(lp0
ccopy_reg
_reconstructor
p1
(c__main__
Hit
p2
c__builtin__
object
p3
Ntp4
Rp5
(dp6
S'category'
p7
S'buffer'
p8
sS'end'
p9
I692
sS'name'
p10
S'gets'
p11
sS'parameters'
p12
(lp13
S''
p14
aS'f'
p15
asS'level'
p16
I5
sS'url'
p17
g14
sS'column'
p18
I2
sS'context_text'
p19
S' gets(f);'
p20
sS'hook'
p21
c__main__
normal
p22
sS'warning'
p23
S'Does not check for buffer overflows (CWE-120, CWE-20)'
p24
sS'suggestion'
p25
S'Use fgets() instead'
p26
sS'input'
p27
I1
sS'line'
p28
I32
sS'filename'
p29
S'test.c'
p30
sS'start'
p31
I688
sbag1
(g2
g3
Ntp32
Rp33
(dp34
g7
g8
sg9
I1462
sg10
S'strncat'
p35
sg12
(lp36
g14
aS'd'
p37
aS's'
p38
aS'sizeof(d)'
p39
asg16
I5
sg17
g14
sg18
I3
sg19
S'  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */'
p40
sS'note'
p41
S'Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left.'
p42
sg21
c__main__
c_strncat
p43
sg23
S'Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120)'
p44
sg25
S'Consider strcat_s, strlcat, snprintf, or automatically resizing strings'
p45
sg28
I60
sg29
g30
sg31
I1455
sbag1
(g2
g3
Ntp46
Rp47
(dp48
g7
g8
sg9
I1539
sg10
S'_tcsncat'
p49
sg12
(lp50
g14
aS'd'
p51
aS's'
p52
aS'sizeof(d)'
p53
asg16
I5
sg17
g14
sg18
I3
sg19
S'  _tcsncat(d,s,sizeof(d)); /* Misuse - flag as riskier */'
p54
sg41
g42
sg21
g43
sg23
g44
sg25
S'Consider strcat_s, strlcat, or automatically resizing strings'
p55
sg28
I61
sg29
g30
sg31
I1531
sbag1
(g2
g3
Ntp56
Rp57
(dp58
g7
g8
sg9
I1680
sg10
S'MultiByteToWideChar'
p59
sg12
(lp60
g14
aS'CP_ACP'
p61
aS'0'
p62
aS'szName'
p63
aS'-1'
p64
aS'wszUserName'
p65
aS'sizeof(wszUserName)'
p66
asg16
I5
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName));'
p67
sg41
S'Risk is high, it appears that the size is given as bytes, but the function requires size as characters.'
p68
sg21
c__main__
c_multi_byte_to_wide_char
p69
sg23
S'Requires maximum length in CHARACTERS, not bytes (CWE-120)'
p70
sg25
g14
sg28
I64
sg29
g30
sg31
I1661
sbag1
(g2
g3
Ntp71
Rp72
(dp73
g7
g8
sg9
I1815
sg10
S'MultiByteToWideChar'
p74
sg12
(lp75
g14
aS'CP_ACP'
p76
aS'0'
p77
aS'szName'
p78
aS'-1'
p79
aS'wszUserName'
p80
aS'sizeof wszUserName'
p81
asg16
I5
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof wszUserName);'
p82
sg41
g68
sg21
g69
sg23
g70
sg25
g14
sg28
I66
sg29
g30
sg31
I1796
sbag1
(g2
g3
Ntp83
Rp84
(dp85
g7
S'misc'
p86
sg9
I2533
sg10
S'SetSecurityDescriptorDacl'
p87
sg12
(lp88
g14
aS'&sd'
p89
aS'TRUE'
p90
aS'NULL'
p91
aS'FALSE'
p92
asg16
I5
sg17
g14
sg18
I3
sg31
I2508
sg19
S'  SetSecurityDescriptorDacl(&sd,TRUE,NULL,FALSE);'
p93
sg21
c__main__
c_hit_if_null
p94
sg23
S'Never create NULL ACLs; an attacker can set it to Everyone (Deny All Access), which would even forbid administrator access (CWE-732)'
p95
sg25
g14
sg28
I77
sg29
g30
sS'check_for_null'
p96
I3
sbag84
ag1
(g2
g3
Ntp97
Rp98
(dp99
g7
g8
sg9
I372
sg10
S'strcpy'
p100
sg12
(lp101
g14
aS'b'
p102
aS'a'
p103
asg16
I4
sg17
g14
sg18
I2
sg19
S' strcpy(b, a);'
p104
sg21
c__main__
c_buffer
p105
sg23
S'Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120)'
p106
sg25
S'Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused)'
p107
sg28
I17
sg29
g30
sg31
I366
sbag1
(g2
g3
Ntp108
Rp109
(dp110
g7
g8
sg9
I429
sg10
S'sprintf'
p111
sg12
(lp112
g14
aS's'
p113
aS'"hello %s"'
p114
aS'bug'
p115
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, "hello %s", bug);'
p116
sg21
c__main__
c_sprintf
p117
sg23
S'Does not check for buffer overflows (CWE-120)'
p118
sg25
S'Use sprintf_s, snprintf, or vsnprintf'
p119
sg28
I20
sg29
g30
sg31
I422
sbag1
(g2
g3
Ntp120
Rp121
(dp122
g7
g8
sg9
I459
sg10
S'sprintf'
p123
sg12
(lp124
g14
aS's'
p125
aS'gettext("hello %s")'
p126
aS'bug'
p127
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, gettext("hello %s"), bug);'
p128
sg21
g117
sg23
g118
sg25
g119
sg28
I21
sg29
g30
sg31
I452
sbag1
(g2
g3
Ntp129
Rp130
(dp131
g7
S'format'
p132
sg9
I498
sg10
S'sprintf'
p133
sg12
(lp134
g14
aS's'
p135
aS'unknown'
p136
aS'bug'
p137
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, unknown, bug);'
p138
sg21
g117
sg23
S'Potential format string problem (CWE-134)'
p139
sg25
S'Make format string constant'
p140
sg28
I22
sg29
g30
sg31
I491
sbag1
(g2
g3
Ntp141
Rp142
(dp143
g7
g132
sg9
I524
sg10
S'printf'
p144
sg12
(lp145
g14
aS'bf'
p146
aS'x'
p147
asg16
I4
sg17
g14
sg18
I2
sg19
S' printf(bf, x);'
p148
sg21
c__main__
c_printf
p149
sg23
S'If format strings can be influenced by an attacker, they can be exploited (CWE-134)'
p150
sg25
S'Use a constant for the format specification'
p151
sg28
I23
sg29
g30
sg31
I518
sbag1
(g2
g3
Ntp152
Rp153
(dp154
g7
g8
sg9
I557
sg10
S'scanf'
p155
sg12
(lp156
g14
aS'"%s"'
p157
aS's'
p158
asg16
I4
sg17
g14
sg18
I2
sg19
S' scanf("%s", s);'
p159
sg21
c__main__
c_scanf
p160
sg23
S"The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20)"
p161
sg25
S'Specify a limit to %s, or use a different input function'
p162
sg27
I1
sg28
I25
sg29
g30
sg31
I552
sbag1
(g2
g3
Ntp163
Rp164
(dp165
g7
g8
sg9
I593
sg10
S'scanf'
p166
sg12
(lp167
g14
aS'"%s"'
p168
ag158
asg16
I4
sg17
g14
sg18
I2
sg19
S' scanf("%s", s);'
p169
sg21
g160
sg23
g161
sg25
g162
sg27
I1
sg28
I27
sg29
g30
sg31
I588
sbag1
(g2
g3
Ntp170
Rp171
(dp172
g7
g132
sg9
I997
sg10
S'syslog'
p173
sg12
(lp174
g14
aS'LOG_ERR'
p175
aS'attacker_string'
p176
asg16
I4
sg17
g14
sg18
I2
sg19
S' syslog(LOG_ERR, attacker_string);'
p177
sg21
g149
sS'format_position'
p178
I2
sg23
S"If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134)"
p179
sg25
S'Use a constant format string for syslog'
p180
sg28
I38
sg29
g30
sg31
I991
sbag1
(g2
g3
Ntp181
Rp182
(dp183
g7
g8
sg9
I1088
sg10
S'_mbscpy'
p184
sg12
(lp185
g14
aS'd'
p186
aS's'
p187
asg16
I4
sg17
g14
sg18
I3
sg19
S"  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */"
p188
sg21
g105
sg23
g106
sg25
S'Consider using a function version that stops copying at the end of the buffer'
p189
sg28
I49
sg29
g30
sg31
I1081
sbag1
(g2
g3
Ntp190
Rp191
(dp192
g7
g8
sg9
I1394
sg10
S'lstrcat'
p193
sg12
(lp194
g14
aS'd'
p195
aS's'
p196
asg16
I4
sg17
g14
sg18
I3
sg19
S'  lstrcat(d,s);'
p197
sg21
g105
sg23
S'Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120)'
p198
sg25
g14
sg28
I56
sg29
g30
sg31
I1387
sbag1
(g2
g3
Ntp199
Rp200
(dp201
g7
S'shell'
p202
sg9
I2634
sg10
S'CreateProcess'
p203
sg12
(lp204
g14
aS'NULL'
p205
aS'"C:\\\\Program Files\\\\GoodGuy\\\\GoodGuy.exe -x"'
p206
aS'""'
p207
asg16
I3
sg17
g14
sg18
I3
sg31
I2621
sg19
S'  CreateProcess(NULL, "C:\\\\Program Files\\\\GoodGuy\\\\GoodGuy.exe -x", "");'
p208
sg21
g94
sg23
S'This causes a new process to execute and is difficult to use safely (CWE-78)'
p209
sg25
S'Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run'
p210
sg28
I79
sg29
g30
sg96
I1
sbag200
ag1
(g2
g3
Ntp211
Rp212
(dp213
g7
g86
sg9
I2759
sg10
S'LoadLibraryEx'
p214
sg12
(lp215
g14
aS'L"user32.dll"'
p216
aS'nullptr'
p217
aS'LOAD_LIBRARY_AS_DATAFILE'
p218
asg16
I3
sg17
g14
sg18
I10
sg19
S'  (void) LoadLibraryEx(L"user32.dll", nullptr, LOAD_LIBRARY_AS_DATAFILE);'
p219
sg21
c__main__
load_library_ex
p220
sg23
S'Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20)'
p221
sg25
S'Use a flag like LOAD_LIBRARY_SEARCH_SYSTEM32 or LOAD_LIBRARY_SEARCH_APPLICATION_DIR to search only desired folders'
p222
sg27
I1
sg28
I81
sg29
g30
sg31
I2746
sbag1
(g2
g3
Ntp223
Rp224
(dp225
g7
g8
sg9
I3361
sg10
S'getopt_long'
p226
sg12
(lp227
g14
aS'argc'
p228
aS'argv'
p229
aS'"a"'
p230
aS'longopts'
p231
aS'NULL'
p232
asg16
I3
sg17
S'dangers-c'
p233
sg18
I20
sg19
S'    while ((optc = getopt_long (argc, argv, "a",longopts, NULL )) != EOF) {'
p234
sg21
g22
sg23
S'Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20)'
p235
sg25
S'Check implementation on installation, or limit the size of all string inputs'
p236
sg27
I1
sg28
I99
sg29
g30
sg31
I3350
sbag1
(g2
g3
Ntp237
Rp238
(dp239
g7
g8
sg9
I318
sg10
S'strcpy'
p240
sg12
(lp241
g14
aS'a'
p242
aS'gettext("Hello there")'
p243
asg16
I2
sg17
g14
sg18
I2
sg19
S' strcpy(a, gettext("Hello there")); // Did this work?'
p244
sg41
S'Risk is low because the source is a constant string.'
p245
sg21
g105
sg23
g106
sg25
g107
sg28
I16
sg29
g30
sg31
I312
sbag1
(g2
g3
Ntp246
Rp247
(dp248
g7
g8
sg9
I407
sg10
S'sprintf'
p249
sg12
(lp250
g14
aS's'
p251
aS'"hello"'
p252
asg16
I2
sg17
g14
sg18
I2
sg19
S' sprintf(s, "hello");'
p253
sg41
S'Risk is low because the source has a constant maximum length.'
p254
sg21
g117
sg23
g118
sg25
g119
sg28
I19
sg29
g30
sg31
I400
sbag1
(g2
g3
Ntp255
Rp256
(dp257
g7
g8
sg29
g30
sg9
I1047
sg10
S'char'
p258
sg12
(lp259
sg16
I2
sg17
g14
sS'lookahead'
p260
S"char d[20];\n  char s[20];\n  int n;\n\n  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */\n  memcpy(d,s); // fail - no size\n  memcpy(d, s, sizeof(d)); // pass\n  memcpy(& n, s, sizeof( n )); // pass\n  memcpy(&n,s,sizeof(s)); // fail - sizeof not of destination\n  memcpy(d,s,n); // fail - size unguessable\n  CopyMemory(d,s);\n  lstrcat(d,s);\n  strncpy(d,s);\n  _tcsncpy(d,s);\n  strncat(d,s,10);\n  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */\n  _tcsncat(d,s"
p261
sg18
I3
sg19
S'  char d[20];'
p262
sg21
c__main__
c_static_array
p263
sg23
S'Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120)'
p264
sg25
S'Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length'
p265
sg28
I45
sS'extract_lookahead'
p266
I1
sg31
I1043
sbag1
(g2
g3
Ntp267
Rp268
(dp269
g7
g8
sg29
g30
sg9
I1061
sg10
S'char'
p270
sg12
(lp271
sg16
I2
sg17
g14
sg260
S"char s[20];\n  int n;\n\n  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */\n  memcpy(d,s); // fail - no size\n  memcpy(d, s, sizeof(d)); // pass\n  memcpy(& n, s, sizeof( n )); // pass\n  memcpy(&n,s,sizeof(s)); // fail - sizeof not of destination\n  memcpy(d,s,n); // fail - size unguessable\n  CopyMemory(d,s);\n  lstrcat(d,s);\n  strncpy(d,s);\n  _tcsncpy(d,s);\n  strncat(d,s,10);\n  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */\n  _tcsncat(d,s,sizeof(d)); /"
p272
sg18
I3
sg19
S'  char s[20];'
p273
sg21
g263
sg23
g264
sg25
g265
sg28
I46
sg266
I1
sg31
I1057
sbag1
(g2
g3
Ntp274
Rp275
(dp276
g7
g8
sg9
I1161
sg10
S'memcpy'
p277
sg12
(lp278
g14
aS'd'
p279
aS's'
p280
asg16
I2
sg17
g14
sg18
I3
sg19
S'  memcpy(d,s); // fail - no size'
p281
sg21
c__main__
c_memcpy
p282
sg23
S'Does not check for buffer overflows when copying to destination (CWE-120)'
p283
sg25
S'Make sure destination can always hold the source data'
p284
sg28
I50
sg29
g30
sg31
I1155
sbag1
(g2
g3
Ntp285
Rp286
(dp287
g7
g8
sg9
I1268
sg10
S'memcpy'
p288
sg12
(lp289
g14
aS'&n'
p290
aS's'
p291
aS'sizeof(s)'
p292
asg16
I2
sg17
g14
sg18
I3
sg19
S'  memcpy(&n,s,sizeof(s)); // fail - sizeof not of destination'
p293
sg21
g282
sg23
g283
sg25
g284
sg28
I53
sg29
g30
sg31
I1262
sbag1
(g2
g3
Ntp294
Rp295
(dp296
g7
g8
sg9
I1330
sg10
S'memcpy'
p297
sg12
(lp298
g14
aS'd'
p299
aS's'
p300
aS'n'
p301
asg16
I2
sg17
g14
sg18
I3
sg19
S'  memcpy(d,s,n); // fail - size unguessable'
p302
sg21
g282
sg23
g283
sg25
g284
sg28
I54
sg29
g30
sg31
I1324
sbag1
(g2
g3
Ntp303
Rp304
(dp305
g7
g8
sg9
I1378
sg10
S'CopyMemory'
p306
sg12
(lp307
g14
aS'd'
p308
aS's'
p309
asg16
I2
sg17
g14
sg18
I3
sg19
S'  CopyMemory(d,s);'
p310
sg21
g282
sg23
g283
sg25
g284
sg28
I55
sg29
g30
sg31
I1368
sbag1
(g2
g3
Ntp311
Rp312
(dp313
g7
g86
sg9
I3455
sg10
S'fopen'
p314
sg12
(lp315
g14
aS'"/etc/passwd"'
p316
aS'"r"'
p317
asg16
I2
sg17
g14
sg18
I7
sg19
S'  f = fopen("/etc/passwd", "r"); '
p318
sg21
g22
sg23
S'Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362)'
p319
sg25
g14
sg28
I105
sg29
g30
sg31
I3450
sbag1
(g2
g3
Ntp320
Rp321
(dp322
g7
g8
sg9
I282
sg10
S'strcpy'
p323
sg12
(lp324
g14
aS'a'
p325
aS'"\\n"'
p326
asg16
I1
sg17
g14
sg18
I2
sg19
S' strcpy(a, "\\n"); // Did this work?'
p327
sg41
S'Risk is low because the source is a constant character.'
p328
sg21
g105
sg23
g106
sg25
g107
sg28
I15
sg29
g30
sg31
I276
sbag1
(g2
g3
Ntp329
Rp330
(dp331
g7
g8
sg9
I388
sg10
S'sprintf'
p332
sg12
(lp333
g14
aS's'
p334
aS'"\\n"'
p335
asg16
I1
sg17
g14
sg18
I2
sg19
S' sprintf(s, "\\n");'
p336
sg41
S'Risk is low because the source is a constant character.'
p337
sg21
g117
sg23
g118
sg25
g119
sg28
I18
sg29
g30
sg31
I381
sbag1
(g2
g3
Ntp338
Rp339
(dp340
g7
g8
sg9
I574
sg10
S'scanf'
p341
sg12
(lp342
g14
aS'"%10s"'
p343
ag158
asg16
I1
sg17
g14
sg18
I2
sg19
S' scanf("%10s", s);'
p344
sg21
g160
sg23
S"It's unclear if the %s limit in the format string is small enough (CWE-120)"
p345
sg25
S'Check that the limit is sufficiently small, or use a different input function'
p346
sg27
I1
sg28
I26
sg29
g30
sg31
I569
sbag1
(g2
g3
Ntp347
Rp348
(dp349
g7
g8
sg9
I1410
sg10
S'strncpy'
p350
sg12
(lp351
g14
aS'd'
p352
aS's'
p353
asg16
I1
sg17
g14
sg18
I3
sg19
S'  strncpy(d,s);'
p354
sg21
g105
sg23
S"Easily used incorrectly; doesn't always \\0-terminate or check for invalid pointers [MS-banned] (CWE-120)"
p355
sg25
g14
sg28
I57
sg29
g30
sg31
I1403
sbag1
(g2
g3
Ntp356
Rp357
(dp358
g7
g8
sg9
I1427
sg10
S'_tcsncpy'
p359
sg12
(lp360
g14
aS'd'
p361
aS's'
p362
asg16
I1
sg17
g14
sg18
I3
sg19
S'  _tcsncpy(d,s);'
p363
sg21
g105
sg23
g355
sg25
g14
sg28
I58
sg29
g30
sg31
I1419
sbag1
(g2
g3
Ntp364
Rp365
(dp366
g7
g8
sg9
I1443
sg10
S'strncat'
p367
sg12
(lp368
g14
aS'd'
p369
aS's'
p370
aS'10'
p371
asg16
I1
sg17
g14
sg18
I3
sg19
S'  strncat(d,s,10);'
p372
sg21
g43
sg23
g44
sg25
g45
sg28
I59
sg29
g30
sg31
I1436
sbag1
(g2
g3
Ntp373
Rp374
(dp375
g7
g8
sg9
I1599
sg10
S'strlen'
p376
sg12
(lp377
g14
aS'd'
p378
asg16
I1
sg17
g14
sg18
I7
sg19
S'  n = strlen(d);'
p379
sg21
g22
sg23
S'Does not handle strings that are not \\0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126)'
p380
sg25
g14
sg28
I62
sg29
g30
sg31
I1593
sbag1
(g2
g3
Ntp381
Rp382
(dp383
g7
g8
sg9
I1918
sg10
S'MultiByteToWideChar'
p384
sg12
(lp385
g14
aS'CP_ACP'
p386
aS'0'
p387
aS'szName'
p388
aS'-1'
p389
aS'wszUserName'
p390
aS'sizeof(wszUserName)/sizeof(wszUserName[0])'
p391
asg16
I1
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName)/sizeof(wszUserName[0]));'
p392
sg41
S'Risk is very low, the length appears to be in characters not bytes.'
p393
sg21
g69
sg23
g70
sg25
g14
sg28
I68
sg29
g30
sg31
I1899
sbag1
(g2
g3
Ntp394
Rp395
(dp396
g7
g8
sg9
I2045
sg10
S'MultiByteToWideChar'
p397
sg12
(lp398
g14
aS'CP_ACP'
p399
aS'0'
p400
aS'szName'
p401
aS'-1'
p402
aS'wszUserName'
p403
aS'sizeof wszUserName /sizeof(wszUserName[0])'
p404
asg16
I1
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof wszUserName /sizeof(wszUserName[0]));'
p405
sg41
g393
sg21
g69
sg23
g70
sg25
g14
sg28
I70
sg29
g30
sg31
I2026
sbag1
(g2
g3
Ntp406
Rp407
(dp408
g7
g132
sg9
I200
sg10
S'printf'
p409
sg12
(lp410
g14
aS'"hello\\n"'
p411
asg16
I0
sg17
g14
sg18
I2
sg19
S' printf("hello\\n");'
p412
sg41
S'Constant format string, so not considered risky.'
p413
sg21
g149
sg23
g150
sg25
g151
sg28
I9
sg29
g30
sg31
I194
sbag1
(g2
g3
Ntp414
Rp415
(dp416
g7
g8
sg9
I539
sg10
S'scanf'
p417
sg12
(lp418
g14
aS'"%d"'
p419
aS'&x'
p420
asg16
I0
sg17
g14
sg18
I2
sg19
S' scanf("%d", &x);'
p421
sg41
S'No risky scanf format detected.'
p422
sg21
g160
sg23
g161
sg25
g162
sg27
I1
sg28
I24
sg29
g30
sg31
I534
sbag1
(g2
g3
Ntp423
Rp424
(dp425
g7
g132
sg9
I643
sg10
S'printf'
p426
sg12
(lp427
g14
aS'"\\\\"'
p428
asg16
I0
sg17
g14
sg18
I2
sg19
S' printf("\\\\");'
p429
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I29
sg29
g30
sg31
I637
sbag1
(g2
g3
Ntp430
Rp431
(dp432
g7
g132
sg9
I837
sg10
S'syslog'
p433
sg12
(lp434
g14
aS'LOG_ERR'
p435
aS'"cannot open config file (%s): %s"'
p436
aS'filename'
p437
aS'strerror(errno)'
p438
asg16
I0
sg17
g14
sg18
I2
sg19
S' syslog(LOG_ERR,"cannot open config file (%s): %s",filename,strerror(errno))'
p439
sg41
g413
sg21
g149
sg178
I2
sg23
g179
sg25
g180
sg28
I35
sg29
g30
sg31
I831
sbag1
(g2
g3
Ntp440
Rp441
(dp442
g7
g132
sg9
I914
sg10
S'syslog'
p443
sg12
(lp444
g14
aS'LOG_CRIT'
p445
aS'"malloc() failed"'
p446
asg16
I0
sg17
g14
sg18
I2
sg19
S' syslog(LOG_CRIT,"malloc() failed");'
p447
sg41
g413
sg21
g149
sg178
I2
sg23
g179
sg25
g180
sg28
I36
sg29
g30
sg31
I908
sbag1
(g2
g3
Ntp448
Rp449
(dp450
g7
g132
sg9
I3049
sg10
S'printf'
p451
sg12
(lp452
g14
aS'"%c\\n"'
p453
aS"'x'"
p454
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'x\');'
p455
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I85
sg29
g30
sg31
I3043
sbag1
(g2
g3
Ntp456
Rp457
(dp458
g7
g132
sg9
I3072
sg10
S'printf'
p459
sg12
(lp460
g14
aS'"%c\\n"'
p461
aS'\'"\''
p462
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'"\');'
p463
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I86
sg29
g30
sg31
I3066
sbag1
(g2
g3
Ntp464
Rp465
(dp466
g7
g132
sg9
I3095
sg10
S'printf'
p467
sg12
(lp468
g14
aS'"%c\\n"'
p469
aS'\'\\"\''
p470
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\"\');'
p471
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I87
sg29
g30
sg31
I3089
sbag1
(g2
g3
Ntp472
Rp473
(dp474
g7
g132
sg9
I3119
sg10
S'printf'
p475
sg12
(lp476
g14
aS'"%c\\n"'
p477
aS"'\\''"
p478
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\\'\');'
p479
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I88
sg29
g30
sg31
I3113
sbag1
(g2
g3
Ntp480
Rp481
(dp482
g7
g132
sg9
I3143
sg10
S'printf'
p483
sg12
(lp484
g14
aS'"%c\\n"'
p485
aS"'\\177'"
p486
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\177\');'
p487
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I89
sg29
g30
sg31
I3137
sbag1
(g2
g3
Ntp488
Rp489
(dp490
g7
g132
sg9
I3169
sg10
S'printf'
p491
sg12
(lp492
g14
aS'"%c\\n"'
p493
aS"'\\xfe'"
p494
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\xfe\');'
p495
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I90
sg29
g30
sg31
I3163
sbag1
(g2
g3
Ntp496
Rp497
(dp498
g7
g132
sg9
I3195
sg10
S'printf'
p499
sg12
(lp500
g14
aS'"%c\\n"'
p501
aS"'\\xd'"
p502
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\xd\');'
p503
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I91
sg29
g30
sg31
I3189
sbag1
(g2
g3
Ntp504
Rp505
(dp506
g7
g132
sg9
I3220
sg10
S'printf'
p507
sg12
(lp508
g14
aS'"%c\\n"'
p509
aS"'\\n'"
p510
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\n\');'
p511
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I92
sg29
g30
sg31
I3214
sbag1
(g2
g3
Ntp512
Rp513
(dp514
g7
g132
sg9
I3244
sg10
S'printf'
p515
sg12
(lp516
g14
aS'"%c\\n"'
p517
aS"'\\\\'"
p518
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\\\\');'
p519
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I93
sg29
g30
sg31
I3238
sbag1
(g2
g3
Ntp520
Rp521
(dp522
g7
g132
sg9
I3268
sg10
S'printf'
p523
sg12
(lp524
g14
aS'"%c\\n"'
p525
aS'"\'"'
p526
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", "\'");'
p527
sg41
g413
sg21
g149
sg23
g150
sg25
g151
sg28
I94
sg29
g30
sg31
I3262
sbag1
(g2
g3
Ntp528
Rp529
(dp530
g7
g132
sg9
I3593
sg10
S'fprintf'
p531
sg12
(lp532
g14
aS'stderr'
p533
aS'"Assertion failed.\\n"\\\n "File: %s\\nLine: %d\\n"\\\n "Assertion: %s\\n\\n"'
p534
aS'__FILE__'
p535
aS'__LINE__'
p536
aS'#x'
p537
asg16
I0
sg17
g14
sg18
I2
sg19
S' fprintf(stderr,"Assertion failed.\\n"\\'
p538
sg41
g413
sg21
g149
sg178
I2
sg23
g150
sg25
g151
sg28
I113
sg29
g30
sg31
I3586
sba.