Checker
|
Guideline
|
---|
CERT_C-API00-a
|
API00-C. Functions should validate their parameters
|
CERT_C-API01-a
|
API01-C. Avoid laying out strings in memory directly before sensitive data
|
CERT_C-API01-b
|
API01-C. Avoid laying out strings in memory directly before sensitive data
|
CERT_C-API02-a
|
API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size
|
CERT_C-API02-b
|
API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size
|
CERT_C-ARR01-a
|
ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array
|
CERT_C-ARR02-a
|
ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer
|
CERT_C-ARR30-a
|
ARR30-C. Do not form or use out-of-bounds pointers or array subscripts
|
CERT_C-ARR32-a
|
ARR32-C. Ensure size arguments for variable length arrays are in a valid range
|
CERT_C-ARR36-a
|
ARR36-C. Do not subtract or compare two pointers that do not refer to the same array
|
CERT_C-ARR36-b
|
ARR36-C. Do not subtract or compare two pointers that do not refer to the same array
|
CERT_C-ARR37-a
|
ARR37-C. Do not add or subtract an integer to a pointer to a non-array object
|
CERT_C-ARR38-a
|
ARR38-C. Guarantee that library functions do not form invalid pointers
|
CERT_C-ARR38-b
|
ARR38-C. Guarantee that library functions do not form invalid pointers
|
CERT_C-ARR38-c
|
ARR38-C. Guarantee that library functions do not form invalid pointers
|
CERT_C-ARR38-d
|
ARR38-C. Guarantee that library functions do not form invalid pointers
|
CERT_C-ARR39-a
|
ARR39-C. Do not add or subtract a scaled integer to a pointer
|
CERT_C-ARR39-b
|
ARR39-C. Do not add or subtract a scaled integer to a pointer
|
CERT_C-ARR39-c
|
ARR39-C. Do not add or subtract a scaled integer to a pointer
|
CERT_C-CON01-a
|
CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction
|
CERT_C-CON02-a
|
CON02-C. Do not use volatile as a synchronization primitive
|
CERT_C-CON05-a
|
CON05-C. Do not perform operations that can block while holding a lock
|
CERT_C-CON30-a
|
CON30-C. Clean up thread-specific storage
|
CERT_C-CON31-a
|
CON31-C. Do not destroy a mutex while it is locked
|
CERT_C-CON31-b
|
CON31-C. Do not destroy a mutex while it is locked
|
CERT_C-CON31-c
|
CON31-C. Do not destroy a mutex while it is locked
|
CERT_C-CON32-a
|
CON32-C. Prevent data races when accessing bit-fields from multiple threads
|
CERT_C-CON33-a
|
CON33-C. Avoid race conditions when using library functions
|
CERT_C-CON34-a
|
CON34-C. Declare objects shared between threads with appropriate storage durations
|
CERT_C-CON35-a
|
CON35-C. Avoid deadlock by locking in a predefined order
|
CERT_C-CON36-a
|
CON36-C. Wrap functions that can spuriously wake up in a loop
|
CERT_C-CON37-a
|
CON37-C. Do not call signal() in a multithreaded program
|
CERT_C-CON38-a
|
CON38-C. Preserve thread safety and liveness when using condition variables
|
CERT_C-CON39-a
|
CON39-C. Do not join or detach a thread that was previously joined or detached
|
CERT_C-CON40-a
|
CON40-C. Do not refer to an atomic variable twice in an expression
|
CERT_C-CON41-a
|
CON41-C. Wrap functions that can fail spuriously in a loop
|
CERT_C-CON43-a
|
CON43-C. Do not allow data races in multithreaded code
|
CERT_C-DCL00-a
|
DCL00-C. Const-qualify immutable objects
|
CERT_C-DCL00-b
|
DCL00-C. Const-qualify immutable objects
|
CERT_C-DCL01-a
|
DCL01-C. Do not reuse variable names in subscopes
|
CERT_C-DCL01-b
|
DCL01-C. Do not reuse variable names in subscopes
|
CERT_C-DCL02-a
|
DCL02-C. Use visually distinct identifiers
|
CERT_C-DCL04-a
|
DCL04-C. Do not declare more than one variable per declaration
|
CERT_C-DCL05-a
|
DCL05-C. Use typedefs of non-pointer types only
|
CERT_C-DCL06-a
|
DCL06-C. Use meaningful symbolic constants to represent literal values
|
CERT_C-DCL10-a
|
DCL10-C. Maintain the contract between the writer and caller of variadic functions
|
CERT_C-DCL11-a
|
DCL11-C. Understand the type issues associated with variadic functions
|
CERT_C-DCL11-b
|
DCL11-C. Understand the type issues associated with variadic functions
|
CERT_C-DCL11-c
|
DCL11-C. Understand the type issues associated with variadic functions
|
CERT_C-DCL11-d
|
DCL11-C. Understand the type issues associated with variadic functions
|
CERT_C-DCL11-e
|
DCL11-C. Understand the type issues associated with variadic functions
|
CERT_C-DCL11-f
|
DCL11-C. Understand the type issues associated with variadic functions
|
CERT_C-DCL12-a
|
DCL12-C. Implement abstract data types using opaque types
|
CERT_C-DCL13-a
|
DCL13-C. Declare function parameters that are pointers to values not changed by the function as const
|
CERT_C-DCL15-a
|
DCL15-C. Declare file-scope objects or functions that do not need external linkage as static
|
CERT_C-DCL16-a
|
DCL16-C. Use "L," not "l," to indicate a long value
|
CERT_C-DCL18-a
|
DCL18-C. Do not begin integer constants with 0 when specifying a decimal value
|
CERT_C-DCL18-b
|
DCL18-C. Do not begin integer constants with 0 when specifying a decimal value
|
CERT_C-DCL19-a
|
DCL19-C. Minimize the scope of variables and functions
|
CERT_C-DCL20-a
|
DCL20-C. Explicitly specify void when a function accepts no arguments
|
CERT_C-DCL22-a
|
DCL22-C. Use volatile for data that cannot be cached
|
CERT_C-DCL30-a
|
DCL30-C. Declare objects with appropriate storage durations
|
CERT_C-DCL30-b
|
DCL30-C. Declare objects with appropriate storage durations
|
CERT_C-DCL31-a
|
DCL31-C. Declare identifiers before using them
|
CERT_C-DCL36-a
|
DCL36-C. Do not declare an identifier with conflicting linkage classifications
|
CERT_C-DCL37-a
|
DCL37-C. Do not declare or define a reserved identifier
|
CERT_C-DCL38-a
|
DCL38-C. Use the correct syntax when declaring a flexible array member
|
CERT_C-DCL39-a
|
DCL39-C. Avoid information leakage when passing a structure across a trust boundary
|
CERT_C-DCL40-a
|
DCL40-C. Do not create incompatible declarations of the same function or object
|
CERT_C-DCL40-b
|
DCL40-C. Do not create incompatible declarations of the same function or object
|
CERT_C-DCL41-a
|
DCL41-C. Do not declare variables inside a switch statement before the first case label
|
CERT_C-ENV01-a
|
ENV01-C. Do not make assumptions about the size of an environment variable
|
CERT_C-ENV01-b
|
ENV01-C. Do not make assumptions about the size of an environment variable
|
CERT_C-ENV01-c
|
ENV01-C. Do not make assumptions about the size of an environment variable
|
CERT_C-ENV02-a
|
ENV02-C. Beware of multiple environment variables with the same effective name
|
CERT_C-ENV30-a
|
ENV30-C. Do not modify the object referenced by the return value of certain functions
|
CERT_C-ENV31-a
|
ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it
|
CERT_C-ENV32-a
|
ENV32-C. All exit handlers must return normally
|
CERT_C-ENV33-a
|
ENV33-C. Do not call system()
|
CERT_C-ENV34-a
|
ENV34-C. Do not store pointers returned by certain functions
|
CERT_C-ERR01-a
|
ERR01-C. Use ferror() rather than errno to check for FILE stream errors
|
CERT_C-ERR02-a
|
ERR02-C. Avoid in-band error indicators
|
CERT_C-ERR04-a
|
ERR04-C. Choose an appropriate termination strategy
|
CERT_C-ERR04-b
|
ERR04-C. Choose an appropriate termination strategy
|
CERT_C-ERR04-c
|
ERR04-C. Choose an appropriate termination strategy
|
CERT_C-ERR05-a
|
ERR05-C. Application-independent code should provide error detection without dictating error handling
|
CERT_C-ERR05-b
|
ERR05-C. Application-independent code should provide error detection without dictating error handling
|
CERT_C-ERR05-c
|
ERR05-C. Application-independent code should provide error detection without dictating error handling
|
CERT_C-ERR06-a
|
ERR06-C. Understand the termination behavior of assert() and abort()
|
CERT_C-ERR07-a
|
ERR07-C. Prefer functions that support error checking over equivalent functions that don't
|
CERT_C-ERR07-b
|
ERR07-C. Prefer functions that support error checking over equivalent functions that don't
|
CERT_C-ERR30-a
|
ERR30-C. Take care when reading errno
|
CERT_C-ERR30-b
|
ERR30-C. Take care when reading errno
|
CERT_C-ERR32-a
|
ERR32-C. Do not rely on indeterminate values of errno
|
CERT_C-ERR33-a
|
ERR33-C. Detect and handle standard library errors
|
CERT_C-ERR33-b
|
ERR33-C. Detect and handle standard library errors
|
CERT_C-ERR33-d
|
ERR33-C. Detect and handle standard library errors
|
CERT_C-ERR34-a
|
ERR34-C. Detect errors when converting a string to a number
|
CERT_C-EXP00-a
|
EXP00-C. Use parentheses for precedence of operation
|
CERT_C-EXP02-a
|
EXP02-C. Be aware of the short-circuit behavior of the logical AND and OR operators
|
CERT_C-EXP05-a
|
EXP05-C. Do not cast away a const qualification
|
CERT_C-EXP08-a
|
EXP08-C. Ensure pointer arithmetic is used correctly
|
CERT_C-EXP08-b
|
EXP08-C. Ensure pointer arithmetic is used correctly
|
CERT_C-EXP10-a
|
EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place
|
CERT_C-EXP10-b
|
EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place
|
CERT_C-EXP10-c
|
EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place
|
CERT_C-EXP10-d
|
EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place
|
CERT_C-EXP12-a
|
EXP12-C. Do not ignore values returned by functions
|
CERT_C-EXP12-b
|
EXP12-C. Do not ignore values returned by functions
|
CERT_C-EXP14-a
|
EXP14-C. Beware of integer promotion when performing bitwise operations on integer types smaller than int
|
CERT_C-EXP15-a
|
EXP15-C. Do not place a semicolon on the same line as an if, for, or while statement
|
CERT_C-EXP16-a
|
EXP16-C. Do not compare function pointers to constant values
|
CERT_C-EXP19-a
|
EXP19-C. Use braces for the body of an if, for, or while statement
|
CERT_C-EXP20-a
|
EXP20-C. Perform explicit tests to determine success, true and false, and equality
|
CERT_C-EXP20-b
|
EXP20-C. Perform explicit tests to determine success, true and false, and equality
|
CERT_C-EXP30-a
|
EXP30-C. Do not depend on the order of evaluation for side effects
|
CERT_C-EXP30-b
|
EXP30-C. Do not depend on the order of evaluation for side effects
|
CERT_C-EXP30-c
|
EXP30-C. Do not depend on the order of evaluation for side effects
|
CERT_C-EXP30-d
|
EXP30-C. Do not depend on the order of evaluation for side effects
|
CERT_C-EXP32-a
|
EXP32-C. Do not access a volatile object through a nonvolatile reference
|
CERT_C-EXP33-a
|
EXP33-C. Do not read uninitialized memory
|
CERT_C-EXP34-a
|
EXP34-C. Do not dereference null pointers
|
CERT_C-EXP35-a
|
EXP35-C. Do not modify objects with temporary lifetime
|
CERT_C-EXP36-a
|
EXP36-C. Do not cast pointers into more strictly aligned pointer types
|
CERT_C-EXP37-a
|
EXP37-C. Call functions with the correct number and type of arguments
|
CERT_C-EXP37-b
|
EXP37-C. Call functions with the correct number and type of arguments
|
CERT_C-EXP37-d
|
EXP37-C. Call functions with the correct number and type of arguments
|
CERT_C-EXP39-a
|
EXP39-C. Do not access a variable through a pointer of an incompatible type
|
CERT_C-EXP39-b
|
EXP39-C. Do not access a variable through a pointer of an incompatible type
|
CERT_C-EXP39-c
|
EXP39-C. Do not access a variable through a pointer of an incompatible type
|
CERT_C-EXP39-d
|
EXP39-C. Do not access a variable through a pointer of an incompatible type
|
CERT_C-EXP39-e
|
EXP39-C. Do not access a variable through a pointer of an incompatible type
|
CERT_C-EXP39-f
|
EXP39-C. Do not access a variable through a pointer of an incompatible type
|
CERT_C-EXP40-a
|
EXP40-C. Do not modify constant objects
|
CERT_C-EXP42-a
|
EXP42-C. Do not compare padding data
|
CERT_C-EXP43-a
|
EXP43-C. Avoid undefined behavior when using restrict-qualified pointers
|
CERT_C-EXP44-a
|
EXP44-C. Do not rely on side effects in operands to sizeof, _Alignof, or _Generic
|
CERT_C-EXP44-b
|
EXP44-C. Do not rely on side effects in operands to sizeof, _Alignof, or _Generic
|
CERT_C-EXP45-b
|
EXP45-C. Do not perform assignments in selection statements
|
CERT_C-EXP45-d
|
EXP45-C. Do not perform assignments in selection statements
|
CERT_C-EXP46-b
|
EXP46-C. Do not use a bitwise operator with a Boolean-like operand
|
CERT_C-EXP47-a
|
EXP47-C. Do not call va_arg with an argument of the incorrect type
|
CERT_C-FIO01-a
|
FIO01-C. Be careful using functions that use file names for identification
|
CERT_C-FIO01-b
|
FIO01-C. Be careful using functions that use file names for identification
|
CERT_C-FIO21-a
|
FIO21-C. Do not create temporary files in shared directories
|
CERT_C-FIO22-a
|
FIO22-C. Close files before spawning processes
|
CERT_C-FIO24-a
|
FIO24-C. Do not open a file that is already open
|
CERT_C-FIO30-a
|
FIO30-C. Exclude user input from format strings
|
CERT_C-FIO30-b
|
FIO30-C. Exclude user input from format strings
|
CERT_C-FIO30-c
|
FIO30-C. Exclude user input from format strings
|
CERT_C-FIO32-a
|
FIO32-C. Do not perform operations on devices that are only appropriate for files
|
CERT_C-FIO34-a
|
FIO34-C. Distinguish between characters read from a file and EOF or WEOF
|
CERT_C-FIO37-a
|
FIO37-C. Do not assume that fgets() or fgetws() returns a nonempty string when successful
|
CERT_C-FIO38-a
|
FIO38-C. Do not copy a FILE object
|
CERT_C-FIO39-a
|
FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call
|
CERT_C-FIO40-a
|
FIO40-C. Reset strings on fgets() or fgetws() failure
|
CERT_C-FIO41-a
|
FIO41-C. Do not call getc(), putc(), getwc(), or putwc() with a stream argument that has side effects
|
CERT_C-FIO41-b
|
FIO41-C. Do not call getc(), putc(), getwc(), or putwc() with a stream argument that has side effects
|
CERT_C-FIO42-a
|
FIO42-C. Close files when they are no longer needed
|
CERT_C-FIO44-a
|
FIO44-C. Only use values for fsetpos() that are returned from fgetpos()
|
CERT_C-FIO45-a
|
FIO45-C. Avoid TOCTOU race conditions while accessing files
|
CERT_C-FIO46-a
|
FIO46-C. Do not access a closed file
|
CERT_C-FIO47-a
|
FIO47-C. Use valid format strings
|
CERT_C-FIO47-b
|
FIO47-C. Use valid format strings
|
CERT_C-FIO47-c
|
FIO47-C. Use valid format strings
|
CERT_C-FIO47-d
|
FIO47-C. Use valid format strings
|
CERT_C-FIO47-e
|
FIO47-C. Use valid format strings
|
CERT_C-FIO47-f
|
FIO47-C. Use valid format strings
|
CERT_C-FLP00-a
|
FLP00-C. Understand the limitations of floating-point numbers
|
CERT_C-FLP02-a
|
FLP02-C. Avoid using floating-point numbers when precise computation is needed
|
CERT_C-FLP03-a
|
FLP03-C. Detect and handle floating-point errors
|
CERT_C-FLP03-b
|
FLP03-C. Detect and handle floating-point errors
|
CERT_C-FLP03-c
|
FLP03-C. Detect and handle floating-point errors
|
CERT_C-FLP03-d
|
FLP03-C. Detect and handle floating-point errors
|
CERT_C-FLP06-a
|
FLP06-C. Convert integers to floating point for floating-point operations
|
CERT_C-FLP06-b
|
FLP06-C. Convert integers to floating point for floating-point operations
|
CERT_C-FLP30-a
|
FLP30-C. Do not use floating-point variables as loop counters
|
CERT_C-FLP32-a
|
FLP32-C. Prevent or detect domain and range errors in math functions
|
CERT_C-FLP34-a
|
FLP34-C. Ensure that floating-point conversions are within range of the new type
|
CERT_C-FLP34-b
|
FLP34-C. Ensure that floating-point conversions are within range of the new type
|
CERT_C-FLP36-a
|
FLP36-C. Preserve precision when converting integral values to floating-point type
|
CERT_C-FLP36-b
|
FLP36-C. Preserve precision when converting integral values to floating-point type
|
CERT_C-FLP37-c
|
FLP37-C. Do not use object representations to compare floating-point values
|
CERT_C-INT02-a
|
INT02-C. Understand integer conversion rules
|
CERT_C-INT02-b
|
INT02-C. Understand integer conversion rules
|
CERT_C-INT04-a
|
INT04-C. Enforce limits on integer values originating from tainted sources
|
CERT_C-INT04-b
|
INT04-C. Enforce limits on integer values originating from tainted sources
|
CERT_C-INT04-c
|
INT04-C. Enforce limits on integer values originating from tainted sources
|
CERT_C-INT05-a
|
INT05-C. Do not use input functions to convert character data if they cannot handle all possible inputs
|
CERT_C-INT07-a
|
INT07-C. Use only explicitly signed or unsigned char type for numeric values
|
CERT_C-INT07-b
|
INT07-C. Use only explicitly signed or unsigned char type for numeric values
|
CERT_C-INT08-a
|
INT08-C. Verify that all integer values are in range
|
CERT_C-INT08-b
|
INT08-C. Verify that all integer values are in range
|
CERT_C-INT08-c
|
INT08-C. Verify that all integer values are in range
|
CERT_C-INT08-d
|
INT08-C. Verify that all integer values are in range
|
CERT_C-INT09-a
|
INT09-C. Ensure enumeration constants map to unique values
|
CERT_C-INT10-a
|
INT10-C. Do not assume a positive remainder when using the % operator
|
CERT_C-INT12-a
|
INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression
|
CERT_C-INT13-a
|
INT13-C. Use bitwise operators only on unsigned operands
|
CERT_C-INT15-a
|
INT15-C. Use intmax_t or uintmax_t for formatted IO on programmer-defined integer types
|
CERT_C-INT16-a
|
INT16-C. Do not make assumptions about representation of signed integers
|
CERT_C-INT18-a
|
INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size
|
CERT_C-INT18-b
|
INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size
|
CERT_C-INT18-c
|
INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size
|
CERT_C-INT30-a
|
INT30-C. Ensure that unsigned integer operations do not wrap
|
CERT_C-INT30-b
|
INT30-C. Ensure that unsigned integer operations do not wrap
|
CERT_C-INT30-c
|
INT30-C. Ensure that unsigned integer operations do not wrap
|
CERT_C-INT31-a
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-b
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-c
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-d
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-e
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-f
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-g
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-h
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-i
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-j
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-k
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-l
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-m
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-n
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-o
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT31-p
|
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data
|
CERT_C-INT32-a
|
INT32-C. Ensure that operations on signed integers do not result in overflow
|
CERT_C-INT32-b
|
INT32-C. Ensure that operations on signed integers do not result in overflow
|
CERT_C-INT32-c
|
INT32-C. Ensure that operations on signed integers do not result in overflow
|
CERT_C-INT33-a
|
INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors
|
CERT_C-INT34-a
|
INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand
|
CERT_C-INT35-a
|
INT35-C. Use correct integer precisions
|
CERT_C-INT36-b
|
INT36-C. Converting a pointer to integer or integer to pointer
|
CERT_C-MEM00-a
|
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
|
CERT_C-MEM00-b
|
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
|
CERT_C-MEM00-c
|
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
|
CERT_C-MEM00-d
|
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
|
CERT_C-MEM00-e
|
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
|
CERT_C-MEM01-a
|
MEM01-C. Store a new value in pointers immediately after free()
|
CERT_C-MEM01-b
|
MEM01-C. Store a new value in pointers immediately after free()
|
CERT_C-MEM01-c
|
MEM01-C. Store a new value in pointers immediately after free()
|
CERT_C-MEM01-d
|
MEM01-C. Store a new value in pointers immediately after free()
|
CERT_C-MEM02-a
|
MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type
|
CERT_C-MEM02-b
|
MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type
|
CERT_C-MEM03-a
|
MEM03-C. Clear sensitive information stored in reusable resources
|
CERT_C-MEM04-a
|
MEM04-C. Beware of zero-length allocations
|
CERT_C-MEM05-a
|
MEM05-C. Avoid large stack allocations
|
CERT_C-MEM05-b
|
MEM05-C. Avoid large stack allocations
|
CERT_C-MEM07-a
|
MEM07-C. Ensure that the arguments to calloc(), when multiplied, do not wrap
|
CERT_C-MEM12-a
|
MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources
|
CERT_C-MEM30-a
|
MEM30-C. Do not access freed memory
|
CERT_C-MEM31-a
|
MEM31-C. Free dynamically allocated memory when no longer needed
|
CERT_C-MEM33-a
|
MEM33-C. Allocate and copy structures containing a flexible array member dynamically
|
CERT_C-MEM33-b
|
MEM33-C. Allocate and copy structures containing a flexible array member dynamically
|
CERT_C-MEM34-a
|
MEM34-C. Only free memory allocated dynamically
|
CERT_C-MEM35-a
|
MEM35-C. Allocate sufficient memory for an object
|
CERT_C-MEM36-a
|
MEM36-C. Do not modify the alignment of objects by calling realloc()
|
CERT_C-MSC01-a
|
MSC01-C. Strive for logical completeness
|
CERT_C-MSC01-b
|
MSC01-C. Strive for logical completeness
|
CERT_C-MSC04-a
|
MSC04-C. Use comments consistently and in a readable fashion
|
CERT_C-MSC04-b
|
MSC04-C. Use comments consistently and in a readable fashion
|
CERT_C-MSC04-c
|
MSC04-C. Use comments consistently and in a readable fashion
|
CERT_C-MSC04-d
|
MSC04-C. Use comments consistently and in a readable fashion
|
CERT_C-MSC06-a
|
MSC06-C. Beware of compiler optimizations
|
CERT_C-MSC07-a
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-b
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-c
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-d
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-e
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-f
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-g
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-h
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC07-i
|
MSC07-C. Detect and remove dead code
|
CERT_C-MSC09-a
|
MSC09-C. Character encoding: Use subset of ASCII for safety
|
CERT_C-MSC11-a
|
MSC11-C. Incorporate diagnostic tests using assertions
|
CERT_C-MSC12-a
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-b
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-c
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-d
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-e
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-f
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-g
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-h
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-i
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-j
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC12-k
|
MSC12-C. Detect and remove code that has no effect or is never executed
|
CERT_C-MSC13-a
|
MSC13-C. Detect and remove unused values
|
CERT_C-MSC14-a
|
MSC14-C. Do not introduce unnecessary platform dependencies
|
CERT_C-MSC15-a
|
MSC15-C. Do not depend on undefined behavior
|
CERT_C-MSC17-a
|
MSC17-C. Finish every set of statements associated with a case label with a break statement
|
CERT_C-MSC19-a
|
MSC19-C. For functions that return an array, prefer returning an empty array over a null value
|
CERT_C-MSC19-b
|
MSC19-C. For functions that return an array, prefer returning an empty array over a null value
|
CERT_C-MSC22-a
|
MSC22-C. Use the setjmp(), longjmp() facility securely
|
CERT_C-MSC24-a
|
MSC24-C. Do not use deprecated or obsolescent functions
|
CERT_C-MSC24-b
|
MSC24-C. Do not use deprecated or obsolescent functions
|
CERT_C-MSC24-c
|
MSC24-C. Do not use deprecated or obsolescent functions
|
CERT_C-MSC24-d
|
MSC24-C. Do not use deprecated or obsolescent functions
|
CERT_C-MSC30-a
|
MSC30-C. Do not use the rand() function for generating pseudorandom numbers
|
CERT_C-MSC32-d
|
MSC32-C. Properly seed pseudorandom number generators
|
CERT_C-MSC33-a
|
MSC33-C. Do not pass invalid data to the asctime() function
|
CERT_C-MSC37-a
|
MSC37-C. Ensure that control never reaches the end of a non-void function
|
CERT_C-MSC38-a
|
MSC38-C. Do not treat a predefined identifier as an object if it might only be implemented as a macro
|
CERT_C-MSC39-a
|
MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value
|
CERT_C-MSC40-a
|
MSC40-C. Do not violate constraints
|
CERT_C-MSC41-a
|
MSC41-C. Never hard code sensitive information
|
CERT_C-POS30-a
|
POS30-C. Use the readlink() function properly
|
CERT_C-POS30-b
|
POS30-C. Use the readlink() function properly
|
CERT_C-POS30-c
|
POS30-C. Use the readlink() function properly
|
CERT_C-POS34-a
|
POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument
|
CERT_C-POS34-b
|
POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument
|
CERT_C-POS35-b
|
POS35-C. Avoid race conditions while checking for the existence of a symbolic link
|
CERT_C-POS36-a
|
POS36-C. Observe correct revocation order while relinquishing privileges
|
CERT_C-POS37-a
|
POS37-C. Ensure that privilege relinquishment is successful
|
CERT_C-POS38-a
|
POS38-C. Beware of race conditions when using fork and file descriptors
|
CERT_C-POS39-a
|
POS39-C. Use the correct byte ordering when transferring data between systems
|
CERT_C-POS44-a
|
POS44-C. Do not use signals to terminate threads
|
CERT_C-POS47-a
|
POS47-C. Do not use threads that can be canceled asynchronously
|
CERT_C-POS48-a
|
POS48-C. Do not unlock or destroy another POSIX thread's mutex
|
CERT_C-POS48-b
|
POS48-C. Do not unlock or destroy another POSIX thread's mutex
|
CERT_C-POS49-a
|
POS49-C. When data must be accessed by multiple threads, provide a mutex and guarantee no adjacent data is also accessed
|
CERT_C-POS50-a
|
POS50-C. Declare objects shared between POSIX threads with appropriate storage durations
|
CERT_C-POS51-a
|
POS51-C. Avoid deadlock with POSIX threads by locking in predefined order
|
CERT_C-POS52-a
|
POS52-C. Do not perform operations that can block while holding a POSIX lock
|
CERT_C-POS53-a
|
POS53-C. Do not use more than one mutex for concurrent waiting operations on a condition variable
|
CERT_C-POS54-a
|
POS54-C. Detect and handle POSIX library errors
|
CERT_C-PRE00-a
|
PRE00-C. Prefer inline or static functions to function-like macros
|
CERT_C-PRE01-a
|
PRE01-C. Use parentheses within macros around parameter names
|
CERT_C-PRE02-a
|
PRE02-C. Macro replacement lists should be parenthesized
|
CERT_C-PRE06-a
|
PRE06-C. Enclose header files in an include guard
|
CERT_C-PRE07-a
|
PRE07-C. Avoid using repeated question marks
|
CERT_C-PRE30-a
|
PRE30-C. Do not create a universal character name through concatenation
|
CERT_C-PRE31-b
|
PRE31-C. Avoid side effects in arguments to unsafe macros
|
CERT_C-PRE31-c
|
PRE31-C. Avoid side effects in arguments to unsafe macros
|
CERT_C-PRE31-d
|
PRE31-C. Avoid side effects in arguments to unsafe macros
|
CERT_C-PRE32-a
|
PRE32-C. Do not use preprocessor directives in invocations of function-like macros
|
CERT_C-SIG00-a
|
SIG00-C. Mask signals handled by noninterruptible signal handlers
|
CERT_C-SIG01-a
|
SIG01-C. Understand implementation-specific details regarding signal handler persistence
|
CERT_C-SIG02-a
|
SIG02-C. Avoid using signals to implement normal functionality
|
CERT_C-SIG30-a
|
SIG30-C. Call only asynchronous-safe functions within signal handlers
|
CERT_C-SIG31-a
|
SIG31-C. Do not access shared objects in signal handlers
|
CERT_C-SIG34-a
|
SIG34-C. Do not call signal() from within interruptible signal handlers
|
CERT_C-SIG35-a
|
SIG35-C. Do not return from a computational exception signal handler
|
CERT_C-STR00-a
|
STR00-C. Represent characters using an appropriate type
|
CERT_C-STR02-a
|
STR02-C. Sanitize data passed to complex subsystems
|
CERT_C-STR02-b
|
STR02-C. Sanitize data passed to complex subsystems
|
CERT_C-STR02-c
|
STR02-C. Sanitize data passed to complex subsystems
|
CERT_C-STR03-a
|
STR03-C. Do not inadvertently truncate a string
|
CERT_C-STR04-a
|
STR04-C. Use plain char for characters in the basic character set
|
CERT_C-STR05-a
|
STR05-C. Use pointers to const when referring to string literals
|
CERT_C-STR07-a
|
STR07-C. Use the bounds-checking interfaces for string manipulation
|
CERT_C-STR09-a
|
STR09-C. Don't assume numeric values for expressions with type plain character
|
CERT_C-STR10-a
|
STR10-C. Do not concatenate different type of string literals
|
CERT_C-STR11-a
|
STR11-C. Do not specify the bound of a character array initialized with a string literal
|
CERT_C-STR30-a
|
STR30-C. Do not attempt to modify string literals
|
CERT_C-STR30-b
|
STR30-C. Do not attempt to modify string literals
|
CERT_C-STR31-a
|
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
|
CERT_C-STR31-b
|
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
|
CERT_C-STR31-c
|
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
|
CERT_C-STR31-d
|
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
|
CERT_C-STR31-e
|
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
|
CERT_C-STR32-a
|
STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string
|
CERT_C-STR34-b
|
STR34-C. Cast characters to unsigned char before converting to larger integer sizes
|
CERT_C-STR34-c
|
STR34-C. Cast characters to unsigned char before converting to larger integer sizes
|
CERT_C-STR34-d
|
STR34-C. Cast characters to unsigned char before converting to larger integer sizes
|
CERT_C-STR37-a
|
STR37-C. Arguments to character-handling functions must be representable as an unsigned char
|
CERT_C-STR38-a
|
STR38-C. Do not confuse narrow and wide character strings and functions
|
CERT_C-WIN00-a
|
WIN00-C. Be specific when dynamically loading libraries
|
CERT_C-WIN30-a
|
WIN30-C. Properly pair allocation and deallocation functions
|
Detects dangling pointers at runtime
|
MEM01-C. Store a new value in pointers immediately after free()
|
Runtime analysis
|
DCL40-C. Do not create incompatible declarations of the same function or object
|
Runtime analysis
|
EXP33-C. Do not read uninitialized memory
|
Runtime analysis
|
EXP34-C. Do not dereference null pointers
|
Runtime analysis
|
INT32-C. Ensure that operations on signed integers do not result in overflow
|
Runtime analysis
|
INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors
|
Runtime analysis
|
ARR30-C. Do not form or use out-of-bounds pointers or array subscripts
|
Runtime analysis
|
ARR38-C. Guarantee that library functions do not form invalid pointers
|
Runtime analysis
|
MEM30-C. Do not access freed memory
|
Runtime analysis
|
MEM31-C. Free dynamically allocated memory when no longer needed
|
Runtime analysis
|
MEM34-C. Only free memory allocated dynamically
|
Runtime analysis
|
ERR33-C. Detect and handle standard library errors
|
Runtime analysis
|
DCL11-C. Understand the type issues associated with variadic functions
|
Runtime analysis
|
EXP08-C. Ensure pointer arithmetic is used correctly
|
Runtime analysis
|
FLP03-C. Detect and handle floating-point errors
|
Runtime analysis
|
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction
|
Runtime analysis
|
STR07-C. Use the bounds-checking interfaces for string manipulation
|