Checker | Guideline |
---|
CertC-ARR01 | ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array |
CertC-ARR02 | ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer |
CertC-ARR30 | ARR30-C. Do not form or use out-of-bounds pointers or array subscripts |
CertC-ARR36 | ARR36-C. Do not subtract or compare two pointers that do not refer to the same array |
CertC-ARR37 | ARR37-C. Do not add or subtract an integer to a pointer to a non-array object |
CertC-ARR39 | ARR39-C. Do not add or subtract a scaled integer to a pointer |
CertC-CON32 | CON32-C. Prevent data races when accessing bit-fields from multiple threads |
CertC-CON40 | CON40-C. Do not refer to an atomic variable twice in an expression |
CertC-DCL00 | DCL00-C. Const-qualify immutable objects |
CertC-DCL01 | DCL01-C. Do not reuse variable names in subscopes |
CertC-DCL02 | DCL02-C. Use visually distinct identifiers |
CertC-DCL03 | DCL03-C. Use a static assertion to test the value of a constant expression |
CertC-DCL04 | DCL04-C. Do not declare more than one variable per declaration |
CertC-DCL05 | DCL05-C. Use typedefs of non-pointer types only |
CertC-DCL06 | DCL06-C. Use meaningful symbolic constants to represent literal values |
CertC-DCL07 | DCL07-C. Include the appropriate type information in function declarators |
CertC-DCL09 | DCL09-C. Declare functions that return errno with a return type of errno_t |
CertC-DCL11 | DCL11-C. Understand the type issues associated with variadic functions |
CertC-DCL12 | DCL12-C. Implement abstract data types using opaque types |
CertC-DCL13 | DCL13-C. Declare function parameters that are pointers to values not changed by the function as const |
CertC-DCL15 | DCL15-C. Declare file-scope objects or functions that do not need external linkage as static |
CertC-DCL16 | DCL16-C. Use "L," not "l," to indicate a long value |
CertC-DCL18 | DCL18-C. Do not begin integer constants with 0 when specifying a decimal value |
CertC-DCL19 | DCL19-C. Minimize the scope of variables and functions |
CertC-DCL20 | DCL20-C. Explicitly specify void when a function accepts no arguments |
CertC-DCL21 | DCL21-C. Understand the storage of compound literals |
CertC-DCL23 | DCL23-C. Guarantee that mutually visible identifiers are unique |
CertC-DCL30 | DCL30-C. Declare objects with appropriate storage durations |
CertC-DCL31 | DCL31-C. Declare identifiers before using them |
CertC-DCL36 | DCL36-C. Do not declare an identifier with conflicting linkage classifications |
CertC-DCL37 | DCL37-C. Do not declare or define a reserved identifier |
CertC-DCL38 | DCL38-C. Use the correct syntax when declaring a flexible array member |
CertC-DCL39 | DCL39-C. Avoid information leakage when passing a structure across a trust boundary |
CertC-DCL40 | DCL40-C. Do not create incompatible declarations of the same function or object |
CertC-DCL41 | DCL41-C. Do not declare variables inside a switch statement before the first case label |
CertC-ENV30 | ENV30-C. Do not modify the object referenced by the return value of certain functions |
CertC-ENV32 | ENV32-C. All exit handlers must return normally |
CertC-ENV33 | ENV33-C. Do not call system() |
CertC-ERR07 | ERR07-C. Prefer functions that support error checking over equivalent functions that don't |
CertC-ERR30 | ERR30-C. Take care when reading errno |
CertC-ERR32 | ERR32-C. Do not rely on indeterminate values of errno |
CertC-ERR33 | ERR33-C. Detect and handle standard library errors |
CertC-ERR34 | ERR34-C. Detect errors when converting a string to a number |
CertC-EXP00 | EXP00-C. Use parentheses for precedence of operation |
CertC-EXP02 | EXP02-C. Be aware of the short-circuit behavior of the logical AND and OR operators |
CertC-EXP05 | EXP05-C. Do not cast away a const qualification |
CertC-EXP07 | EXP07-C. Do not diminish the benefits of constants by assuming their values in expressions |
CertC-EXP10 | EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place |
CertC-EXP12 | EXP12-C. Do not ignore values returned by functions |
CertC-EXP14 | EXP14-C. Beware of integer promotion when performing bitwise operations on integer types smaller than int |
CertC-EXP15 | EXP15-C. Do not place a semicolon on the same line as an if, for, or while statement |
CertC-EXP19 | EXP19-C. Use braces for the body of an if, for, or while statement |
CertC-EXP20 | EXP20-C. Perform explicit tests to determine success, true and false, and equality |
CertC-EXP30 | EXP30-C. Do not depend on the order of evaluation for side effects |
CertC-EXP32 | EXP32-C. Do not access a volatile object through a nonvolatile reference |
CertC-EXP33 | EXP33-C. Do not read uninitialized memory |
CertC-EXP34 | EXP34-C. Do not dereference null pointers |
CertC-EXP35 | EXP35-C. Do not modify objects with temporary lifetime |
CertC-EXP36 | EXP36-C. Do not cast pointers into more strictly aligned pointer types |
CertC-EXP37 | EXP37-C. Call functions with the correct number and type of arguments |
CertC-EXP40 | EXP40-C. Do not modify constant objects |
CertC-EXP42 | EXP42-C. Do not compare padding data |
CertC-EXP44 | EXP44-C. Do not rely on side effects in operands to sizeof, _Alignof, or _Generic |
CertC-EXP45 | EXP45-C. Do not perform assignments in selection statements |
CertC-EXP46 | EXP46-C. Do not use a bitwise operator with a Boolean-like operand |
CertC-EXP47 | EXP47-C. Do not call va_arg with an argument of the incorrect type |
CertC-FIO30 | FIO30-C. Exclude user input from format strings |
CertC-FIO34 | FIO34-C. Distinguish between characters read from a file and EOF or WEOF |
CertC-FIO37 | FIO37-C. Do not assume that fgets() or fgetws() returns a nonempty string when successful |
CertC-FIO38 | FIO38-C. Do not copy a FILE object |
CertC-FIO39 | FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call |
CertC-FIO41 | FIO41-C. Do not call getc(), putc(), getwc(), or putwc() with a stream argument that has side effects |
CertC-FIO47 | FIO47-C. Use valid format strings |
CertC-FLP02 | FLP02-C. Avoid using floating-point numbers when precise computation is needed |
CertC-FLP06 | FLP06-C. Convert integers to floating point for floating-point operations |
CertC-FLP07 | FLP07-C. Cast the return value of a function that returns a floating-point type |
CertC-FLP30 | FLP30-C. Do not use floating-point variables as loop counters |
CertC-FLP32 | FLP32-C. Prevent or detect domain and range errors in math functions |
CertC-FLP37 | FLP37-C. Do not use object representations to compare floating-point values |
CertC-INT00 | INT00-C. Understand the data model used by your implementation(s) |
CertC-INT01 | INT01-C. Use rsize_t or size_t for all integer values representing the size of an object |
CertC-INT05 | INT05-C. Do not use input functions to convert character data if they cannot handle all possible inputs |
CertC-INT07 | INT07-C. Use only explicitly signed or unsigned char type for numeric values |
CertC-INT08 | INT08-C. Verify that all integer values are in range |
CertC-INT09 | INT09-C. Ensure enumeration constants map to unique values |
CertC-INT12 | INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression |
CertC-INT13 | INT13-C. Use bitwise operators only on unsigned operands |
CertC-INT15 | INT15-C. Use intmax_t or uintmax_t for formatted IO on programmer-defined integer types |
CertC-INT17 | INT17-C. Define integer constants in an implementation-independent manner |
CertC-INT30 | INT30-C. Ensure that unsigned integer operations do not wrap |
CertC-INT33 | INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors |
CertC-INT34 | INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand |
CertC-INT36 | INT36-C. Converting a pointer to integer or integer to pointer |
CertC-MEM01 | MEM01-C. Store a new value in pointers immediately after free() |
CertC-MEM02 | MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type |
CertC-MEM30 | MEM30-C. Do not access freed memory |
CertC-MEM31 | MEM31-C. Free dynamically allocated memory when no longer needed |
CertC-MEM33 | MEM33-C. Allocate and copy structures containing a flexible array member dynamically |
CertC-MEM34 | MEM34-C. Only free memory allocated dynamically |
CertC-MEM35 | MEM35-C. Allocate sufficient memory for an object |
CertC-MEM36 | MEM36-C. Do not modify the alignment of objects by calling realloc() |
CertC-MSC24 | MSC24-C. Do not use deprecated or obsolescent functions |
CertC-MSC30 | MSC30-C. Do not use the rand() function for generating pseudorandom numbers |
CertC-MSC32 | MSC32-C. Properly seed pseudorandom number generators |
CertC-MSC33 | MSC33-C. Do not pass invalid data to the asctime() function |
CertC-MSC37 | MSC37-C. Ensure that control never reaches the end of a non-void function |
CertC-POS30 | POS30-C. Use the readlink() function properly |
CertC-POS34 | POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument |
CertC-POS35 | POS35-C. Avoid race conditions while checking for the existence of a symbolic link |
CertC-POS36 | POS36-C. Observe correct revocation order while relinquishing privileges |
CertC-POS37 | POS37-C. Ensure that privilege relinquishment is successful |
CertC-POS39 | POS39-C. Use the correct byte ordering when transferring data between systems |
CertC-POS47 | POS47-C. Do not use threads that can be canceled asynchronously |
CertC-POS49 | POS49-C. When data must be accessed by multiple threads, provide a mutex and guarantee no adjacent data is also accessed |
CertC-POS54 | POS54-C. Detect and handle POSIX library errors |
CertC-PRE00 | PRE00-C. Prefer inline or static functions to function-like macros |
CertC-PRE01 | PRE01-C. Use parentheses within macros around parameter names |
CertC-PRE02 | PRE02-C. Macro replacement lists should be parenthesized |
CertC-PRE03 | PRE03-C. Prefer typedefs to defines for encoding non-pointer types |
CertC-PRE04 | PRE04-C. Do not reuse a standard header file name |
CertC-PRE05 | PRE05-C. Understand macro replacement when concatenating tokens or performing stringification |
CertC-PRE06 | PRE06-C. Enclose header files in an include guard |
CertC-PRE07 | PRE07-C. Avoid using repeated question marks |
CertC-PRE08 | PRE08-C. Guarantee that header file names are unique |
CertC-PRE09 | PRE09-C. Do not replace secure functions with deprecated or obsolescent functions |
CertC-PRE10 | PRE10-C. Wrap multistatement macros in a do-while loop |
CertC-PRE11 | PRE11-C. Do not conclude macro definitions with a semicolon |
CertC-PRE12 | PRE12-C. Do not define unsafe macros |
CertC-PRE13 | PRE13-C. Use the Standard predefined macros to test for versions and features. |
CertC-PRE30 | PRE30-C. Do not create a universal character name through concatenation |
CertC-PRE31 | PRE31-C. Avoid side effects in arguments to unsafe macros |
CertC-PRE32 | PRE32-C. Do not use preprocessor directives in invocations of function-like macros |
CertC-SIG30 | SIG30-C. Call only asynchronous-safe functions within signal handlers |
CertC-SIG31 | SIG31-C. Do not access shared objects in signal handlers |
CertC-SIG34 | SIG34-C. Do not call signal() from within interruptible signal handlers |
CertC-SIG35 | SIG35-C. Do not return from a computational exception signal handler |
CertC-STR04 | STR04-C. Use plain char for characters in the basic character set |
CertC-STR05 | STR05-C. Use pointers to const when referring to string literals |
CertC-STR07 | STR07-C. Use the bounds-checking interfaces for string manipulation |
CertC-STR09 | STR09-C. Don't assume numeric values for expressions with type plain character |
CertC-STR10 | STR10-C. Do not concatenate different type of string literals |
CertC-STR11 | STR11-C. Do not specify the bound of a character array initialized with a string literal |
CertC-STR30 | STR30-C. Do not attempt to modify string literals |
CertC-STR31 | STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
CertC-STR32 | STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string |
CertC-STR34 | STR34-C. Cast characters to unsigned char before converting to larger integer sizes |
CertC-STR37 | STR37-C. Arguments to character-handling functions must be representable as an unsigned char |
CertC-STR38 | STR38-C. Do not confuse narrow and wide character strings and functions |