)strlen(z);
data/sqlcipher-3.4.1/ext/fts3/fts3_hash.c:100:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( nKey<=0 ) nKey = (int) strlen(z);
data/sqlcipher-3.4.1/ext/fts3/fts3_icu.c:61:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(argv[0])+1;
data/sqlcipher-3.4.1/ext/fts3/fts3_icu.c:117:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nInput = strlen(zInput);
data/sqlcipher-3.4.1/ext/fts3/fts3_porter.c:105:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nInput = (int)strlen(zInput);
data/sqlcipher-3.4.1/ext/fts3/fts3_porter.c:567:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *pnOut = i = (int)strlen(z);
data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c:134:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nStr = (int)strlen(zMatchinfo);
data/sqlcipher-3.4.1/ext/fts3/fts3_snippet.c:599:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nAppend = (int)strlen(zAppend);
data/sqlcipher-3.4.1/ext/fts3/fts3_term.c:91:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = (int)strlen(zDb);
data/sqlcipher-3.4.1/ext/fts3/fts3_term.c:93:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nFts3 = (int)strlen(zFts3);
data/sqlcipher-3.4.1/ext/fts3/fts3_test.c:400:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pCsr->nInput = (int)strlen(pInput);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenize_vtab.c:84:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nName = (int)strlen(zName);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenize_vtab.c:122:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nByte += (int)(strlen(argv[i]) + 1);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenize_vtab.c:131:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int n = (int)strlen(argv[i]);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c:178:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  zEnd = &zCopy[strlen(zCopy)];
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer.c:188:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  m = (sqlite3_tokenizer_module *)sqlite3Fts3HashFind(pHash,z,(int)strlen(z)+1);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer1.c:77:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int i, n = (int)strlen(argv[1]);
data/sqlcipher-3.4.1/ext/fts3/fts3_tokenizer1.c:129:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    c->nBytes = (int)strlen(pInput);
data/sqlcipher-3.4.1/ext/fts3/fts3_unicode.c:234:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(z);
data/sqlcipher-3.4.1/ext/fts3/fts3_unicode.c:286:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pCsr->nInput = (int)strlen(aInput);
data/sqlcipher-3.4.1/ext/fts5/fts5_aux.c:140:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( n<0 ) n = (int)strlen(z);
data/sqlcipher-3.4.1/ext/fts5/fts5_buffer.c:85:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nStr = (int)strlen(zStr);
data/sqlcipher-3.4.1/ext/fts5/fts5_buffer.c:270:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nIn = (int)strlen(pIn);
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:210:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nEnum = (int)strlen(zEnum);
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:242:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nCmd = (int)strlen(zCmd);
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:298:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nArg = (int)strlen(zArg) + 1;
data/sqlcipher-3.4.1/ext/fts5/fts5_config.c:428:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nIn = (int)strlen(zIn);
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:772:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            pExpr->pIndex, p->zTerm, (int)strlen(p->zTerm),
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:1591:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (int)strlen(z);
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:1676:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rc = fts5ParseTokenize((void*)&sCtx, tflags, zTerm, (int)strlen(zTerm),
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:2076:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nByte += (int)strlen(pTerm->zTerm) * 2 + 3 + 2;
data/sqlcipher-3.4.1/ext/fts5/fts5_expr.c:2550:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nTerm = (int)strlen(pTerm->zTerm);
data/sqlcipher-3.4.1/ext/fts5/fts5_hash.c:176:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      iHash = fts5HashKey(nNew, (u8*)p->zKey, (int)strlen(p->zKey));
data/sqlcipher-3.4.1/ext/fts5/fts5_hash.c:516:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nTerm = (int)strlen(p->zKey);
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:1936:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sqlite3Fts5BufferSet(&p->rc,&pIter->term, (int)strlen(zTerm), (u8*)zTerm);
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:2016:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sqlite3Fts5BufferSet(&p->rc, &pIter->term, (int)strlen(zTerm),
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:2457:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (z ? (int)strlen((const char*)z) : 0);
data/sqlcipher-3.4.1/ext/fts5/fts5_index.c:4502:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      fts5WriteAppendTerm(p, &writer, (int)strlen(zTerm), (const u8*)zTerm);
data/sqlcipher-3.4.1/ext/fts5/fts5_main.c:2439:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nName = (int)strlen(zName) + 1;
data/sqlcipher-3.4.1/ext/fts5/fts5_main.c:2477:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = (int)strlen(zName) + 1;
data/sqlcipher-3.4.1/ext/fts5/fts5_storage.c:305:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        iOff = (int)strlen(zDefn);
data/sqlcipher-3.4.1/ext/fts5/fts5_storage.c:308:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          iOff += (int)strlen(&zDefn[iOff]);
data/sqlcipher-3.4.1/ext/fts5/fts5_test_tok.c:137:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nByte += (int)(strlen(argv[i]) + 1);
data/sqlcipher-3.4.1/ext/fts5/fts5_test_tok.c:146:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int n = (int)strlen(argv[i]);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:248:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(z);
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:585:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen(p->zSuffix)==p->nSuffix );
data/sqlcipher-3.4.1/ext/fts5/fts5_tokenize.c:586:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen(p->zOutput)==p->nOutput );
data/sqlcipher-3.4.1/ext/fts5/fts5_vocab.c:171:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bDb = (argc==6 && strlen(argv[1])==4 && memcmp("temp", argv[1], 4)==0);
data/sqlcipher-3.4.1/ext/fts5/fts5_vocab.c:181:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nDb = (int)strlen(zDb)+1; 
data/sqlcipher-3.4.1/ext/fts5/fts5_vocab.c:182:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nTab = (int)strlen(zTab)+1;
data/sqlcipher-3.4.1/ext/misc/amatch.c:585:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nFrom = (int)strlen(zFrom);
data/sqlcipher-3.4.1/ext/misc/amatch.c:586:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nTo = (int)strlen(zTo);
data/sqlcipher-3.4.1/ext/misc/amatch.c:744:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nIn = (int)strlen(zIn);
data/sqlcipher-3.4.1/ext/misc/amatch.c:761:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( (int)strlen(zOut)<=nIn );
data/sqlcipher-3.4.1/ext/misc/amatch.c:814:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nKey = (int)strlen(zKey);
data/sqlcipher-3.4.1/ext/misc/amatch.c:815:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nStr = (int)strlen(zStr);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1043:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nBase = (int)strlen(zWordBase);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1044:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nTail = (int)strlen(zWordTail);
data/sqlcipher-3.4.1/ext/misc/amatch.c:1163:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nWord = (int)strlen(pWord->zWord+2);
data/sqlcipher-3.4.1/ext/misc/closure.c:428:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nIn = (int)strlen(zIn);
data/sqlcipher-3.4.1/ext/misc/closure.c:445:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( (int)strlen(zOut)<=nIn );
data/sqlcipher-3.4.1/ext/misc/closure.c:484:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nKey = (int)strlen(zKey);
data/sqlcipher-3.4.1/ext/misc/closure.c:485:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nStr = (int)strlen(zStr);
data/sqlcipher-3.4.1/ext/misc/csv.c:140:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p->nIn = strlen(zData);
data/sqlcipher-3.4.1/ext/misc/csv.c:334:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = strlen(z);
data/sqlcipher-3.4.1/ext/misc/csv.c:346:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(z);
data/sqlcipher-3.4.1/ext/misc/csv.c:380:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  zValue = csv_parameter(zParam,(int)strlen(zParam),zArg);
data/sqlcipher-3.4.1/ext/misc/eval.c:39:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t sz = strlen(z);
data/sqlcipher-3.4.1/ext/misc/eval.c:89:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  x.szSep = (int)strlen(x.zSep);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:312:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nFrom = (int)strlen(zFrom);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:313:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nTo = (int)strlen(zTo);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:453:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nIn = (int)strlen(zIn);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:470:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( (int)strlen(zOut)<=nIn );
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:518:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nModule = (int)strlen(zModule);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:875:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pNew = sqlite3_malloc( sizeof(*pNew) + (int)strlen(zWord) + 1 );
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:879:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pNew->nBasis = (fuzzer_len)strlen(zWord);
data/sqlcipher-3.4.1/ext/misc/fuzzer.c:1002:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( (int)strlen(zWord)<FUZZER_MX_OUTPUT_LENGTH ){
data/sqlcipher-3.4.1/ext/misc/json1.c:255:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p->nUsed += (int)strlen(p->zBuf+p->nUsed);
data/sqlcipher-3.4.1/ext/misc/json1.c:1918:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          jsonAppendRaw(&x, p->zRoot, (int)strlen(p->zRoot));
data/sqlcipher-3.4.1/ext/misc/regexp.c:210:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  in.mx = nIn>=0 ? nIn : (int)strlen((char const*)zIn);
data/sqlcipher-3.4.1/ext/misc/regexp.c:650:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pRe->sIn.mx = (int)strlen(zIn);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:810:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( n<0 ) n = (int)strlen(z);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:1891:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = (int)strlen(zOut);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:1938:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDbName = (int)strlen(zDbName);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2290:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nClass = (int)strlen(zClass);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2474:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nPattern = (int)strlen(zPattern);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2643:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int nPattern = (int)strlen(pCur->zPattern);
data/sqlcipher-3.4.1/ext/misc/spellfix.c:2645:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int nWord = (int)strlen(zWord);
data/sqlcipher-3.4.1/ext/misc/vfslog.c:264:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nName = (int)strlen(zFilename);
data/sqlcipher-3.4.1/ext/rbu/rbu.c:90:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nArg = strlen(zArg);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:901:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(zIn)>4 && memcmp("data", zIn, 4)==0 ){
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:1057:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nCopy = strlen(zStr) + 1;
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:1621:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( (int)strlen(zMask)!=pIter->nTblCol ){
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:2428:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(p->zRbu)>=5 && 0==memcmp("file:", p->zRbu, 5) ){
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:2513:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sz = (int)strlen(z)&0xffffff;
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:3481:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nTarget = zTarget ? strlen(zTarget) : 0;
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:3482:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nRbu = strlen(zRbu);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:3674:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nErrmsg = strlen(p->zErrmsg);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:4363:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(zName);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:4447:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          nCopy = strlen(zBase);
data/sqlcipher-3.4.1/ext/rbu/sqlite3rbu.c:4690:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = strlen(zName);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:1575:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                || (idxStr && (int)strlen(idxStr)==argc*2) );
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3258:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nDb = (int)strlen(argv[1]);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3259:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = (int)strlen(argv[2]);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3356:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nCell = (int)strlen(zCell);
data/sqlcipher-3.4.1/ext/rtree/rtree.c:3365:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nCell = (int)strlen(zCell);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:2213:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sessionAppendBlob(pBuf, (u8 *)pTab->zName, (int)strlen(pTab->zName)+1, pRc);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:4043:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        nTab = (int)strlen(zTab);
data/sqlcipher-3.4.1/ext/session/sqlite3session.c:4357:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nNew = (int)strlen(zNew);
data/sqlcipher-3.4.1/ext/session/test_session.c:450:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = (int)strlen(z);
data/sqlcipher-3.4.1/mptest/mptest.c:295:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(z);
data/sqlcipher-3.4.1/mptest/mptest.c:423:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( n<0 ) n = (int)strlen(z);
data/sqlcipher-3.4.1/mptest/mptest.c:1037:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for(k=(int)strlen(zFilename)-1; k>=0 && !isDirSep(zFilename[k]); k--){}
data/sqlcipher-3.4.1/src/os_unix.c:393:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { "read",         (sqlite3_syscall_ptr)read,       0  },
data/sqlcipher-3.4.1/src/os_unix.c:911:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = (int)strlen(zAbsoluteName);
data/sqlcipher-3.4.1/src/os_unix.c:3515:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for(ii=(int)strlen(zDirname); ii>0 && zDirname[ii]!='/'; ii--);
data/sqlcipher-3.4.1/src/os_unix.c:4271:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nShmFilename = 6 + (int)strlen(zBasePath);
data/sqlcipher-3.4.1/src/os_unix.c:5349:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nFilename = (int)strlen(zFilename) + 6;
data/sqlcipher-3.4.1/src/os_unix.c:5753:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( (flags & SQLITE_OPEN_URI) || zName[strlen(zName)+1]==0 );
data/sqlcipher-3.4.1/src/os_unix.c:5766:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( zName[strlen(zName)+1]==0 );
data/sqlcipher-3.4.1/src/os_unix.c:6225:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(microseconds);
data/sqlcipher-3.4.1/src/os_unix.c:6521:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  dbLen = (int)strlen(dbPath);
data/sqlcipher-3.4.1/src/os_unix.c:6542:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (int)strlen(lockPath);
data/sqlcipher-3.4.1/src/os_unix.c:6798:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(500000); /* wait 0.5 sec and try the lock again*/
data/sqlcipher-3.4.1/src/os_unix.c:6824:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(10000000); /* wait 10 sec and try the lock again */
data/sqlcipher-3.4.1/src/os_unix.c:6973:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        writeSize = PROXY_PATHINDEX + strlen(&writeBuffer[PROXY_PATHINDEX]);
data/sqlcipher-3.4.1/src/os_unix.c:7104:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(dbPath); /* Length of database filename - dbPath */
data/sqlcipher-3.4.1/src/os_unix.c:7130:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( (int)strlen(conchPath) == len+7 );
data/sqlcipher-3.4.1/src/os_unix.c:7180:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( (int)strlen((char*)pFile->lockingContext)<=MAXPATHLEN );
data/sqlcipher-3.4.1/src/os_unix.c:7188:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen((char *)pFile->lockingContext) - strlen(DOTLOCK_SUFFIX);
data/sqlcipher-3.4.1/src/os_unix.c:7188:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen((char *)pFile->lockingContext) - strlen(DOTLOCK_SUFFIX);
data/sqlcipher-3.4.1/src/os_unix.c:7192:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen((char*)pFile->lockingContext)<=MAXPATHLEN );
data/sqlcipher-3.4.1/src/shell.c:1448:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int n = (int)strlen(aTrans[i].zPattern);
data/sqlcipher-3.4.1/src/shell.c:2584:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int i = (int)strlen(z);
data/sqlcipher-3.4.1/src/shell.c:2647:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  c = fgetc(p->in);
data/sqlcipher-3.4.1/src/shell.c:2658:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = fgetc(p->in);
data/sqlcipher-3.4.1/src/shell.c:2692:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = fgetc(p->in);
data/sqlcipher-3.4.1/src/shell.c:2721:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  c = fgetc(p->in);
data/sqlcipher-3.4.1/src/shell.c:2728:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(p->in);
data/sqlcipher-3.4.1/src/shell.c:2754:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nTable = (int)strlen(zTable);
data/sqlcipher-3.4.1/src/shell.c:2775:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = (int)strlen(zInsert);
data/sqlcipher-3.4.1/src/shell.c:3957:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n2 = (int)strlen(zMode);
data/sqlcipher-3.4.1/src/shell.c:4103:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(mainPrompt,azArg[1],(int)ArraySize(mainPrompt)-1);
data/sqlcipher-3.4.1/src/shell.c:4106:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(continuePrompt,azArg[2],(int)ArraySize(continuePrompt)-1);
data/sqlcipher-3.4.1/src/shell.c:4893:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    (int)strlen(azArg[3]));
data/sqlcipher-3.4.1/src/shell.c:4905:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            azArg[3], (int)strlen(azArg[3]),
data/sqlcipher-3.4.1/src/shell.c:4918:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              azArg[3], (int)strlen(azArg[3]),
data/sqlcipher-3.4.1/src/tclsqlite.c:3829:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  MD5Update(&ctx, (unsigned char*)argv[1], (unsigned)strlen(argv[1]));
data/sqlcipher-3.4.1/src/tclsqlite.c:3913:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      MD5Update(p, (unsigned char*)zData, (int)strlen(zData));
data/sqlcipher-3.4.1/src/tclsqlite.c:4222:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc(stdin);
data/sqlcipher-3.4.1/src/test1.c:669:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nKey = strlen(zKey);
data/sqlcipher-3.4.1/src/test1.c:697:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nKey = strlen(zKey);
data/sqlcipher-3.4.1/src/test1.c:814:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(z);
data/sqlcipher-3.4.1/src/test1.c:1608:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( strlen(zDb)==0 ) zDb = 0;
data/sqlcipher-3.4.1/src/test1.c:3978:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( (int)strlen(zTail)<bytes ){
data/sqlcipher-3.4.1/src/test1.c:3979:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      bytes = (int)strlen(zTail);
data/sqlcipher-3.4.1/src/test1.c:4036:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(zSql) + 1;
data/sqlcipher-3.4.1/src/test2.c:490:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(pData, argv[2], test_pagesize-1);
data/sqlcipher-3.4.1/src/test2.c:526:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nFile = (int)strlen(argv[2]);
data/sqlcipher-3.4.1/src/test2.c:637:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nScript = (int)strlen(zScript);
data/sqlcipher-3.4.1/src/test3.c:63:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = (int)strlen(argv[1]);
data/sqlcipher-3.4.1/src/test6.c:478:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nName = (int)strlen(zName);
data/sqlcipher-3.4.1/src/test6.c:479:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nCrashFile = (int)strlen(zCrashFile);
data/sqlcipher-3.4.1/src/test8.c:199:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nBytes += (int)strlen(zName)+1;
data/sqlcipher-3.4.1/src/test8.c:214:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      zSpace += (int)strlen(zSpace) + 1;
data/sqlcipher-3.4.1/src/test8.c:1268:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nThis = (int)strlen(p->zThis);
data/sqlcipher-3.4.1/src/test_bestindex.c:186:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  zCmd = sqlite3_malloc64(strlen(argv[3])+1);
data/sqlcipher-3.4.1/src/test_bestindex.c:189:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memcpy(zCmd, argv[3], strlen(argv[3])+1);
data/sqlcipher-3.4.1/src/test_delete.c:50:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sz = strlen(z);
data/sqlcipher-3.4.1/src/test_delete.c:108:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nBuf = strlen(zFile) + 100;
data/sqlcipher-3.4.1/src/test_demovfs.c:238:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  nRead = read(p->fd, zBuf, iAmt);
data/sqlcipher-3.4.1/src/test_demovfs.c:467:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for(i=strlen(zDir); i>1 && zDir[i]!='/'; i++);
data/sqlcipher-3.4.1/src/test_demovfs.c:589:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(nMicro % 1000000);
data/sqlcipher-3.4.1/src/test_fs.c:587:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        nRead = read(pCsr->fd, aBuf, sBuf.st_mode);
data/sqlcipher-3.4.1/src/test_fs.c:643:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nByte = sizeof(fs_vtab) + (int)strlen(zTbl) + 1 + (int)strlen(zDb) + 1;
data/sqlcipher-3.4.1/src/test_fs.c:643:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nByte = sizeof(fs_vtab) + (int)strlen(zTbl) + 1 + (int)strlen(zDb) + 1;
data/sqlcipher-3.4.1/src/test_fs.c:648:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  pVtab->zDb = &pVtab->zTbl[strlen(zTbl)+1];
data/sqlcipher-3.4.1/src/test_fs.c:650:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(pVtab->zTbl, zTbl, strlen(zTbl));
data/sqlcipher-3.4.1/src/test_fs.c:651:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(pVtab->zDb, zDb, strlen(zDb));
data/sqlcipher-3.4.1/src/test_fs.c:759:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = (int)read(fd, pCur->zBuf, sbuf.st_size);
data/sqlcipher-3.4.1/src/test_func.c:209:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = (int)strlen(z) + 1;
data/sqlcipher-3.4.1/src/test_journal.c:296:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nName = (int)(strlen(zJournal) - strlen("-journal"));
data/sqlcipher-3.4.1/src/test_journal.c:296:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nName = (int)(strlen(zJournal) - strlen("-journal"));
data/sqlcipher-3.4.1/src/test_journal.c:298:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     && ((int)strlen(pMain->zName)==nName)
data/sqlcipher-3.4.1/src/test_journal.c:731:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nPath = (int)strlen(zPath);
data/sqlcipher-3.4.1/src/test_malloc.c:260:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(z, "0");
data/sqlcipher-3.4.1/src/test_multiplex.c:659:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nName = (int)strlen(zName);
data/sqlcipher-3.4.1/src/test_onefile.c:608:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen("-journal")==8);
data/sqlcipher-3.4.1/src/test_onefile.c:609:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = (int)strlen(zName)-((eType==JOURNAL_FILE)?8:0);
data/sqlcipher-3.4.1/src/test_onefile.c:690:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nName = (int)strlen(zPath) - 8;
data/sqlcipher-3.4.1/src/test_onefile.c:692:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen("-journal")==8);
data/sqlcipher-3.4.1/src/test_onefile.c:720:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nName = (int)strlen(zPath);
data/sqlcipher-3.4.1/src/test_onefile.c:727:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen("-journal")==8);
data/sqlcipher-3.4.1/src/test_osinst.c:679:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nStr = zStr ? (int)strlen(zStr) : 0;
data/sqlcipher-3.4.1/src/test_osinst.c:728:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nVfs = (int)strlen(zVfs);
data/sqlcipher-3.4.1/src/test_quota.c:357:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nName = (int)(strlen(zName) & 0x3fffffff);
data/sqlcipher-3.4.1/src/test_quota.c:386:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(zUtf8);
data/sqlcipher-3.4.1/src/test_quota.c:857:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nPattern = (int)(strlen(zPattern) & 0x3fffffff);
data/sqlcipher-3.4.1/src/test_quota.c:910:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    zFull[strlen(zFull)+1] = '\0';
data/sqlcipher-3.4.1/src/test_quota.c:1251:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nFull = strlen(zFull);
data/sqlcipher-3.4.1/src/test_sqllog.c:200:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      n = strlen(z);
data/sqlcipher-3.4.1/src/test_sqllog.c:203:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( n==strlen(zFile) && 0==memcmp(zFile, z, n) ){
data/sqlcipher-3.4.1/src/test_sqllog.c:255:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( zSearch && strlen(zSearch)==nVal1 
data/sqlcipher-3.4.1/src/test_sqllog.c:377:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( zVar==0 || strlen(zVar)+10>=(sizeof(sqllogglobal.zPrefix)) ) return;
data/sqlcipher-3.4.1/src/test_sqllog.c:432:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int nFile = strlen(zFile);
data/sqlcipher-3.4.1/src/test_superlock.c:77:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( zMode && strlen(zMode)==3 && sqlite3_strnicmp("wal", zMode, 3)==0 ){
data/sqlcipher-3.4.1/src/test_superlock.c:333:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(zVfs)==0 ) zVfs = 0;
data/sqlcipher-3.4.1/src/test_syscall.c:200:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nFunc = strlen(zFunc);
data/sqlcipher-3.4.1/src/test_syscall.c:202:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(aSyscall[i].zName)!=nFunc ) continue;
data/sqlcipher-3.4.1/src/test_syscall.c:509:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(aSyscall[i].zName)!=nFunc ) continue;
data/sqlcipher-3.4.1/src/test_vfs.c:609:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const char *z = &zName[strlen(zName)+1];
data/sqlcipher-3.4.1/src/test_vfs.c:612:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        z += strlen(z) + 1;
data/sqlcipher-3.4.1/src/test_vfs.c:614:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        z += strlen(z) + 1;
data/sqlcipher-3.4.1/src/test_vfs.c:829:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int szName = (int)strlen(pFd->zFilename);
data/sqlcipher-3.4.1/src/test_vfs.c:920:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nLock = (int)strlen(zLock);
data/sqlcipher-3.4.1/src/test_vfs.c:926:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nLock += (int)strlen(&zLock[nLock]);
data/sqlcipher-3.4.1/src/test_vfs.c:1497:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nByte = sizeof(Testvfs) + (int)strlen(zVfs)+1;
data/sqlcipher-3.4.1/src/test_vfs.c:1514:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  memcpy(p->zName, zVfs, strlen(zVfs)+1);
data/sqlcipher-3.4.1/src/test_vfstrace.c:187:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(z)-1;
data/sqlcipher-3.4.1/src/test_vfstrace.c:848:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nName = strlen(zTraceName);
data/sqlcipher-3.4.1/src/test_windirent.c:83:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dirp->d_first.d_name, data.name, NAME_MAX);
data/sqlcipher-3.4.1/src/test_windirent.c:116:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(dirp->d_next.d_name, data.name, NAME_MAX);
data/sqlcipher-3.4.1/src/test_windirent.c:140:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(entry->d_name, dirp->d_first.d_name, NAME_MAX);
data/sqlcipher-3.4.1/src/test_windirent.c:160:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(entry->d_name, data.name, NAME_MAX);
data/sqlcipher-3.4.1/src/util.c:109:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return 0x3fffffff & (int)strlen(z);
data/sqlcipher-3.4.1/src/util.c:121:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return pCol->zName + strlen(pCol->zName) + 1;
data/sqlcipher-3.4.1/src/wherecode.c:660:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( zAff==0 || (int)strlen(zAff)>=nEq );
data/sqlcipher-3.4.1/test/crashtest1.c:91:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(rand()%10000 + 1000);
data/sqlcipher-3.4.1/test/fuzzcheck.c:259:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int nName = (int)strlen(zName)+1;
data/sqlcipher-3.4.1/test/fuzzcheck.c:625:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *zEnd = &zSql[strlen(zSql)];
data/sqlcipher-3.4.1/test/fuzzcheck.c:1006:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sqlite3_bind_text64(pStmt, 1, zExpDb, strlen(zExpDb),
data/sqlcipher-3.4.1/test/fuzzcheck.c:1025:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sqlite3_bind_text64(pStmt, 1, zExpSql, strlen(zExpSql),
data/sqlcipher-3.4.1/test/fuzzcheck.c:1060:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = (int)strlen(zDbName) - 1;
data/sqlcipher-3.4.1/test/speedtest1.c:233:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(zOut+i);
data/sqlcipher-3.4.1/test/speedtest1.c:240:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(zOut+i);
data/sqlcipher-3.4.1/test/speedtest1.c:247:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(zOut+i);
data/sqlcipher-3.4.1/test/speedtest1.c:253:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(zOut+i);
data/sqlcipher-3.4.1/test/speedtest1.c:259:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(zOut+i);
data/sqlcipher-3.4.1/test/speedtest1.c:265:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(zOut+i);
data/sqlcipher-3.4.1/test/speedtest1.c:269:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(zOut+i);
data/sqlcipher-3.4.1/test/speedtest1.c:280:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(zTestName);
data/sqlcipher-3.4.1/test/speedtest1.c:286:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = (int)strlen(zName);
data/sqlcipher-3.4.1/test/speedtest1.c:327:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(zSql);
data/sqlcipher-3.4.1/test/speedtest1.c:402:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = (int)strlen(z);
data/sqlcipher-3.4.1/test/speedtest1.c:427:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = (int)strlen(zSql);
data/sqlcipher-3.4.1/test/speedtest1.c:1210:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int n = (int)strlen(aTrans[i].zPattern);
data/sqlcipher-3.4.1/test/threadtest1.c:53:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(100);
data/sqlcipher-3.4.1/test/threadtest3.c:387:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      MD5Update(p, (unsigned char*)zData, strlen(zData));
data/sqlcipher-3.4.1/test/threadtest3.c:515:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(10*1000);
data/sqlcipher-3.4.1/test/threadtest3.c:857:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if( nCopy!=read(fd1, aBuf, nCopy) ){
data/sqlcipher-3.4.1/test/threadtest3.c:970:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(500*1000);
data/sqlcipher-3.4.1/test/tt3_checkpoint.c:78:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(CHECKPOINT_STARVATION_READMS*1000);
data/sqlcipher-3.4.1/test/tt3_checkpoint.c:110:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(CHECKPOINT_STARVATION_READMS*1000/4);
data/sqlcipher-3.4.1/tool/fuzzershell.c:249:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t sz = strlen(z);
data/sqlcipher-3.4.1/tool/fuzzershell.c:299:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  x.szSep = (int)strlen(x.zSep);
data/sqlcipher-3.4.1/tool/fuzzershell.c:998:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                i, (int)strlen(&zIn[i]), &zIn[i]);
data/sqlcipher-3.4.1/tool/getlock.c:88:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  got = read(hDb, aHdr, 100);
data/sqlcipher-3.4.1/tool/getlock.c:108:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nName = (int)strlen(argv[1]);
data/sqlcipher-3.4.1/tool/lemon.c:59:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define lemonStrlen(X)   ((int)strlen(X))
data/sqlcipher-3.4.1/tool/lemon.c:4512:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nextChar = fgetc(in);
data/sqlcipher-3.4.1/tool/mkkeywordhash.c:355:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p->len = (int)strlen(p->zName);
data/sqlcipher-3.4.1/tool/mkkeywordhash.c:562:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    printf("%s,%*s", zToken, (int)(14-strlen(zToken)), "");
data/sqlcipher-3.4.1/tool/offsets.c:100:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(zCol)==strlen(zColumn)
data/sqlcipher-3.4.1/tool/offsets.c:100:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(zCol)==strlen(zColumn)
data/sqlcipher-3.4.1/tool/offsets.c:101:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     && sqlite3_strnicmp(zCol, zColumn, strlen(zCol))==0
data/sqlcipher-3.4.1/tool/rollback-test.c:51:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(z);
data/sqlcipher-3.4.1/tool/showdb.c:155:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    got = read(g.dbfd, aData, nByte);
data/sqlcipher-3.4.1/tool/showdb.c:255:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = (int)strlen(zBuf);
data/sqlcipher-3.4.1/tool/showdb.c:263:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(&zBuf[i]);
data/sqlcipher-3.4.1/tool/showdb.c:331:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(zDesc, "*");     /* NULL is a "*" */
data/sqlcipher-3.4.1/tool/showdb.c:347:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(zDesc, "0");
data/sqlcipher-3.4.1/tool/showdb.c:349:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(zDesc, "1");
data/sqlcipher-3.4.1/tool/showdb.c:359:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = (int)strlen(zDesc);
data/sqlcipher-3.4.1/tool/showdb.c:422:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc = strlen(zDesc);
data/sqlcipher-3.4.1/tool/showdb.c:429:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc += strlen(&zDesc[nDesc]);
data/sqlcipher-3.4.1/tool/showdb.c:439:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc += strlen(&zDesc[nDesc]);
data/sqlcipher-3.4.1/tool/showdb.c:446:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc += strlen(&zDesc[nDesc]);
data/sqlcipher-3.4.1/tool/showdb.c:710:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      j = (int)strlen(zBuf);
data/sqlcipher-3.4.1/tool/showjournal.c:56:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = (int)strlen(zBuf);
data/sqlcipher-3.4.1/tool/showjournal.c:64:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(&zBuf[i]);
data/sqlcipher-3.4.1/tool/showwal.c:124:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read(fd, aData, nByte);
data/sqlcipher-3.4.1/tool/showwal.c:184:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = (int)strlen(zBuf);
data/sqlcipher-3.4.1/tool/showwal.c:192:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i += (int)strlen(&zBuf[i]);
data/sqlcipher-3.4.1/tool/showwal.c:312:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(zDesc, "*");     /* NULL is a "*" */
data/sqlcipher-3.4.1/tool/showwal.c:328:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(zDesc, "0");
data/sqlcipher-3.4.1/tool/showwal.c:330:7:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
      sprintf(zDesc, "1");
data/sqlcipher-3.4.1/tool/showwal.c:340:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    j = (int)strlen(zDesc);
data/sqlcipher-3.4.1/tool/showwal.c:402:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc = strlen(zDesc);
data/sqlcipher-3.4.1/tool/showwal.c:409:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc += strlen(&zDesc[nDesc]);
data/sqlcipher-3.4.1/tool/showwal.c:419:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc += strlen(&zDesc[nDesc]);
data/sqlcipher-3.4.1/tool/showwal.c:426:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nDesc += strlen(&zDesc[nDesc]);
data/sqlcipher-3.4.1/tool/showwal.c:501:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      j = (int)strlen(zBuf);
data/sqlcipher-3.4.1/tool/showwal.c:529:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  read(fd, zPgSz, 4);
data/sqlcipher-3.4.1/tool/speedtest16.c:46:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = strlen(z);
data/sqlcipher-3.4.1/tool/sqldiff.c:113:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nNew = (int)strlen(p->z + p->nUsed);
data/sqlcipher-3.4.1/tool/sqldiff.c:1671:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fwrite(zTab, 1, strlen(zTab), out);
data/sqlcipher-3.4.1/tool/varint.c:71:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   || (strlen(argv[1])==2 && hexValue(argv[1][0])>=0 && hexValue(argv[1][1])>=0)
data/sqlcipher-3.4.1/tool/varint.c:75:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(argv[i])!=2 ){
data/sqlcipher-3.4.1/tool/varint.c:84:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if( strlen(argv[i])!=2 ){

ANALYSIS SUMMARY:

Hits = 1685
Lines analyzed = 296258 in approximately 8.88 seconds (33354 lines/second)
Physical Source Lines of Code (SLOC) = 196457
Hits@level = [0] 1136 [1] 359 [2] 1206 [3]  50 [4]  69 [5]   1
Hits@level+ = [0+] 2821 [1+] 1685 [2+] 1326 [3+] 120 [4+]  70 [5+]   1
Hits/KSLOC@level+ = [0+] 14.3594 [1+] 8.57694 [2+] 6.74957 [3+] 0.610821 [4+] 0.356312 [5+] 0.00509017
Dot directories skipped = 2 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.