This patch introduces a new experimental checker:
alpha.security.cert.str.32c
This checker is implemented based on the following rule:
https://wiki.sei.cmu.edu/confluence/display/c/STR32-C.+Do+not+pass+a+non-null-terminated+character+sequence+to+a+library+function+that+expects+a+string
It warns on reading non-null-terminated strings. This warning is restricted to
the allocations which the Static Analyzer models with unix.Malloc checker.
Also warns on misusing the strncpy() function.
Why? Is retrieving the size of arrays is so much more difficult? We miss the first example of the rule this way.