Fix ASan check __strcpy_chk-param-overlap fail
The check fail caused by using of undocumented abilities of strcpy.
ASan complains when strcpy-family functions used
with overlapping memory regions. strcpy specification does
not allow overlapping. This change makes strcpy wrapper
called strcpy_safe across whole parse.y, the wrapper detects
overlapping and redirects to memmove in such case.
Change-Id: I8c1c2d2195ade6bd2cd1c33690d656d0ceac33d8
Signed-off-by: Yaroslav Yamshchikov <y.yamshchiko@samsung.com>