===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
pccts-1.33MR33/antlr/antlr.g-2106-		$eh = (ExceptionHandler *)calloc(1, sizeof(ExceptionHandler));
pccts-1.33MR33/antlr/antlr.g:2107:		require($eh!=NULL, "exception: cannot allocate handler");
pccts-1.33MR33/antlr/antlr.g-2108-		>>
##############################################
pccts-1.33MR33/antlr/antlr.g-2111-			$eh->signalname = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char));
pccts-1.33MR33/antlr/antlr.g:2112:			require($eh->signalname!=NULL, "exception: cannot allocate sig name");
pccts-1.33MR33/antlr/antlr.g-2113-			strcpy($eh->signalname, LATEXT(1));
##############################################
pccts-1.33MR33/antlr/antlr.g-2117-			$eh->signalname = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char));
pccts-1.33MR33/antlr/antlr.g:2118:			require($eh->signalname!=NULL, "exception: cannot allocate sig name");
pccts-1.33MR33/antlr/antlr.g-2119-			strcpy($eh->signalname, LATEXT(1));
##############################################
pccts-1.33MR33/antlr/antlr.g-2126-			$eh->action = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char));
pccts-1.33MR33/antlr/antlr.g:2127:			require($eh->action!=NULL, "exception: cannot allocate action");
pccts-1.33MR33/antlr/antlr.g-2128-			strcpy($eh->action, LATEXT(1));