Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Infonote
titleGenerated Content

This page is was automatically generated from the "Automated Detection" sections in the individual guidelines. Do not modify this page directly.

Info
titleVersion number

V. 3.1.1

and should not be edited.

Note

The information on this page was provided by outside contributors and has not been verified by SEI CERT.

Tip

The table below can be re-ordered, by clicking column headers.

...

Include Page
Splint_V
Splint_V

Checker

Guideline

C checkers

CERT C Secure Coding Standard

<unknown>

ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array

<unknown>

ARR33-C. Guarantee that copies are made into storage of sufficient size

<unknown>

DCL01-C. Do not reuse variable names in subscopes

<unknown>

DCL15-C. Declare file-scope objects or functions that do not need external linkage as static

<unknown>

DCL30-C. Declare objects with appropriate storage durations

<unknown>

DCL36-C. Do not declare an identifier with conflicting linkage classifications

<unknown>

EXP01 EXP30-C. Do not take depend on the size of a pointer to determine the size of the pointed-to typeorder of evaluation for side effects
EXP33

<unknown>

EXP12-C. Do not ignore values returned by functionsread uninitialized memory
EXP34

<unknown>

EXP30-C. Do not depend on order of evaluation between sequence pointsdereference null pointers
EXP35

<unknown>

EXP33-C. Do not reference uninitialized memorymodify objects with temporary lifetime
ARR38-C. Guarantee that library functions do not form invalid pointers
STR30

<unknown>

EXP34-C. Do not dereference null pointersattempt to modify string literals
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator
MEM30

<unknown>

EXP35-C. Do not access or modify an array in the result of a function call after a subsequent sequence pointfreed memory
MEM31-C. Free dynamically allocated memory when no longer needed
MEM35-C. Allocate sufficient memory for an object

<unknown>

FIO30-C. Exclude user input from format strings

<unknown>

FIO34-C. Use int to capture the return value of character IO functions

FIO34-C. Distinguish between characters read from a file and EOF or WEOF
SIG30-C. Call only asynchronous-safe functions within signal handlers
ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array
DCL01-C. Do not reuse variable names in subscopes
DCL15-C. Declare file-scope objects or functions that do not need external linkage as static
EXP12-C. Do not ignore values returned by functions
FLP06

<unknown>

FLP33-C. Convert integers to floating point for floating-point operations <unknown>
INT01-C. Use rsize_t or size_t for all integer values representing the size of an object

<unknown>

INT07-C. Use only explicitly signed or unsigned char type for numeric values <unknown>
INT13-C. Use bitwise operators only on unsigned operands

<unknown>

MEM30 STR11-C. Do not access freed memory

<unknown>

MEM31-C. Free dynamically allocated memory exactly once

<unknown>

MSC07-C. Detect and remove dead code

specify the bound of a character array initialized with a string literal
-standard

<unknown>

MSC12-C. Detect and remove code that has no effect

<unknown>

SIG32-C. Do not call longjmp() from inside a signal handler

<unknown>

STR30-C. Do not attempt to modify string literals

<unknown>

STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator

<unknown>

STR33-C. Size wide character strings correctly

or is never executed
Can detect violations of this recommendation when the -Wunreachable-code flag is used MSC07-C. Detect and remove dead code

<unknown>

STR36-C. Do not specify the bound of a character array initialized with a string literal