Result for 12E797B693FF370F0D89CEAC33E581B76D854CF1

Query result

Key Value
FileName./usr/share/Cppcheck/ruby.cfg
FileSize1585
MD562B17F1811317E087C747A53054F1C42
SHA-112E797B693FF370F0D89CEAC33E581B76D854CF1
SHA-2566779A5AE1CE00A62E3EB5434E14D928DD7005A405EFBCE866FF6B25DF4509AB4
SSDEEP24:ud2VPgpZ39uJFQImQw3f398JFQ7KeQH9TJyQH9uOGQw/39GVFQvlQXlc:uASpHuJG2w318JGWfdTJDd/nwVsGvma
TLSHT19231255AFCFE74A6C1005111DE660426BE958FC3B61612C1FCDC3E69BF9A047905B9AC
tar:gnamebin
tar:unameroot
hashlookup:parent-total16
hashlookup:trust100

Network graph view

Parents (Total: 16)

The searched file hash is included in 16 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize1288348
MD524B02D36785A72751E710B101B801F20
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.88-1
SHA-12D1365EF23DB1EB83A91E1BE3FDB629F3A4F8DFF
SHA-256E109A0BC2DDF3BD80CF2F076DDC8CA7ACFC5629B57644B728A5B1C0BEE8FE68F
Key Value
FileSize1421888
MD5CD0660CFF5644021F64FF5CFB3F91657
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.89-4+b1
SHA-12DAD8D1C3F6B8E3DCB63EE667C11FF410A0308D2
SHA-256DBC98AD2D01BA80E456614BFB94E98A981C59FEC5118A274B0166ED0A1648F76
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/6.6/packages//amd64//cppcheck-1.89.tgz
MD572CBB007B49968F072F705A5A2C91615
SHA-1545E449EA29FB9D5BC4A7DCFA1E899B62ED63795
SHA-256DF3E69BC785B06A7FBD9F2D3491A104E0948D402EE384A43015DC010087E38FF
SSDEEP49152:rLo6LX/q6hIGHGhXmk7i7oV74pJ0Y571vC:hvRRG1mKJNzY5k
TLSHT1B37533AFC05508A66B5B4BB320C9FC9141F0E2C79A1D7A4C225C5F731E0B4DA9E69F9C
Key Value
FileSize1070652
MD533682A3A926580F5C1D7C5267ABF9283
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.88-1
SHA-15D90F0BAB2E86BA373270FF3F052C147EC498AA1
SHA-25618F99554AC04D69AA342A1986473C36D30159D2BE1487F51518084EBA64CE97A
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/6.6/packages//arm//cppcheck-1.89.tgz
MD5BF820543C629219A2FC7D7B7EEF9633D
SHA-15E8B116BAED068A418CECDF7D1D1E5A6F48177F0
SHA-256575611E5CC0B0FBE6E1F8313FB3FBA899E95A7B2856E48C8C107A4C140466EC3
SSDEEP49152:jhFhVCkWVB6oILI159/jGhzNPDPrVtNo7Y571vC:jTnCkWVB6oILE5xQlDLNo7Y5k
TLSHT1067533D0C4611CF4E91A7BB356A886B0C3AA07FFA6144DE7018C97DEC5F83881576ABD
Key Value
MD5BD345BE80418F932C6CE418CAD5AA394
PackageArchaarch64
PackageDescriptionCppcheck is a static analysis tool for C/C++ code. Unlike C/C++ compilers and many other analysis tools it does not detect syntax errors in the code. Cppcheck primarily detects the types of bugs that the compilers normally do not detect. The goal is to detect only real errors in the code (i.e. have zero false positives).
PackageMaintainerFedora Project
PackageNamecppcheck
PackageRelease3.el7
PackageVersion1.88
SHA-170734740923E05F4DA55EFA68FBF249C04CA7D94
SHA-256398B7A0BEF8442F954CF2040F569E196436CEAAA7F6C8DA34DD6DF7F9FCF318E
Key Value
FileSize1091712
MD5E1EAC4A0FE1C224249EB59604B7C0F5F
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.88-1
SHA-178963C535B7656AAD84E408CECE5D312F52B3478
SHA-2567833AD2B1C8AAE0466C2602CC7AE9EBB82C86D97FD06AC98E71E811AD1B3459D
Key Value
FileSize1099664
MD524225E284E8FEF2F084590689311325A
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.88-1
SHA-1898993846E47CA50E905CD7ED92B68682B3F40FC
SHA-2564706DA6D8F2ACA186AD53C76316E091D77F7EF8674BCD6764A93E7A610A530B4
Key Value
FileSize1527268
MD58F9C0792FEABF79221E6B0C931F31EFC
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion1.89-4+b1
SHA-19FCC1C62D8AEA7DFDAD130527B8F48A156E7995E
SHA-2566C78C7BBFC80F046B8695087AF28960415F7AC2C4130C7ABBB08BC68FEBA212B
Key Value
FileNamehttps://ftp.lysator.liu.se/pub/OpenBSD/6.6/packages//i386//cppcheck-1.89.tgz
MD5816F25DACB185005486A457D37EEB821
SHA-1A05AC9508E0172FA9135B33F4EFE6362287F2ED7
SHA-25628D83941EE38D3414BC9BFA3FBC3414EFE1FA52202DE6594F41395B90D77CDCA
SSDEEP49152:a/2d6InMvepOxJnxNrEHBLATo9SUD+paLY571vC:42d/nrpOxJxmpuo84+0Y5k
TLSHT1258533608B97B58C2E3D2F0AD1CA995571F464DF0E8700B4552BE00BE946728F7F9CBA