Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/stringencoders-3.10.3+git20180306/src/arraytoc.c Examining data/stringencoders-3.10.3+git20180306/src/arraytoc.h Examining data/stringencoders-3.10.3+git20180306/src/extern_c_begin.h Examining data/stringencoders-3.10.3+git20180306/src/extern_c_end.h Examining data/stringencoders-3.10.3+git20180306/src/modp_ascii.c Examining data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b16.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b16_gen.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b2.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b2_gen.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b36.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b64.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b64_gen.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b64r.h Examining data/stringencoders-3.10.3+git20180306/src/modp_b85.c Examining data/stringencoders-3.10.3+git20180306/src/modp_b85_gen.c Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript.c Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_data.h Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c Examining data/stringencoders-3.10.3+git20180306/src/modp_burl.c Examining data/stringencoders-3.10.3+git20180306/src/modp_burl.h Examining data/stringencoders-3.10.3+git20180306/src/modp_burl_data.h Examining data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c Examining data/stringencoders-3.10.3+git20180306/src/modp_html.c Examining data/stringencoders-3.10.3+git20180306/src/modp_html.h Examining data/stringencoders-3.10.3+git20180306/src/modp_html_named_entities.h Examining data/stringencoders-3.10.3+git20180306/src/modp_json.c Examining data/stringencoders-3.10.3+git20180306/src/modp_json.h Examining data/stringencoders-3.10.3+git20180306/src/modp_json_data.h Examining data/stringencoders-3.10.3+git20180306/src/modp_mainpage.h Examining data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c Examining data/stringencoders-3.10.3+git20180306/src/modp_qsiter.c Examining data/stringencoders-3.10.3+git20180306/src/modp_stdint.h Examining data/stringencoders-3.10.3+git20180306/src/modp_utf8.c Examining data/stringencoders-3.10.3+git20180306/src/modp_xml.c Examining data/stringencoders-3.10.3+git20180306/src/modp_xml.h Examining data/stringencoders-3.10.3+git20180306/src/modp_ascii.h Examining data/stringencoders-3.10.3+git20180306/src/modp_b16.h Examining data/stringencoders-3.10.3+git20180306/src/modp_b2.h Examining data/stringencoders-3.10.3+git20180306/src/modp_b36.h Examining data/stringencoders-3.10.3+git20180306/src/modp_b64.h Examining data/stringencoders-3.10.3+git20180306/src/modp_b64w.h Examining data/stringencoders-3.10.3+git20180306/src/modp_b85.h Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript.h Examining data/stringencoders-3.10.3+git20180306/src/modp_numtoa.h Examining data/stringencoders-3.10.3+git20180306/src/modp_qsiter.h Examining data/stringencoders-3.10.3+git20180306/src/modp_utf8.h Examining data/stringencoders-3.10.3+git20180306/test/apr_base64.c Examining data/stringencoders-3.10.3+git20180306/test/apr_base64.h Examining data/stringencoders-3.10.3+git20180306/test/cxx_test.cc Examining data/stringencoders-3.10.3+git20180306/test/minunit.h Examining data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_html_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_json_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c Examining data/stringencoders-3.10.3+git20180306/test/speedtest.c Examining data/stringencoders-3.10.3+git20180306/test/speedtest_ascii.c Examining data/stringencoders-3.10.3+git20180306/test/speedtest_msg.c Examining data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c Examining data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c Examining data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c FINAL RESULTS: data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:20:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case4); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:24:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case3); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:28:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case2); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:32:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case1); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:91:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case4); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:95:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case3); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:99:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case2); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:103:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case1); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:118:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case4); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:122:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case3); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:126:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case2); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:130:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig, case1); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:80:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "b64='%s', d=%d", obuf, (int)d); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:92:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "b64='%s', d=%d", obuf, (int)d); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:105:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "b64='%s', d=%d", obuf, (int)d); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:119:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "b64='%s', d=%d", obuf, (int)d); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:134:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "b64='%s', d=%d", obuf, (int)d); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:150:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "b64='%s', d=%d", obuf, (int)d); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:231:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "i = %d, %s", i, decode); data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:241:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "i=%d, b64=%s", i, decode); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:163:17: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf1, formats[k], d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:164:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "orig=%f whole=%f, frac=%f, prec=%d -- want %s", data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:175:21: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf1, formats[k], d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:191:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "whole=%f, frac=%f, prec=%d, got=%d %s-- ", data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:303:17: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf1, formats[k], d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:320:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "orig=%f whole=%f, frac=%f, prec=%d -- want %s", data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:327:21: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf1, formats[k], d); data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c:7:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[256]; data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c:22:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[256]; data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[256]; data/stringencoders-3.10.3+git20180306/src/modp_b2.c:38:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)dest, modp_b2_encodemap[orig[i]], (size_t)8); data/stringencoders-3.10.3+git20180306/src/modp_b64_gen.c:61:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cary[256]; data/stringencoders-3.10.3+git20180306/src/modp_b85_gen.c:8:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gsIntToChar[85]; data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c:10:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hexEncode1[256]; data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c:11:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hexEncode2[256]; data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c:24:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jsEncodeMap[256]; data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:7:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hexEncode1[256]; data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:8:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hexEncode2[256]; data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:21:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char urlEncodeMap[256]; data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char urlEncodeMap[256]; data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:172:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%e", neg ? -value : value); data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:280:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%e", neg ? -value : value); data/stringencoders-3.10.3+git20180306/test/apr_base64.c:30:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char pr2six[256] = { data/stringencoders-3.10.3+git20180306/test/apr_base64.c:72:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char os_toascii[256]; data/stringencoders-3.10.3+git20180306/test/minunit.h:80:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mu_buf[1024]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:19:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char orig[100]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[5]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[5]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:47:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[5]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:90:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char orig[100]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char orig[100]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:140:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:141:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:170:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:171:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:201:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:202:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:203:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:236:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:237:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output[300]; data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:238:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[300]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:15:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:16:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[10]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[2]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[5]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rbuf[4]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:47:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[100]; /* for test messages output */ data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:55:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "(i,j) = (%u,%u):", i, j); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:74:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:102:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:113:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:114:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:148:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:149:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:157:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X1"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:159:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1X"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:161:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XX"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:165:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X111"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:167:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1X11"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:169:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "11X1"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:171:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "111X"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:175:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XX11"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:177:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1XX1"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:179:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "11XX"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:181:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X1X1"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:183:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1X1X"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:185:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X11X"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:189:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1XXX"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:191:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X1XX"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:193:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XX1X"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:195:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XXX1"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:199:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XXXX"); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:207:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:208:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:14:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:15:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[2]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[17]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rbuf[17]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[100]; /* for test messages output */ data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:48:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "(i,j) = (%u,%u):", i, j); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:94:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:104:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:138:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:139:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:147:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X1"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:149:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1X"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:151:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XX"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:155:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X111"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:157:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1X11"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:159:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "11X1"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:161:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "111X"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:165:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XX11"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:167:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1XX1"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:169:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "11XX"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:171:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X1X1"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:173:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1X1X"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:175:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X11X"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:179:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "1XXX"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:181:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "X1XX"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:183:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XX1X"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:185:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XXX1"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:189:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "XXXX"); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:197:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:198:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:19:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:20:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char result[10]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[100]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:72:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char ibuf[6] = { 1, 1, 1, 1, 1, 1 }; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:73:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[10]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:74:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rbuf[10]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[4]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:174:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[5]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rbuf[4]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[100]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:212:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[1000]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:213:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char decode[5]; data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[100]; data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:20:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:21:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char result[10]; data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:88:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ibuf[10]; /* input */ data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:89:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char obuf[10]; /* output */ data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:90:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rbuf[10]; /* final result */ data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:17:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:62:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:88:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:18:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:134:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:190:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:218:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bad8[4]; /* %XX where X is high bit (test sign char vs. uint8_t*) */ data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:225:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:274:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inputbuf[3 * 256 + 1]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:275:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output[257]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:276:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:294:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Loop at %d", i); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:315:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Loop at %d", i); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:329:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:330:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[257]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:332:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char output[257 * 3]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:334:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:340:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Loop at %d failed", i); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:348:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:349:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:358:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "abcdefg"); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:362:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "a b c d e f g"); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:366:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "abcdefg\n"); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:370:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "\nabcdefg\n"); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:380:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:381:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[100]; data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:390:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "abcdefg"); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:394:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "a b c d e f g"); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:398:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "abcdefg\n"); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:402:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ibuf, "\nabcdefg\n"); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:17:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:90:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:124:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:161:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:186:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:244:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:276:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:18:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:19:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:23:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%d", i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:28:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%d", -i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:33:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%d", INT_MAX - i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:38:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%d", -(INT_MAX - i)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:49:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:53:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%u", i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:60:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%u", 0xFFFFFFFFu - i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:75:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%ld", i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:80:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%ld", -i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:85:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%ld", LONG_MAX - i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:90:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%ld", -(LONG_MAX - i)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:100:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:105:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%llu", i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:112:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%llu", 0xFFFFFFFFFFFFFFFFllu - i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:122:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:124:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[200]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:171:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "whole=%f, frac=%f, prec=%d -- ", data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:213:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%.6f", d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:220:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%.6f", d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:267:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:269:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[200]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:300:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "whole=%f, frac=%f, prec=%d -- ", data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:352:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%.6f", d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:361:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%.6f", d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:384:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:385:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:388:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%lld", longmin); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:393:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%lld", longmax); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:402:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:403:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:406:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%d", intmin); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:411:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%d", intmax); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:421:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:441:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:442:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:446:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%f", d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:467:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:468:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:474:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%f", d); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:491:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:492:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[100]; data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:505:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf1, "%08X", i); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:518:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[100]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:17:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:73:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:131:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:150:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:169:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:188:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:247:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:310:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/stringencoders-3.10.3+git20180306/test/speedtest.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teststr1[SZ]; data/stringencoders-3.10.3+git20180306/test/speedtest.c:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[SZ * 8]; data/stringencoders-3.10.3+git20180306/test/speedtest.c:51:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result2[SZ * 8]; data/stringencoders-3.10.3+git20180306/test/speedtest_ascii.c:236:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/stringencoders-3.10.3+git20180306/test/speedtest_ascii.c:237:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[300]; data/stringencoders-3.10.3+git20180306/test/speedtest_msg.c:64:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[512]; data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:16:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:31:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%hhu", ju8); data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:61:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%hu", ju16); data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:90:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", i); data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:118:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%hhd", j8); data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:148:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%hd", j16); data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:179:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", i); data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:210:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", i); data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:240:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%e", (double)(i)); data/stringencoders-3.10.3+git20180306/src/modp_b16.h:92:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b16_encode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_b16.h:126:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b16_decode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_b36.h:109:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b36_encode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_b64.h:171:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b64_encode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_b64.h:213:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b64_decode(src, strlen(src)); data/stringencoders-3.10.3+git20180306/src/modp_b64_gen.c:67:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen((char*)replacements) != 3) { data/stringencoders-3.10.3+git20180306/src/modp_b64r.h:172:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b64r_encode(s, static_cast<int>(strlen(s))); data/stringencoders-3.10.3+git20180306/src/modp_b64r.h:215:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b64r_decode(src, strlen(src)); data/stringencoders-3.10.3+git20180306/src/modp_b64w.h:166:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b64w_encode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_b64w.h:208:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b64w_decode(src, strlen(src)); data/stringencoders-3.10.3+git20180306/src/modp_b85.h:109:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return b85_encode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_bjavascript.h:91:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return javascript_encode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_burl.h:149:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return url_encode(s, strlen(s)); data/stringencoders-3.10.3+git20180306/src/modp_json.c:255:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return modp_json_add_string(ctx, src, strlen(src)); data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:173:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(str); data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:281:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(str); data/stringencoders-3.10.3+git20180306/test/cxx_test.cc:351:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const string s2(url_decode(data, strlen(data))); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:21:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_tolower(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:25:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_tolower(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:29:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_tolower(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:33:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_tolower(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:62:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toupper_copy(obuf, buf, strlen(buf)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:77:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toupper_copy(obuf, buf, strlen(buf)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:92:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toupper(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:96:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toupper(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:100:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toupper(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:104:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toupper(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:119:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toprint(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:123:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toprint(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:127:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toprint(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:131:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). modp_toprint(orig, strlen(orig)); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:158:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:160:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:162:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:166:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:168:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:170:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:172:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:176:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:178:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:180:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:182:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:184:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:186:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:190:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:192:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:194:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:196:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:200:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:148:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:150:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:152:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:156:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:158:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:160:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:162:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:166:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:168:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:170:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:172:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:174:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:176:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:180:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:182:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:184:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:186:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:190:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:19:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len1 = strlen(s1); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:36:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len1 = strlen(s1); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:37:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len2 = strlen(s2); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:65:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len1 = strlen(s1); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:66:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len2 = strlen(s2); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:91:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len1 = strlen(s1); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:92:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len2 = strlen(s2); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:115:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len1 = strlen(s1); data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:116:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len2 = strlen(s2); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:62:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_encode(buf, input, strlen(input)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:63:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(output)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:66:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, output, strlen(output)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:67:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(input)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:86:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_encode(buf, lower, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:87:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:90:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, lower, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:91:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:95:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_encode(buf, upper, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:96:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:99:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, upper, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:100:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:104:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_encode(buf, digits, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:105:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:108:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, digits, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:109:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:113:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_encode(buf, special, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:114:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:117:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, special, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:118:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:138:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_min_encode(buf, lower, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:139:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:142:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, lower, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:143:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:147:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_min_encode(buf, upper, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:148:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:151:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, upper, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:152:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:156:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_min_encode(buf, digits, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:157:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:160:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, digits, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:161:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:165:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_min_encode(buf, special, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:166:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:169:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, special, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:170:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:174:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_min_encode(buf, extra, strlen(extra)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:175:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(extra)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:178:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, extra, strlen(extra)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:179:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(extra)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:195:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_min_encode(buf, str1, strlen(str1)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:201:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_min_encode(buf, str2, strlen(str2)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:228:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad1, strlen(bad1)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:229:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad1)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:233:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad2, strlen(bad2)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:234:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad2)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:238:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad3, strlen(bad3)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:239:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad3)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:243:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad4, strlen(bad4)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:244:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad4)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:248:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad5, strlen(bad5)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:249:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad5)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:253:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad6, strlen(bad6)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:254:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad6)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:258:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad7, strlen(bad7)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:259:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad7)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:263:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_burl_decode(buf, bad8, strlen(bad8)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:264:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(bad8)); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:355:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:355:78: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:359:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:359:78: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:363:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:363:78: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:367:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:367:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:371:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:371:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:387:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:387:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:391:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:391:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:395:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:395:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:399:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:399:86: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:403:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:403:86: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf))); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:41:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int)strlen(digits); ++i) { data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:64:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:69:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s2, strlen(s2), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:74:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s3, strlen(s3), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:79:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s4, strlen(s4), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:84:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s5, strlen(s5), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:89:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s6, strlen(s6), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:94:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s7, strlen(s7), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:99:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s8, strlen(s8), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:114:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:122:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:130:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:138:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:146:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:154:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:162:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:170:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:178:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:186:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:195:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:204:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:226:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:234:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:242:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:250:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:259:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:268:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:277:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp = modp_html_decode_char_at(s1, strlen(s1), &consumed); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:52:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(buf), expected); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:81:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(buf), expected); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:115:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(buf), expected); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:152:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(buf), expected); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:178:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(buf), expected); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:205:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(buf), expected); data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:235:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(buf), expected); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:25:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:30:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:35:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:40:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:55:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:62:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:77:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:82:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:87:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:92:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:107:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:114:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:168:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:177:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:188:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmplen = strlen(++tmp); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:202:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:208:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:215:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:222:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf1)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:236:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen(buf); ++i) { data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:248:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(buf); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:317:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmplen = strlen(++tmp); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:331:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:341:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:347:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:356:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:365:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:371:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:374:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(len, strlen(buf2)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:21:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:24:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:37:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:41:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.pos, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:42:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:60:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:64:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.pos, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:65:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:83:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:88:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:96:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.pos, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:97:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:115:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:129:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:133:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.pos, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:134:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:152:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:156:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.pos, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:157:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:175:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:179:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.pos, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:180:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:198:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:203:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:212:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:230:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qsiter_reset(&qsi, s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:235:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:244:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:252:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.pos, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:253:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(qsi.len, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:40:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s2), 2); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:41:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s2, strlen(s2)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:44:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s2, strlen(s2) - 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:49:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s2, strlen(s2)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:54:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s2, strlen(s2)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:58:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s2, strlen(s2)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:62:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s2, strlen(s2)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:66:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s2, strlen(s2)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:76:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s3), 3); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:77:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s3, strlen(s3)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:80:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s3, strlen(s3) - 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:84:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s3, strlen(s3)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:88:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s3, strlen(s3)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:92:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s3, strlen(s3)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:96:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s3, strlen(s3)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:105:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s4), 4); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:106:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s4, strlen(s4)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:109:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s4, strlen(s4) - 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:114:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s4, strlen(s4)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:118:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s4, strlen(s4)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:122:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s4, strlen(s4)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:126:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s4, strlen(s4)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:135:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:136:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:140:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:141:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:145:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:146:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:150:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:151:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:155:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:156:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:160:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:161:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:165:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:166:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:170:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(strlen(s), 1); data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:171:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_utf8_validate(s, strlen(s)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:42:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, lower, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:43:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(lower)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:47:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, upper, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:48:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(upper)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:52:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, digits, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:53:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(digits)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:57:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, special, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:58:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(special)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:77:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:78:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:97:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:98:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:116:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:117:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:135:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:136:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:154:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:155:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:173:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:174:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:192:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:193:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:298:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:299:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:314:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d = modp_xml_decode(buf, strin, strlen(strin)); data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:315:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mu_assert_int_equals(d, strlen(strout)); data/stringencoders-3.10.3+git20180306/test/speedtest.c:153:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(result); ANALYSIS SUMMARY: Hits = 585 Lines analyzed = 21511 in approximately 0.70 seconds (30878 lines/second) Physical Source Lines of Code (SLOC) = 17567 Hits@level = [0] 144 [1] 313 [2] 245 [3] 0 [4] 27 [5] 0 Hits@level+ = [0+] 729 [1+] 585 [2+] 272 [3+] 27 [4+] 27 [5+] 0 Hits/KSLOC@level+ = [0+] 41.4983 [1+] 33.3011 [2+] 15.4836 [3+] 1.53697 [4+] 1.53697 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.