cppcheck 1.51-1 source package in Ubuntu
Changelog
cppcheck (1.51-1) unstable; urgency=low * New upstream release * Fix false-negative for realloc. Closes: #628593 -- Reijo Tomperi <email address hidden> Sat, 08 Oct 2011 21:55:53 +0300
Upload details
- Uploaded by:
- Reijo Tomperi
- Uploaded to:
- Sid
- Original maintainer:
- Reijo Tomperi
- Architectures:
- any
- Section:
- devel
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cppcheck_1.51-1.dsc | 1.2 KiB | aa66e719026193e93832cf10e7568c2891161e0f786ab3b024ebfd3122565a0c |
cppcheck_1.51.orig.tar.gz | 1.1 MiB | 9d417ee31b6d4db199834d6ffb6fbd27c5675e42f1a159e853818cc819f0ff55 |
cppcheck_1.51-1.debian.tar.gz | 5.4 KiB | d134b9f54ad16e1a07cbffa12e18898bfee93c26b71cce9bd2ff41abe0b6e15f |
No changes file available.
Binary packages built by this source
- cppcheck: tool for static C/C++ code analysis
Cppcheck is a command-line tool that tries to detect bugs that your
C/C++ compiler doesn't see. It is versatile, and can check non-standard
code including various compiler extensions, inline assembly code, etc.
Its internal preprocessor can handle includes, macros, and several
preprocessor commands. While Cppcheck is highly configurable,
you can start using it just by giving it a path to the source code.
.
It includes checks for:
* pointers to out-of-scope auto variables;
* assignment of auto variables to an effective parameter of a function;
* out-of-bounds errors in arrays and STL;
* missing class constructors;
* variables not initialized by a constructor;
* use of memset, memcpy, etcetera on a class;
* non-virtual destructors for base classes;
* operator= not returning a constant reference to itself;
* use of deprecated functions (mktemp, gets, scanf);
* exceptions thrown in destructors;
* memory leaks in class or function variables;
* C-style pointer cast in C++ code;
* redundant if;
* misuse of the strtol or sprintf functions;
* unsigned division or division by zero;
* unused functions and struct members;
* passing parameters by value;
* misuse of signed char variables;
* unusual pointer arithmetic (such as "abc" + 'd');
* dereferenced null pointers;
* incomplete statements;
* misuse of iterators when iterating through a container;
* dereferencing of erased iterators;
* use of invalidated vector iterators/pointers;