CodeSonar | | BADFUNC.BO.OEMTOCHAR BADFUNC.BO.STRCAT BADFUNC.BO.STRCATCHAINW BADFUNC.BO.STRCHR BADFUNC.BO.STRCMP BADFUNC.BO.STRCOLL BADFUNC.BO.STRCPY BADFUNC.BO.STRCSPN BADFUNC.BO.STRLEN BADFUNC.BO.STRPBRK BADFUNC.BO.STRRCHR BADFUNC.BO.STRSPN BADFUNC.BO.STRSTR BADFUNC.BO.STRTOK BADFUNC.BO.STRTRNS
| Use of OemToAnsi , use of OemToChar (both include checks for uses of similar functions) Use of strcat (includes checks for uses of similar library functions such as StrCatA() , wcscat() , etc.) Use of StrCatChainW
Use of strchr
Use of strcmp (includes checks for uses of similar library functions such as lstrcmp() ) Use of strcoll
Use of strcpy (includes checks for uses of similar library functions such as StrCCpy() , wcscpy() , etc.) Use of strcspn
Use of strlen (includes checks for uses of similar library functions such as lstrlen() ) Use of strpbrk
Use of strrchr
Use of strspn
Use of strstr
Use of strtok
Use of strtrns |
Polyspace Bug Finder | Include Page |
---|
| Polyspace Bug Finder_V |
---|
| Polyspace Bug Finder_V |
---|
|
| CERT C: Rec. STR07-C | Checks for: R2016a- Use of dangerous standard function
- Destination buffer overflow in string manipulation
| Dangerous functions cause possible buffer overflow in destination buffer Function writes to buffer at offset greater than buffer size | PRQA QA-C | Include Page |
---|
- Insufficient destination buffer size
Rec. partially covered. | PRQA QA-C_v | PRQA QA-C_v | 5008 | Partially implemented |