cppcheck 1.51-1 source package in Ubuntu

Changelog

cppcheck (1.51-1) unstable; urgency=low


  * New upstream release
  * Fix false-negative for realloc. Closes: #628593

 -- Reijo Tomperi <email address hidden>  Sat, 08 Oct 2011 21:55:53 +0300

Upload details

Uploaded by:
Reijo Tomperi
Uploaded to:
Sid
Original maintainer:
Reijo Tomperi
Architectures:
any
Section:
devel
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
cppcheck_1.51-1.dsc 1.2 KiB aa66e719026193e93832cf10e7568c2891161e0f786ab3b024ebfd3122565a0c
cppcheck_1.51.orig.tar.gz 1.1 MiB 9d417ee31b6d4db199834d6ffb6fbd27c5675e42f1a159e853818cc819f0ff55
cppcheck_1.51-1.debian.tar.gz 5.4 KiB d134b9f54ad16e1a07cbffa12e18898bfee93c26b71cce9bd2ff41abe0b6e15f

No changes file available.

Binary packages built by this source

cppcheck: tool for static C/C++ code analysis

 Cppcheck is a command-line tool that tries to detect bugs that your
 C/C++ compiler doesn't see. It is versatile, and can check non-standard
 code including various compiler extensions, inline assembly code, etc.
 Its internal preprocessor can handle includes, macros, and several
 preprocessor commands. While Cppcheck is highly configurable,
 you can start using it just by giving it a path to the source code.
 .
 It includes checks for:
  * pointers to out-of-scope auto variables;
  * assignment of auto variables to an effective parameter of a function;
  * out-of-bounds errors in arrays and STL;
  * missing class constructors;
  * variables not initialized by a constructor;
  * use of memset, memcpy, etcetera on a class;
  * non-virtual destructors for base classes;
  * operator= not returning a constant reference to itself;
  * use of deprecated functions (mktemp, gets, scanf);
  * exceptions thrown in destructors;
  * memory leaks in class or function variables;
  * C-style pointer cast in C++ code;
  * redundant if;
  * misuse of the strtol or sprintf functions;
  * unsigned division or division by zero;
  * unused functions and struct members;
  * passing parameters by value;
  * misuse of signed char variables;
  * unusual pointer arithmetic (such as "abc" + 'd');
  * dereferenced null pointers;
  * incomplete statements;
  * misuse of iterators when iterating through a container;
  * dereferencing of erased iterators;
  * use of invalidated vector iterators/pointers;