Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/stringencoders-3.10.3+git20180306/src/arraytoc.c
Examining data/stringencoders-3.10.3+git20180306/src/arraytoc.h
Examining data/stringencoders-3.10.3+git20180306/src/extern_c_begin.h
Examining data/stringencoders-3.10.3+git20180306/src/extern_c_end.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_ascii.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b16.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b16_gen.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b2.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b2_gen.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b36.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b64.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b64_gen.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b64r.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_b85.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_b85_gen.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_data.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_burl.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_burl.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_burl_data.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_html.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_html.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_html_named_entities.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_json.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_json.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_json_data.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_mainpage.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_qsiter.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_stdint.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_utf8.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_xml.c
Examining data/stringencoders-3.10.3+git20180306/src/modp_xml.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_ascii.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_b16.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_b2.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_b36.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_b64.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_b64w.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_b85.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_bjavascript.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_numtoa.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_qsiter.h
Examining data/stringencoders-3.10.3+git20180306/src/modp_utf8.h
Examining data/stringencoders-3.10.3+git20180306/test/apr_base64.c
Examining data/stringencoders-3.10.3+git20180306/test/apr_base64.h
Examining data/stringencoders-3.10.3+git20180306/test/cxx_test.cc
Examining data/stringencoders-3.10.3+git20180306/test/minunit.h
Examining data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_html_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_json_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c
Examining data/stringencoders-3.10.3+git20180306/test/speedtest.c
Examining data/stringencoders-3.10.3+git20180306/test/speedtest_ascii.c
Examining data/stringencoders-3.10.3+git20180306/test/speedtest_msg.c
Examining data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c
Examining data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c

FINAL RESULTS:

data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:20:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case4);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:24:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case3);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:28:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case2);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:32:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case1);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:91:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case4);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:95:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case3);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:99:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case2);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:103:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case1);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:118:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case4);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:122:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case3);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:126:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case2);
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(orig, case1);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:80:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "b64='%s', d=%d", obuf, (int)d);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:92:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "b64='%s', d=%d", obuf, (int)d);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:105:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "b64='%s', d=%d", obuf, (int)d);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:119:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "b64='%s', d=%d", obuf, (int)d);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:134:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "b64='%s', d=%d", obuf, (int)d);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:150:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg, "b64='%s', d=%d", obuf, (int)d);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:231:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(msg, "i = %d, %s", i, decode);
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:241:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(msg, "i=%d, b64=%s", i, decode);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:163:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(buf1, formats[k], d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:164:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(msg, "orig=%f whole=%f, frac=%f, prec=%d -- want %s",
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:175:21:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    sprintf(buf1, formats[k], d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:191:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(msg, "whole=%f, frac=%f, prec=%d, got=%d %s-- ",
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:303:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(buf1, formats[k], d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:320:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(msg, "orig=%f whole=%f, frac=%f, prec=%d -- want %s",
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:327:21:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                    sprintf(buf1, formats[k], d);
data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c:7:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char map[256];
data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c:22:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char map[256];
data/stringencoders-3.10.3+git20180306/src/modp_ascii_gen.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char map[256];
data/stringencoders-3.10.3+git20180306/src/modp_b2.c:38:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void*)dest, modp_b2_encodemap[orig[i]], (size_t)8);
data/stringencoders-3.10.3+git20180306/src/modp_b64_gen.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cary[256];
data/stringencoders-3.10.3+git20180306/src/modp_b85_gen.c:8:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char gsIntToChar[85];
data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c:10:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hexEncode1[256];
data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c:11:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hexEncode2[256];
data/stringencoders-3.10.3+git20180306/src/modp_bjavascript_gen.c:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jsEncodeMap[256];
data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:7:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hexEncode1[256];
data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:8:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hexEncode2[256];
data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char urlEncodeMap[256];
data/stringencoders-3.10.3+git20180306/src/modp_burl_gen.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char urlEncodeMap[256];
data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:172:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(str, "%e", neg ? -value : value);
data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:280:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(str, "%e", neg ? -value : value);
data/stringencoders-3.10.3+git20180306/test/apr_base64.c:30:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char pr2six[256] = {
data/stringencoders-3.10.3+git20180306/test/apr_base64.c:72:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char os_toascii[256];
data/stringencoders-3.10.3+git20180306/test/minunit.h:80:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mu_buf[1024];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:19:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char orig[100];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[5];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[5];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[5];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char orig[100];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char orig[100];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:170:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:201:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:236:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[300];
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:238:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[300];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:15:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:16:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[10];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[2];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[5];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rbuf[4];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[100]; /* for test messages output */
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:55:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "(i,j) = (%u,%u):", i, j);
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:114:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:157:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X1");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:159:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1X");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:161:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XX");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:165:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X111");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:167:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1X11");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:169:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "11X1");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:171:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "111X");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:175:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XX11");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:177:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1XX1");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:179:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "11XX");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:181:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X1X1");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:183:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1X1X");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:185:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X11X");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:189:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1XXX");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:191:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X1XX");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:193:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XX1X");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:195:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XXX1");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:199:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XXXX");
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:207:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:14:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:15:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[2];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[17];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rbuf[17];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[100]; /* for test messages output */
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:48:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "(i,j) = (%u,%u):", i, j);
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:138:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:147:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X1");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:149:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1X");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:151:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XX");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:155:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X111");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:157:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1X11");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:159:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "11X1");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:161:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "111X");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:165:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XX11");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:167:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1XX1");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:169:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "11XX");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:171:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X1X1");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:173:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1X1X");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:175:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X11X");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:179:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "1XXX");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:181:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "X1XX");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:183:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XX1X");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:185:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XXX1");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:189:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "XXXX");
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:19:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:20:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char result[10];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[10];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[100];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char ibuf[6] = { 1, 1, 1, 1, 1, 1 };
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[10];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:74:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rbuf[10];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[4];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[5];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rbuf[4];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[100];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out[1000];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char decode[5];
data/stringencoders-3.10.3+git20180306/test/modp_b64_test.c:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[100];
data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:20:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:21:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char result[10];
data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:88:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char ibuf[10]; /* input */
data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:89:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char obuf[10]; /* output */
data/stringencoders-3.10.3+git20180306/test/modp_b85_test.c:90:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rbuf[10]; /* final result */
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:17:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:88:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:190:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:218:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bad8[4]; /* %XX where X is high bit (test sign char vs. uint8_t*) */
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:225:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char inputbuf[3 * 256 + 1];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:275:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[257];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:294:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(msg, "Loop at %d", i);
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:315:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(msg, "Loop at %d", i);
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:329:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:330:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char input[257];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[257 * 3];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:340:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(msg, "Loop at %d failed", i);
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:348:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:358:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "abcdefg");
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:362:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "a b c d e f g");
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:366:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "abcdefg\n");
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:370:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "\nabcdefg\n");
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:380:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ibuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:381:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[100];
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:390:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "abcdefg");
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:394:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "a b c d e f g");
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:398:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "abcdefg\n");
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:402:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(ibuf, "\nabcdefg\n");
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:17:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:244:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:276:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:18:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:19:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:23:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%d", i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:28:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%d", -i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:33:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%d", INT_MAX - i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:38:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%d", -(INT_MAX - i));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:53:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%u", i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:60:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%u", 0xFFFFFFFFu - i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:75:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%ld", i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:80:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%ld", -i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:85:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%ld", LONG_MAX - i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:90:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%ld", -(LONG_MAX - i));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:105:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%llu", i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:112:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%llu", 0xFFFFFFFFFFFFFFFFllu - i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[200];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:171:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(msg, "whole=%f, frac=%f, prec=%d -- ",
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:213:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%.6f", d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:220:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%.6f", d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[200];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:300:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(msg, "whole=%f, frac=%f, prec=%d -- ",
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:352:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%.6f", d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:361:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%.6f", d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:385:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:388:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%lld", longmin);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:393:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%lld", longmax);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:402:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:403:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:406:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%d", intmin);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:411:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%d", intmax);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:421:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:441:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:442:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:446:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%f", d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:468:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:474:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf1, "%f", d);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:492:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[100];
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:505:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf1, "%08X", i);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[100];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:17:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:93:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:112:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:247:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/stringencoders-3.10.3+git20180306/test/speedtest.c:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char teststr1[SZ];
data/stringencoders-3.10.3+git20180306/test/speedtest.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[SZ * 8];
data/stringencoders-3.10.3+git20180306/test/speedtest.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result2[SZ * 8];
data/stringencoders-3.10.3+git20180306/test/speedtest_ascii.c:236:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/stringencoders-3.10.3+git20180306/test/speedtest_ascii.c:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[300];
data/stringencoders-3.10.3+git20180306/test/speedtest_msg.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[512];
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:16:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:31:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%hhu", ju8);
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:61:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%hu", ju16);
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:90:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%u", i);
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:118:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%hhd", j8);
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:148:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%hd", j16);
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:179:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", i);
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:210:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%X", i);
data/stringencoders-3.10.3+git20180306/test/speedtest_numtoa.c:240:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%e", (double)(i));
data/stringencoders-3.10.3+git20180306/src/modp_b16.h:92:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b16_encode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_b16.h:126:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b16_decode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_b36.h:109:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b36_encode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_b64.h:171:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64_encode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_b64.h:213:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64_decode(src, strlen(src));
data/stringencoders-3.10.3+git20180306/src/modp_b64_gen.c:67:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen((char*)replacements) != 3) {
data/stringencoders-3.10.3+git20180306/src/modp_b64r.h:172:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64r_encode(s, static_cast<int>(strlen(s)));
data/stringencoders-3.10.3+git20180306/src/modp_b64r.h:215:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64r_decode(src, strlen(src));
data/stringencoders-3.10.3+git20180306/src/modp_b64w.h:166:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64w_encode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_b64w.h:208:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b64w_decode(src, strlen(src));
data/stringencoders-3.10.3+git20180306/src/modp_b85.h:109:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return b85_encode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_bjavascript.h:91:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return javascript_encode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_burl.h:149:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return url_encode(s, strlen(s));
data/stringencoders-3.10.3+git20180306/src/modp_json.c:255:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return modp_json_add_string(ctx, src, strlen(src));
data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:173:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(str);
data/stringencoders-3.10.3+git20180306/src/modp_numtoa.c:281:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return strlen(str);
data/stringencoders-3.10.3+git20180306/test/cxx_test.cc:351:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const string s2(url_decode(data, strlen(data)));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:21:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_tolower(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:25:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_tolower(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:29:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_tolower(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:33:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_tolower(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:62:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toupper_copy(obuf, buf, strlen(buf));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:77:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toupper_copy(obuf, buf, strlen(buf));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:92:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toupper(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:96:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toupper(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:100:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toupper(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:104:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toupper(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:119:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toprint(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:123:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toprint(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:127:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toprint(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_ascii_test.c:131:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    modp_toprint(orig, strlen(orig));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:158:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:160:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:162:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:166:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:168:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:170:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:172:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:176:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:178:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:180:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:182:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:184:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:186:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:190:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:192:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:194:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:196:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b16_test.c:200:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b16_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:148:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:150:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:152:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:156:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:158:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:160:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:162:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:166:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:168:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:170:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:172:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:174:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:176:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:180:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:182:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:184:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:186:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_b2_test.c:190:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(-1, modp_b2_decode(obuf, ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:19:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len1 = strlen(s1);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:36:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len1 = strlen(s1);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:37:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len2 = strlen(s2);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:65:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len1 = strlen(s1);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:66:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len2 = strlen(s2);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:91:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len1 = strlen(s1);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:92:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len2 = strlen(s2);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:115:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len1 = strlen(s1);
data/stringencoders-3.10.3+git20180306/test/modp_bjavascript_test.c:116:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len2 = strlen(s2);
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:62:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_encode(buf, input, strlen(input));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:63:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(output));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:66:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, output, strlen(output));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:67:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(input));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:86:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_encode(buf, lower, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:87:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:90:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, lower, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:91:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:95:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_encode(buf, upper, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:96:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:99:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, upper, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:100:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:104:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_encode(buf, digits, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:105:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:108:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, digits, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:109:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:113:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_encode(buf, special, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:114:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:117:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, special, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:118:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:138:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_min_encode(buf, lower, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:139:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:142:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, lower, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:143:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:147:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_min_encode(buf, upper, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:148:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:151:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, upper, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:152:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:156:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_min_encode(buf, digits, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:157:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:160:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, digits, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:161:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:165:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_min_encode(buf, special, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:166:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:169:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, special, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:170:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:174:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_min_encode(buf, extra, strlen(extra));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:175:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(extra));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:178:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, extra, strlen(extra));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:179:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(extra));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:195:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_min_encode(buf, str1, strlen(str1));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:201:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_min_encode(buf, str2, strlen(str2));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:228:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad1, strlen(bad1));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:229:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad1));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:233:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad2, strlen(bad2));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:234:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad2));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:238:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad3, strlen(bad3));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:239:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad3));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:243:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad4, strlen(bad4));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:244:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad4));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:248:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad5, strlen(bad5));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:249:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad5));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:253:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad6, strlen(bad6));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:254:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad6));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:258:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad7, strlen(bad7));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:259:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad7));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:263:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_burl_decode(buf, bad8, strlen(bad8));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:264:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(bad8));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:355:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:355:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:359:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:359:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:363:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:363:78:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:367:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:367:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:371:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:371:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:387:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:387:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:391:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:391:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:395:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:395:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf), (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:399:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:399:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 2, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:403:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_burl_test.c:403:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(ibuf) + 4, (size_t)modp_burl_min_encode_strlen(ibuf, strlen(ibuf)));
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:41:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = 0; i < (int)strlen(digits); ++i) {
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:64:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:69:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s2, strlen(s2), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:74:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s3, strlen(s3), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:79:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s4, strlen(s4), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:84:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s5, strlen(s5), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:89:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s6, strlen(s6), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:94:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s7, strlen(s7), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:99:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ch = modp_html_decode_char_at(s8, strlen(s8), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:114:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:122:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:130:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:138:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:146:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:154:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:162:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:170:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:178:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:186:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:195:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:204:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ch = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:226:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:234:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:242:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:250:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:259:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:268:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_html_test.c:277:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp = modp_html_decode_char_at(s1, strlen(s1), &consumed);
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:52:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(buf), expected);
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:81:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(buf), expected);
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:115:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(buf), expected);
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:152:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(buf), expected);
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:178:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(buf), expected);
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:205:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(buf), expected);
data/stringencoders-3.10.3+git20180306/test/modp_json_test.c:235:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(buf), expected);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:25:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:30:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:35:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:40:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:55:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:62:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:77:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:82:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:87:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:92:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:107:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:114:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:168:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:177:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:188:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        tmplen = strlen(++tmp);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:202:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:208:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:215:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:222:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf1));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:236:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i = 0; i < strlen(buf); ++i) {
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:248:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    i = strlen(buf);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:317:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        tmplen = strlen(++tmp);
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:331:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:341:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:347:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:356:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:365:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:371:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_numtoa_test.c:374:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(len, strlen(buf2));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:21:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:24:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:37:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:41:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.pos, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:42:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:60:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:64:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.pos, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:65:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:83:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:88:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:96:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.pos, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:97:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:115:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:129:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:133:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.pos, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:134:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:152:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:156:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.pos, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:157:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:175:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:179:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.pos, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:180:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:198:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:203:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:212:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:230:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    qsiter_reset(&qsi, s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:235:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:244:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:252:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.pos, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_qsiter_test.c:253:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(qsi.len, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:40:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s2), 2);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:41:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s2, strlen(s2));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:44:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s2, strlen(s2) - 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:49:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s2, strlen(s2));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:54:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s2, strlen(s2));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:58:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s2, strlen(s2));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:62:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s2, strlen(s2));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:66:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s2, strlen(s2));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:76:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s3), 3);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:77:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s3, strlen(s3));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:80:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s3, strlen(s3) - 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:84:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s3, strlen(s3));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:88:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s3, strlen(s3));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:92:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s3, strlen(s3));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:96:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s3, strlen(s3));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:105:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s4), 4);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:106:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s4, strlen(s4));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:109:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s4, strlen(s4) - 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:114:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s4, strlen(s4));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:118:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s4, strlen(s4));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:122:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s4, strlen(s4));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:126:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s4, strlen(s4));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:135:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:136:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:140:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:141:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:145:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:146:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:150:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:151:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:155:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:156:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:160:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:161:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:165:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:166:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:170:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(strlen(s), 1);
data/stringencoders-3.10.3+git20180306/test/modp_utf8_test.c:171:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_utf8_validate(s, strlen(s));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:42:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, lower, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:43:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(lower));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:47:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, upper, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:48:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(upper));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:52:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, digits, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:53:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(digits));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:57:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, special, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:58:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(special));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:77:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:78:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:97:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:98:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:116:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:117:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:135:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:136:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:154:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:155:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:173:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:174:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:192:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:193:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:298:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:299:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:314:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d = modp_xml_decode(buf, strin, strlen(strin));
data/stringencoders-3.10.3+git20180306/test/modp_xml_test.c:315:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mu_assert_int_equals(d, strlen(strout));
data/stringencoders-3.10.3+git20180306/test/speedtest.c:153:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(result);

ANALYSIS SUMMARY:

Hits = 585
Lines analyzed = 21511 in approximately 0.70 seconds (30878 lines/second)
Physical Source Lines of Code (SLOC) = 17567
Hits@level = [0] 144 [1] 313 [2] 245 [3]   0 [4]  27 [5]   0
Hits@level+ = [0+] 729 [1+] 585 [2+] 272 [3+]  27 [4+]  27 [5+]   0
Hits/KSLOC@level+ = [0+] 41.4983 [1+] 33.3011 [2+] 15.4836 [3+] 1.53697 [4+] 1.53697 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.