C checkers |
CERT C Secure Coding Standard |
<> |
STR34-C. Cast characters to unsigned char before converting to larger integer sizes |
<unknown> |
ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array |
<unknown> |
ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer |
<unknown> |
ARR30-C. Do not form or use out of bounds pointers or array subscripts |
<unknown> |
ARR33-C. Guarantee that copies are made into storage of sufficient size |
<unknown> |
ARR37-C. Do not add or subtract an integer to a pointer to a non-array object |
<unknown> |
CON33-C. Avoid race conditions when using library functions |
<unknown> |
DCL00-C. Const-qualify immutable objects |
<unknown> |
DCL01-C. Do not reuse variable names in subscopes |
<unknown> |
DCL02-C. Use visually distinct identifiers |
<unknown> |
DCL03-C. Use a static assertion to test the value of a constant expression |
<unknown> |
DCL05-C. Use typedefs to improve code readability |
<unknown> |
DCL06-C. Use meaningful symbolic constants to represent literal values |
<unknown> |
DCL11-C. Understand the type issues associated with variadic functions |
<unknown> |
DCL13-C. Declare function parameters that are pointers to values not changed by the function as const |
<unknown> |
DCL30-C. Declare objects with appropriate storage durations |
<unknown> |
DCL31-C. Declare identifiers before using them |
<unknown> |
DCL32-C. Guarantee that mutually visible identifiers are unique |
<unknown> |
DCL37-C. Do not declare or define a reserved identifier |
<unknown> |
DCL38-C. Use the correct syntax when declaring flexible array members |
<unknown> |
ENV00-C. Do not store the pointer to the string returned by getenv() |
<unknown> |
ENV01-C. Do not make assumptions about the size of an environment variable |
<unknown> |
ENV02-C. Beware of multiple environment variables with the same effective name |
<unknown> |
ENV04-C. Do not call system() if you do not need a command processor |
<unknown> |
ENV30-C. Do not modify the object referenced by the return value of certain functions |
<unknown> |
ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it |
<unknown> |
ENV32-C. All atexit handlers must return normally |
<unknown> |
ERR05-C. Application-independent code should provide error detection without dictating error handling |
<unknown> |
ERR06-C. Understand the termination behavior of assert() and abort() |
<unknown> |
ERR32-C. Do not rely on indeterminate values of errno |
<unknown> |
EXP01-C. Do not take the size of a pointer to determine the size of the pointed-to type |
<unknown> |
EXP02-C. Be aware of the short-circuit behavior of the logical AND and OR operators |
<unknown> |
EXP04-C. Do not perform byte-by-byte comparisons involving a structure |
<unknown> |
EXP05-C. Do not cast away a const qualification |
<unknown> |
EXP06-C. Operands to the sizeof operator should not contain side effects |
<unknown> |
EXP09-C. Use sizeof to determine the size of a type or variable |
<unknown> |
EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place |
<unknown> |
EXP11-C. Do not apply operators expecting one type to data of an incompatible type |
<unknown> |
EXP12-C. Do not ignore values returned by functions |
<unknown> |
EXP14-C. Beware of integer promotion when performing bitwise operations on integer types smaller than int |
<unknown> |
EXP18-C. Do not perform assignments in selection statements |
<unknown> |
EXP30-C. Do not depend on order of evaluation between sequence points |
<unknown> |
EXP32-C. Do not access a volatile object through a non-volatile reference |
<unknown> |
EXP33-C. Do not reference uninitialized memory |
<unknown> |
EXP34-C. Do not dereference null pointers |
<unknown> |
EXP36-C. Do not convert pointers into more strictly aligned pointer types |
<unknown> |
EXP37-C. Call functions with the arguments intended by the API |
<unknown> |
FIO01-C. Be careful using functions that use file names for identification |
<unknown> |
FIO02-C. Canonicalize path names originating from untrusted sources |
<unknown> |
FIO04-C. Detect and handle input and output errors |
<unknown> |
FIO05-C. Identify files using multiple file attributes |
<unknown> |
FIO07-C. Prefer fseek() to rewind() |
<unknown> |
FIO08-C. Take care when calling remove() on an open file |
<unknown> |
FIO09-C. Be careful with binary data when transferring data across systems |
<unknown> |
FIO11-C. Take care when specifying the mode parameter of fopen() |
<unknown> |
FIO12-C. Prefer setvbuf() to setbuf() |
<unknown> |
FIO13-C. Never push back anything other than one read character |
<unknown> |
FIO30-C. Exclude user input from format strings |
<unknown> |
FIO32-C. Do not perform operations on devices that are only appropriate for files |
<unknown> |
FIO33-C. Detect and handle input output errors resulting in undefined behavior |
<unknown> |
FIO34-C. Use int to capture the return value of character IO functions |
<unknown> |
FIO37-C. Do not assume that fgets() returns a nonempty string when successful |
<unknown> |
FIO38-C. Do not use a copy of a FILE object for input and output |
<unknown> |
FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call |
<unknown> |
FIO42-C. Ensure files are properly closed when they are no longer needed |
<unknown> |
FIO43-C. Do not create temporary files in shared directories |
<unknown> |
FIO44-C. Only use values for fsetpos() that are returned from fgetpos() |
<unknown> |
FLP02-C. Avoid using floating point numbers when precise computation is needed |
<unknown> |
FLP03-C. Detect and handle floating point errors |
<unknown> |
FLP30-C. Do not use floating point variables as loop counters |
<unknown> |
FLP33-C. Convert integers to floating point for floating point operations |
<unknown> |
FLP34-C. Ensure that floating point conversions are within range of the new type |
<unknown> |
INT01-C. Use rsize_t or size_t for all integer values representing the size of an object |
<unknown> |
INT05-C. Do not use input functions to convert character data if they cannot handle all possible inputs |
<unknown> |
INT06-C. Use strtol() or a related function to convert a string token to an integer |
<unknown> |
INT07-C. Use only explicitly signed or unsigned char type for numeric values |
<unknown> |
INT08-C. Verify that all integer values are in range |
<unknown> |
INT09-C. Ensure enumeration constants map to unique values |
<unknown> |
INT11-C. Take care when converting from pointer to integer or integer to pointer |
<unknown> |
INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression |
<unknown> |
INT13-C. Use bitwise operators only on unsigned operands |
<unknown> |
INT14-C. Avoid performing bitwise and arithmetic operations on the same data |
<unknown> |
INT15-C. Use intmax_t or uintmax_t for formatted IO on programmer-defined integer types |
<unknown> |
INT30-C. Ensure that unsigned integer operations do not wrap |
<unknown> |
INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data |
<unknown> |
INT33-C. Ensure that division and modulo operations do not result in divide-by-zero errors |
<unknown> |
INT34-C. Do not shift a negative number of bits or more bits than exist in the operand |
<unknown> |
INT35-C. Evaluate integer expressions in a larger size before comparing or assigning to that size |
<unknown> |
MEM00-C. Allocate and free memory in the same module, at the same level of abstraction |
<unknown> |
MEM01-C. Store a new value in pointers immediately after free() |
<unknown> |
MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type |
<unknown> |
MEM03-C. Clear sensitive information stored in reusable resources |
<unknown> |
MEM04-C. Do not perform zero length allocations |
<unknown> |
MEM07-C. Ensure that the arguments to calloc(), when multiplied, can be represented as a size_t |
<unknown> |
MEM08-C. Use realloc() only to resize dynamically allocated arrays |
<unknown> |
MEM30-C. Do not access freed memory |
<unknown> |
MEM31-C. Free dynamically allocated memory exactly once |
<unknown> |
MEM32-C. Detect and handle memory allocation errors |
<unknown> |
MEM33-C. Allocate and copy structures containing flexible array members dynamically |
<unknown> |
MEM34-C. Only free memory allocated dynamically |
<unknown> |
MEM35-C. Allocate sufficient memory for an object |
<unknown> |
MSC01-C. Strive for logical completeness |
<unknown> |
MSC02-C. Avoid errors of omission |
<unknown> |
MSC03-C. Avoid errors of addition |
<unknown> |
MSC05-C. Do not manipulate time_t typed values directly |
<unknown> |
MSC17-C. Finish every set of statements associated with a case label with a break statement |
<unknown> |
MSC21-C. Use robust loop termination conditions |
<unknown> |
MSC30-C. Do not use the rand() function for generating pseudorandom numbers |
<unknown> |
MSC31-C. Ensure that return values are compared against the proper type |
<unknown> |
MSC32-C. Ensure your random number generator is properly seeded |
<unknown> |
POS01-C. Check for the existence of links when dealing with files |
<unknown> |
POS30-C. Use the readlink() function properly |
<unknown> |
POS33-C. Do not use vfork() |
<unknown> |
POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument |
<unknown> |
POS35-C. Avoid race conditions while checking for the existence of a symbolic link |
<unknown> |
POS36-C. Observe correct revocation order while relinquishing privileges |
<unknown> |
SIG01-C. Understand implementation-specific details regarding signal handler persistence |
<unknown> |
SIG30-C. Call only asynchronous-safe functions within signal handlers |
<unknown> |
SIG31-C. Do not access or modify shared objects in signal handlers |
<unknown> |
SIG32-C. Do not call longjmp() from inside a signal handler |
<unknown> |
SIG33-C. Do not recursively invoke the raise() function |
<unknown> |
SIG34-C. Do not call signal() from within interruptible signal handlers |
<unknown> |
STR03-C. Do not inadvertently truncate a null-terminated byte string |
<unknown> |
STR04-C. Use plain char for characters in the basic character set |
<unknown> |
STR05-C. Use pointers to const when referring to string literals |
<unknown> |
STR06-C. Do not assume that strtok() leaves the parse string unchanged |
<unknown> |
STR30-C. Do not attempt to modify string literals |
<unknown> |
STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator |
<unknown> |
STR32-C. Null-terminate byte strings as required |
<unknown> |
STR33-C. Size wide character strings correctly |
<unknown> |
STR35-C. Do not copy data from an unbounded source to a fixed-length array |
<unknown> |
STR36-C. Do not specify the bound of a character array initialized with a string literal |
<unknown> |
STR37-C. Arguments to character handling functions must be representable as an unsigned char |