(lp0
ccopy_reg
_reconstructor
p1
(c__main__
Hit
p2
c__builtin__
object
p3
Ntp4
Rp5
(dp6
S'category'
p7
S'buffer'
p8
sS'end'
p9
I692
sS'name'
p10
S'gets'
p11
sS'parameters'
p12
(lp13
S''
p14
aS'f'
p15
asS'level'
p16
I5
sS'url'
p17
g14
sS'column'
p18
I2
sS'context_text'
p19
S' gets(f);'
p20
sS'hook'
p21
c__main__
normal
p22
sS'warning'
p23
S'Does not check for buffer overflows (CWE-120, CWE-20)'
p24
sS'suggestion'
p25
S'Use fgets() instead'
p26
sS'input'
p27
I1
sS'line'
p28
I32
sS'filename'
p29
S'test.c'
p30
sS'start'
p31
I688
sbag1
(g2
g3
Ntp32
Rp33
(dp34
g7
g8
sg9
I1264
sg10
S'strncat'
p35
sg12
(lp36
g14
aS'd'
p37
aS's'
p38
aS'sizeof(d)'
p39
asg16
I5
sg17
g14
sg18
I3
sg19
S'  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */'
p40
sS'note'
p41
S'Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left.'
p42
sg21
c__main__
c_strncat
p43
sg23
S'Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120)'
p44
sg25
S'Consider strcat_s, strlcat, snprintf, or automatically resizing strings'
p45
sg28
I56
sg29
g30
sg31
I1257
sbag1
(g2
g3
Ntp46
Rp47
(dp48
g7
g8
sg9
I1341
sg10
S'_tcsncat'
p49
sg12
(lp50
g14
aS'd'
p51
aS's'
p52
aS'sizeof(d)'
p53
asg16
I5
sg17
g14
sg18
I3
sg19
S'  _tcsncat(d,s,sizeof(d)); /* Misuse - flag as riskier */'
p54
sg41
S'Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left.'
p55
sg21
g43
sg23
g44
sg25
S'Consider strcat_s, strlcat, or automatically resizing strings'
p56
sg28
I57
sg29
g30
sg31
I1333
sbag1
(g2
g3
Ntp57
Rp58
(dp59
g7
g8
sg9
I1482
sg10
S'MultiByteToWideChar'
p60
sg12
(lp61
g14
aS'CP_ACP'
p62
aS'0'
p63
aS'szName'
p64
aS'-1'
p65
aS'wszUserName'
p66
aS'sizeof(wszUserName)'
p67
asg16
I5
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName));'
p68
sg41
S'Risk is high, it appears that the size is given as bytes, but the function requires size as characters.'
p69
sg21
c__main__
c_multi_byte_to_wide_char
p70
sg23
S'Requires maximum length in CHARACTERS, not bytes (CWE-120)'
p71
sg25
g14
sg28
I60
sg29
g30
sg31
I1463
sbag1
(g2
g3
Ntp72
Rp73
(dp74
g7
g8
sg9
I1617
sg10
S'MultiByteToWideChar'
p75
sg12
(lp76
g14
aS'CP_ACP'
p77
aS'0'
p78
aS'szName'
p79
aS'-1'
p80
aS'wszUserName'
p81
aS'sizeof wszUserName'
p82
asg16
I5
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof wszUserName);'
p83
sg41
S'Risk is high, it appears that the size is given as bytes, but the function requires size as characters.'
p84
sg21
g70
sg23
g71
sg25
g14
sg28
I62
sg29
g30
sg31
I1598
sbag1
(g2
g3
Ntp85
Rp86
(dp87
g7
S'misc'
p88
sg9
I2335
sg10
S'SetSecurityDescriptorDacl'
p89
sg12
(lp90
g14
aS'&sd'
p91
aS'TRUE'
p92
aS'NULL'
p93
aS'FALSE'
p94
asg16
I5
sg17
g14
sg18
I3
sg31
I2310
sg19
S'  SetSecurityDescriptorDacl(&sd,TRUE,NULL,FALSE);'
p95
sg21
c__main__
c_hit_if_null
p96
sg23
S'Never create NULL ACLs; an attacker can set it to Everyone (Deny All Access), which would even forbid administrator access (CWE-732)'
p97
sg25
g14
sg28
I73
sg29
g30
sS'check_for_null'
p98
I3
sbag86
ag1
(g2
g3
Ntp99
Rp100
(dp101
g7
g8
sg9
I372
sg10
S'strcpy'
p102
sg12
(lp103
g14
aS'b'
p104
aS'a'
p105
asg16
I4
sg17
g14
sg18
I2
sg19
S' strcpy(b, a);'
p106
sg21
c__main__
c_buffer
p107
sg23
S'Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120)'
p108
sg25
S'Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused)'
p109
sg28
I17
sg29
g30
sg31
I366
sbag1
(g2
g3
Ntp110
Rp111
(dp112
g7
g8
sg9
I429
sg10
S'sprintf'
p113
sg12
(lp114
g14
aS's'
p115
aS'"hello %s"'
p116
aS'bug'
p117
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, "hello %s", bug);'
p118
sg21
c__main__
c_sprintf
p119
sg23
S'Does not check for buffer overflows (CWE-120)'
p120
sg25
S'Use sprintf_s, snprintf, or vsnprintf'
p121
sg28
I20
sg29
g30
sg31
I422
sbag1
(g2
g3
Ntp122
Rp123
(dp124
g7
g8
sg9
I459
sg10
S'sprintf'
p125
sg12
(lp126
g14
aS's'
p127
aS'gettext("hello %s")'
p128
aS'bug'
p129
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, gettext("hello %s"), bug);'
p130
sg21
g119
sg23
g120
sg25
g121
sg28
I21
sg29
g30
sg31
I452
sbag1
(g2
g3
Ntp131
Rp132
(dp133
g7
S'format'
p134
sg9
I498
sg10
S'sprintf'
p135
sg12
(lp136
g14
aS's'
p137
aS'unknown'
p138
aS'bug'
p139
asg16
I4
sg17
g14
sg18
I2
sg19
S' sprintf(s, unknown, bug);'
p140
sg21
g119
sg23
S'Potential format string problem (CWE-134)'
p141
sg25
S'Make format string constant'
p142
sg28
I22
sg29
g30
sg31
I491
sbag1
(g2
g3
Ntp143
Rp144
(dp145
g7
g134
sg9
I524
sg10
S'printf'
p146
sg12
(lp147
g14
aS'bf'
p148
aS'x'
p149
asg16
I4
sg17
g14
sg18
I2
sg19
S' printf(bf, x);'
p150
sg21
c__main__
c_printf
p151
sg23
S'If format strings can be influenced by an attacker, they can be exploited (CWE-134)'
p152
sg25
S'Use a constant for the format specification'
p153
sg28
I23
sg29
g30
sg31
I518
sbag1
(g2
g3
Ntp154
Rp155
(dp156
g7
g8
sg9
I557
sg10
S'scanf'
p157
sg12
(lp158
g14
aS'"%s"'
p159
aS's'
p160
asg16
I4
sg17
g14
sg18
I2
sg19
S' scanf("%s", s);'
p161
sg21
c__main__
c_scanf
p162
sg23
S"The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20)"
p163
sg25
S'Specify a limit to %s, or use a different input function'
p164
sg27
I1
sg28
I25
sg29
g30
sg31
I552
sbag1
(g2
g3
Ntp165
Rp166
(dp167
g7
g8
sg9
I593
sg10
S'scanf'
p168
sg12
(lp169
g14
aS'"%s"'
p170
ag160
asg16
I4
sg17
g14
sg18
I2
sg19
S' scanf("%s", s);'
p171
sg21
g162
sg23
g163
sg25
g164
sg27
I1
sg28
I27
sg29
g30
sg31
I588
sbag1
(g2
g3
Ntp172
Rp173
(dp174
g7
g134
sg9
I997
sg10
S'syslog'
p175
sg12
(lp176
g14
aS'LOG_ERR'
p177
aS'attacker_string'
p178
asg16
I4
sg17
g14
sg18
I2
sg19
S' syslog(LOG_ERR, attacker_string);'
p179
sg21
g151
sS'format_position'
p180
I2
sg23
S"If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134)"
p181
sg25
S'Use a constant format string for syslog'
p182
sg28
I38
sg29
g30
sg31
I991
sbag1
(g2
g3
Ntp183
Rp184
(dp185
g7
g8
sg9
I1088
sg10
S'_mbscpy'
p186
sg12
(lp187
g14
aS'd'
p188
aS's'
p189
asg16
I4
sg17
g14
sg18
I3
sg19
S"  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */"
p190
sg21
g107
sg23
g108
sg25
S'Consider using a function version that stops copying at the end of the buffer'
p191
sg28
I49
sg29
g30
sg31
I1081
sbag1
(g2
g3
Ntp192
Rp193
(dp194
g7
g8
sg9
I1196
sg10
S'lstrcat'
p195
sg12
(lp196
g14
aS'd'
p197
aS's'
p198
asg16
I4
sg17
g14
sg18
I3
sg19
S'  lstrcat(d,s);'
p199
sg21
g107
sg23
S'Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120)'
p200
sg25
g14
sg28
I52
sg29
g30
sg31
I1189
sbag1
(g2
g3
Ntp201
Rp202
(dp203
g7
S'shell'
p204
sg9
I2436
sg10
S'CreateProcess'
p205
sg12
(lp206
g14
aS'NULL'
p207
aS'"C:\\\\Program Files\\\\GoodGuy\\\\GoodGuy.exe -x"'
p208
aS'""'
p209
asg16
I3
sg17
g14
sg18
I3
sg31
I2423
sg19
S'  CreateProcess(NULL, "C:\\\\Program Files\\\\GoodGuy\\\\GoodGuy.exe -x", "");'
p210
sg21
g96
sg23
S'This causes a new process to execute and is difficult to use safely (CWE-78)'
p211
sg25
S'Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run'
p212
sg28
I75
sg29
g30
sg98
I1
sbag202
ag1
(g2
g3
Ntp213
Rp214
(dp215
g7
g8
sg9
I2859
sg10
S'getopt_long'
p216
sg12
(lp217
g14
aS'argc'
p218
aS'argv'
p219
aS'"a"'
p220
aS'longopts'
p221
aS'NULL'
p222
asg16
I3
sg17
S'dangers-c'
p223
sg18
I20
sg19
S'    while ((optc = getopt_long (argc, argv, "a",longopts, NULL )) != EOF) {'
p224
sg21
g22
sg23
S'Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20)'
p225
sg25
S'Check implementation on installation, or limit the size of all string inputs'
p226
sg27
I1
sg28
I91
sg29
g30
sg31
I2848
sbag1
(g2
g3
Ntp227
Rp228
(dp229
g7
g8
sg9
I318
sg10
S'strcpy'
p230
sg12
(lp231
g14
aS'a'
p232
aS'gettext("Hello there")'
p233
asg16
I2
sg17
g14
sg18
I2
sg19
S' strcpy(a, gettext("Hello there")); // Did this work?'
p234
sg41
S'Risk is low because the source is a constant string.'
p235
sg21
g107
sg23
g108
sg25
g109
sg28
I16
sg29
g30
sg31
I312
sbag1
(g2
g3
Ntp236
Rp237
(dp238
g7
g8
sg9
I407
sg10
S'sprintf'
p239
sg12
(lp240
g14
aS's'
p241
aS'"hello"'
p242
asg16
I2
sg17
g14
sg18
I2
sg19
S' sprintf(s, "hello");'
p243
sg41
S'Risk is low because the source has a constant maximum length.'
p244
sg21
g119
sg23
g120
sg25
g121
sg28
I19
sg29
g30
sg31
I400
sbag1
(g2
g3
Ntp245
Rp246
(dp247
g7
g8
sg29
g30
sg9
I1047
sg10
S'char'
p248
sg12
(lp249
sg16
I2
sg17
g14
sS'lookahead'
p250
S"char d[20];\n  char s[20];\n  int n;\n\n  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */\n  memcpy(d,s);\n  CopyMemory(d,s);\n  lstrcat(d,s);\n  strncpy(d,s);\n  _tcsncpy(d,s);\n  strncat(d,s,10);\n  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */\n  _tcsncat(d,s,sizeof(d)); /* Misuse - flag as riskier */\n  n = strlen(d);\n  /* This is wrong, and should be flagged as risky: */\n  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName));\n  /* Th"
p251
sg18
I3
sg19
S'  char d[20];'
p252
sg21
c__main__
c_static_array
p253
sg23
S'Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120)'
p254
sg25
S'Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length'
p255
sg28
I45
sS'extract_lookahead'
p256
I1
sg31
I1043
sbag1
(g2
g3
Ntp257
Rp258
(dp259
g7
g8
sg29
g30
sg9
I1061
sg10
S'char'
p260
sg12
(lp261
sg16
I2
sg17
g14
sg250
S"char s[20];\n  int n;\n\n  _mbscpy(d,s); /* like strcpy, this doesn't check for buffer overflow */\n  memcpy(d,s);\n  CopyMemory(d,s);\n  lstrcat(d,s);\n  strncpy(d,s);\n  _tcsncpy(d,s);\n  strncat(d,s,10);\n  strncat(d,s,sizeof(d)); /* Misuse - this should be flagged as riskier. */\n  _tcsncat(d,s,sizeof(d)); /* Misuse - flag as riskier */\n  n = strlen(d);\n  /* This is wrong, and should be flagged as risky: */\n  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName));\n  /* This is also wro"
p262
sg18
I3
sg19
S'  char s[20];'
p263
sg21
g253
sg23
g254
sg25
g255
sg28
I46
sg256
I1
sg31
I1057
sbag1
(g2
g3
Ntp264
Rp265
(dp266
g7
g8
sg9
I1161
sg10
S'memcpy'
p267
sg12
(lp268
g14
aS'd'
p269
aS's'
p270
asg16
I2
sg17
g14
sg18
I3
sg19
S'  memcpy(d,s);'
p271
sg21
g22
sg23
S'Does not check for buffer overflows when copying to destination (CWE-120)'
p272
sg25
S'Make sure destination can always hold the source data'
p273
sg28
I50
sg29
g30
sg31
I1155
sbag1
(g2
g3
Ntp274
Rp275
(dp276
g7
g8
sg9
I1180
sg10
S'CopyMemory'
p277
sg12
(lp278
g14
aS'd'
p279
aS's'
p280
asg16
I2
sg17
g14
sg18
I3
sg19
S'  CopyMemory(d,s);'
p281
sg21
g22
sg23
g272
sg25
g273
sg28
I51
sg29
g30
sg31
I1170
sbag1
(g2
g3
Ntp282
Rp283
(dp284
g7
g88
sg9
I2953
sg10
S'fopen'
p285
sg12
(lp286
g14
aS'"/etc/passwd"'
p287
aS'"r"'
p288
asg16
I2
sg17
g14
sg18
I7
sg19
S'  f = fopen("/etc/passwd", "r"); '
p289
sg21
g22
sg23
S'Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362)'
p290
sg25
g14
sg28
I97
sg29
g30
sg31
I2948
sbag1
(g2
g3
Ntp291
Rp292
(dp293
g7
g8
sg9
I282
sg10
S'strcpy'
p294
sg12
(lp295
g14
aS'a'
p296
aS'"\\n"'
p297
asg16
I1
sg17
g14
sg18
I2
sg19
S' strcpy(a, "\\n"); // Did this work?'
p298
sg41
S'Risk is low because the source is a constant character.'
p299
sg21
g107
sg23
g108
sg25
g109
sg28
I15
sg29
g30
sg31
I276
sbag1
(g2
g3
Ntp300
Rp301
(dp302
g7
g8
sg9
I388
sg10
S'sprintf'
p303
sg12
(lp304
g14
aS's'
p305
aS'"\\n"'
p306
asg16
I1
sg17
g14
sg18
I2
sg19
S' sprintf(s, "\\n");'
p307
sg41
S'Risk is low because the source is a constant character.'
p308
sg21
g119
sg23
g120
sg25
g121
sg28
I18
sg29
g30
sg31
I381
sbag1
(g2
g3
Ntp309
Rp310
(dp311
g7
g8
sg9
I574
sg10
S'scanf'
p312
sg12
(lp313
g14
aS'"%10s"'
p314
ag160
asg16
I1
sg17
g14
sg18
I2
sg19
S' scanf("%10s", s);'
p315
sg21
g162
sg23
S"It's unclear if the %s limit in the format string is small enough (CWE-120)"
p316
sg25
S'Check that the limit is sufficiently small, or use a different input function'
p317
sg27
I1
sg28
I26
sg29
g30
sg31
I569
sbag1
(g2
g3
Ntp318
Rp319
(dp320
g7
g8
sg9
I1212
sg10
S'strncpy'
p321
sg12
(lp322
g14
aS'd'
p323
aS's'
p324
asg16
I1
sg17
g14
sg18
I3
sg19
S'  strncpy(d,s);'
p325
sg21
g107
sg23
S"Easily used incorrectly; doesn't always \\0-terminate or check for invalid pointers [MS-banned] (CWE-120)"
p326
sg25
g14
sg28
I53
sg29
g30
sg31
I1205
sbag1
(g2
g3
Ntp327
Rp328
(dp329
g7
g8
sg9
I1229
sg10
S'_tcsncpy'
p330
sg12
(lp331
g14
aS'd'
p332
aS's'
p333
asg16
I1
sg17
g14
sg18
I3
sg19
S'  _tcsncpy(d,s);'
p334
sg21
g107
sg23
S"Easily used incorrectly; doesn't always \\0-terminate or check for invalid pointers [MS-banned] (CWE-120)"
p335
sg25
g14
sg28
I54
sg29
g30
sg31
I1221
sbag1
(g2
g3
Ntp336
Rp337
(dp338
g7
g8
sg9
I1245
sg10
S'strncat'
p339
sg12
(lp340
g14
aS'd'
p341
aS's'
p342
aS'10'
p343
asg16
I1
sg17
g14
sg18
I3
sg19
S'  strncat(d,s,10);'
p344
sg21
g43
sg23
g44
sg25
g45
sg28
I55
sg29
g30
sg31
I1238
sbag1
(g2
g3
Ntp345
Rp346
(dp347
g7
g8
sg9
I1401
sg10
S'strlen'
p348
sg12
(lp349
g14
aS'd'
p350
asg16
I1
sg17
g14
sg18
I7
sg19
S'  n = strlen(d);'
p351
sg21
g22
sg23
S'Does not handle strings that are not \\0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126)'
p352
sg25
g14
sg28
I58
sg29
g30
sg31
I1395
sbag1
(g2
g3
Ntp353
Rp354
(dp355
g7
g8
sg9
I1720
sg10
S'MultiByteToWideChar'
p356
sg12
(lp357
g14
aS'CP_ACP'
p358
aS'0'
p359
aS'szName'
p360
aS'-1'
p361
aS'wszUserName'
p362
aS'sizeof(wszUserName)/sizeof(wszUserName[0])'
p363
asg16
I1
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof(wszUserName)/sizeof(wszUserName[0]));'
p364
sg41
S'Risk is very low, the length appears to be in characters not bytes.'
p365
sg21
g70
sg23
g71
sg25
g14
sg28
I64
sg29
g30
sg31
I1701
sbag1
(g2
g3
Ntp366
Rp367
(dp368
g7
g8
sg9
I1847
sg10
S'MultiByteToWideChar'
p369
sg12
(lp370
g14
aS'CP_ACP'
p371
aS'0'
p372
aS'szName'
p373
aS'-1'
p374
aS'wszUserName'
p375
aS'sizeof wszUserName /sizeof(wszUserName[0])'
p376
asg16
I1
sg17
g14
sg18
I3
sg19
S'  MultiByteToWideChar(CP_ACP,0,szName,-1,wszUserName,sizeof wszUserName /sizeof(wszUserName[0]));'
p377
sg41
g365
sg21
g70
sg23
g71
sg25
g14
sg28
I66
sg29
g30
sg31
I1828
sbag1
(g2
g3
Ntp378
Rp379
(dp380
g7
g134
sg9
I200
sg10
S'printf'
p381
sg12
(lp382
g14
aS'"hello\\n"'
p383
asg16
I0
sg17
g14
sg18
I2
sg19
S' printf("hello\\n");'
p384
sg41
S'Constant format string, so not considered risky.'
p385
sg21
g151
sg23
g152
sg25
g153
sg28
I9
sg29
g30
sg31
I194
sbag1
(g2
g3
Ntp386
Rp387
(dp388
g7
g8
sg9
I539
sg10
S'scanf'
p389
sg12
(lp390
g14
aS'"%d"'
p391
aS'&x'
p392
asg16
I0
sg17
g14
sg18
I2
sg19
S' scanf("%d", &x);'
p393
sg41
S'No risky scanf format detected.'
p394
sg21
g162
sg23
g163
sg25
g164
sg27
I1
sg28
I24
sg29
g30
sg31
I534
sbag1
(g2
g3
Ntp395
Rp396
(dp397
g7
g134
sg9
I643
sg10
S'printf'
p398
sg12
(lp399
g14
aS'"\\\\"'
p400
asg16
I0
sg17
g14
sg18
I2
sg19
S' printf("\\\\");'
p401
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I29
sg29
g30
sg31
I637
sbag1
(g2
g3
Ntp402
Rp403
(dp404
g7
g134
sg9
I837
sg10
S'syslog'
p405
sg12
(lp406
g14
aS'LOG_ERR'
p407
aS'"cannot open config file (%s): %s"'
p408
aS'filename'
p409
aS'strerror(errno)'
p410
asg16
I0
sg17
g14
sg18
I2
sg19
S' syslog(LOG_ERR,"cannot open config file (%s): %s",filename,strerror(errno))'
p411
sg41
g385
sg21
g151
sg180
I2
sg23
g181
sg25
g182
sg28
I35
sg29
g30
sg31
I831
sbag1
(g2
g3
Ntp412
Rp413
(dp414
g7
g134
sg9
I914
sg10
S'syslog'
p415
sg12
(lp416
g14
aS'LOG_CRIT'
p417
aS'"malloc() failed"'
p418
asg16
I0
sg17
g14
sg18
I2
sg19
S' syslog(LOG_CRIT,"malloc() failed");'
p419
sg41
g385
sg21
g151
sg180
I2
sg23
g181
sg25
g182
sg28
I36
sg29
g30
sg31
I908
sbag1
(g2
g3
Ntp420
Rp421
(dp422
g7
g134
sg9
I2547
sg10
S'printf'
p423
sg12
(lp424
g14
aS'"%c\\n"'
p425
aS"'x'"
p426
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'x\');'
p427
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I77
sg29
g30
sg31
I2541
sbag1
(g2
g3
Ntp428
Rp429
(dp430
g7
g134
sg9
I2570
sg10
S'printf'
p431
sg12
(lp432
g14
aS'"%c\\n"'
p433
aS'\'"\''
p434
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'"\');'
p435
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I78
sg29
g30
sg31
I2564
sbag1
(g2
g3
Ntp436
Rp437
(dp438
g7
g134
sg9
I2593
sg10
S'printf'
p439
sg12
(lp440
g14
aS'"%c\\n"'
p441
aS'\'\\"\''
p442
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\"\');'
p443
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I79
sg29
g30
sg31
I2587
sbag1
(g2
g3
Ntp444
Rp445
(dp446
g7
g134
sg9
I2617
sg10
S'printf'
p447
sg12
(lp448
g14
aS'"%c\\n"'
p449
aS"'\\''"
p450
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\\'\');'
p451
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I80
sg29
g30
sg31
I2611
sbag1
(g2
g3
Ntp452
Rp453
(dp454
g7
g134
sg9
I2641
sg10
S'printf'
p455
sg12
(lp456
g14
aS'"%c\\n"'
p457
aS"'\\177'"
p458
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\177\');'
p459
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I81
sg29
g30
sg31
I2635
sbag1
(g2
g3
Ntp460
Rp461
(dp462
g7
g134
sg9
I2667
sg10
S'printf'
p463
sg12
(lp464
g14
aS'"%c\\n"'
p465
aS"'\\xfe'"
p466
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\xfe\');'
p467
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I82
sg29
g30
sg31
I2661
sbag1
(g2
g3
Ntp468
Rp469
(dp470
g7
g134
sg9
I2693
sg10
S'printf'
p471
sg12
(lp472
g14
aS'"%c\\n"'
p473
aS"'\\xd'"
p474
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\xd\');'
p475
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I83
sg29
g30
sg31
I2687
sbag1
(g2
g3
Ntp476
Rp477
(dp478
g7
g134
sg9
I2718
sg10
S'printf'
p479
sg12
(lp480
g14
aS'"%c\\n"'
p481
aS"'\\n'"
p482
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\n\');'
p483
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I84
sg29
g30
sg31
I2712
sbag1
(g2
g3
Ntp484
Rp485
(dp486
g7
g134
sg9
I2742
sg10
S'printf'
p487
sg12
(lp488
g14
aS'"%c\\n"'
p489
aS"'\\\\'"
p490
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", \'\\\\\');'
p491
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I85
sg29
g30
sg31
I2736
sbag1
(g2
g3
Ntp492
Rp493
(dp494
g7
g134
sg9
I2766
sg10
S'printf'
p495
sg12
(lp496
g14
aS'"%c\\n"'
p497
aS'"\'"'
p498
asg16
I0
sg17
g14
sg18
I3
sg19
S'  printf("%c\\n", "\'");'
p499
sg41
g385
sg21
g151
sg23
g152
sg25
g153
sg28
I86
sg29
g30
sg31
I2760
sbag1
(g2
g3
Ntp500
Rp501
(dp502
g7
g134
sg9
I3091
sg10
S'fprintf'
p503
sg12
(lp504
g14
aS'stderr'
p505
aS'"Assertion failed.\\n"\\\n "File: %s\\nLine: %d\\n"\\\n "Assertion: %s\\n\\n"'
p506
aS'__FILE__'
p507
aS'__LINE__'
p508
aS'#x'
p509
asg16
I0
sg17
g14
sg18
I2
sg19
S' fprintf(stderr,"Assertion failed.\\n"\\'
p510
sg41
g385
sg21
g151
sg180
I2
sg23
g152
sg25
g153
sg28
I105
sg29
g30
sg31
I3084
sba.