Result for 12A820463D756D88E67F0109C3213769A4AE1912

Query result

Key Value
FileName./usr/share/cppcheck/cfg/bsd.cfg
FileSize9297
MD5DCB769D04A66048B3DDB7A4F51CAB48C
SHA-112A820463D756D88E67F0109C3213769A4AE1912
SHA-256D3D02CFADDF2897658410AF85D99B6D3F41B14311785E24E2A8ACDEF24194283
SSDEEP96:Ci44j+hFL/qqyzy/Mvq/HG/9V6o1Lbvn+rkzovCAu9qxICpX/qcCd/qPJp65Rd6R:C14CFr8vifA//8f6AMmlauJpsLU8LO/
TLSHT1C712CC56FCFEB8A6C5404624AB730835BD959EC3A3592680F8DC3FA83F524526027DED
hashlookup:parent-total19
hashlookup:trust100

Network graph view

Parents (Total: 19)

The searched file hash is included in 19 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5FB29906BC2EE5D8A34363DCAAC18AE2E
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageRelease1.2
PackageVersion2.6.3
SHA-1169A34562CEA26BC5E4E1B392372E42FAF7B65C3
SHA-256603B72878CD51B05491C42F17B5D3C07CCB1AFD8AC593295DAC92C7165F2FC45
Key Value
MD5E440A0D59B90B360ADDADD226B1C9EBF
PackageArchs390x
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://www.suse.com/
PackageNamecppcheck
PackageRelease45.d_t.1
PackageVersion2.6.3
SHA-124291517CF98DB45345E524B0B569D670827DD23
SHA-256989A8A40FBB961DFBDF4E892CF6792D59293678D43F6BB7C3A80559BA36AD014
Key Value
MD513F5C6E6E4A45336B17FE495180194DE
PackageArchi586
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageRelease1.2
PackageVersion2.6.3
SHA-13DA24BFFB312881B3D6CF083A7FAE9E1B997F54A
SHA-2561FF05B904DB15B9D71E91B2231AD0D80B4110DFFF3CD4F7D3DB65753941F74EC
Key Value
MD52D3652C073618F8F23A9B373244D1C64
PackageArcharmv7hl
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageNamecppcheck
PackageRelease45.d_t.3
PackageVersion2.6.3
SHA-147AEFF32F48A989A0A65D44DDC4E0A8917327ACB
SHA-2568D5CCAE8C46A1C84033C9A3589C286CF38156D3CD021BBC8226DB7D5C41FD0F3
Key Value
MD54C0EA8700DC92A80E445A7C054BEC8CB
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageNamecppcheck
PackageRelease45.d_t.4
PackageVersion2.6.3
SHA-14E639621A7A2A760999DAB47F16455BE2A3C8459
SHA-256BDD324BB80EFC2CE3AE02DBA6948B002025D010EBCADF0A82277821C84651960
Key Value
MD51E9FBC88C9B1A9EF29DB7B8895DF5BD4
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageNamecppcheck
PackageRelease45.d_t.2
PackageVersion2.6.3
SHA-1718C01BB32E96636DCCED54C515088ED08BCE0F6
SHA-256F599C88EB176A06500C1E88BCB6BB50A68F472CB421269065018EAECA2B5FE03
Key Value
FileSize1782788
MD5AB38BA5C5AD63A674F146264BDAC81E0
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.6-1
SHA-172846BD47C058FED38821F35B2B1634D8F2620BB
SHA-256995674366F4F13090A3B69BD52122555FA666246923CEF9030E5B6C4D9C25A9D
Key Value
MD55550DBAE6A2E90BC296593D967644381
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://www.suse.com/
PackageNamecppcheck
PackageRelease45.d_t.1
PackageVersion2.6.3
SHA-1772C689714BBFE20AB5B6E8C801FC547909316A6
SHA-256436702EF7B667B75DB56CE9F2F529558B73A0B84EF7BCF2F5EB40CEF2B65066F
Key Value
MD53AD6B72CF36AA17C0217F3E3BEA52C1D
PackageArchs390x
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageNamecppcheck
PackageRelease45.d_t.4
PackageVersion2.6.3
SHA-1882274B2C428730FA76679DD61EE21CD1C8F38A3
SHA-256B0819270B49FD770FDB3961F5B856F09FA01C34695255BEADDAB9751279B1DDE
Key Value
FileSize1765172
MD5F4BFC98A0C0FFB79DB24219CD92788D7
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.6-1
SHA-198840FE5F5B3A5970FD8FFAC5CCE8AC3163512E7
SHA-256446AD425EDB187837E1F1F52496DD1CA4D0C910A60F8FB3A85442AEE6A4F0D8E