A tool for static C/C++ code analysis

Edit Package cppcheck
http://cppcheck.wiki.sourceforge.net/

This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors:

* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic

See http://cppcheck.wiki.sourceforge.net/ for more details.

Refresh
Refresh
Source Files
Filename Size Changed
cppcheck-2.13.1.tar.gz 0003642653 3.47 MB
cppcheck.changes 0000043738 42.7 KB
cppcheck.spec 0000004641 4.53 KB
Revision 38 (latest revision is 42)
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1140512 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 38)
- update to 2.13.1:
 * Show premium autosar/misra/cert style issues even if --enable
   is not used
 * Better validation of --premium options
 * unsafe handling of unconditional #error
 * unsafe suppressions of critical errors
 * missing "misra-config" warning, calling unknown function in
   condition
 * If --premium=safety is used then go to "safety mode". Do not
   override this in cppcheck.cfg
Comments 0
openSUSE Build Service is sponsored by