Parents (Total: 3)
The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:
Key |
Value |
MD5 | D28D215F7A00F383CFCFAAA0A6E79D57 |
PackageArch | s390x |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | bp156.3.4 |
PackageVersion | 2.12.1 |
SHA-1 | 1BB95891C05896E6D0820AA633B4C66736413C57 |
SHA-256 | F59CD3287B1B0AADAF12FB9D3803991744C1AC0C0D0A2E5997FC8985EEFA207D |
Key |
Value |
MD5 | 245C73437E963334F9845518C6AEC5BF |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | bp156.3.4 |
PackageVersion | 2.12.1 |
SHA-1 | 3B736ACA023B1C7280D4A09435504CDBA3B45FA1 |
SHA-256 | 3D414B174192E1057431B51355EFF171D5E65C338BEBE63043A2DDDDEA7A72BC |
Key |
Value |
MD5 | 740D0D2043B7E740C8DBDCB276372A1C |
PackageArch | x86_64 |
PackageDescription | This program tries to detect bugs that your C/C++ compiler don't see. Cppcheck
is versatile. You can check non-standard code that includes various compiler
extensions, inline assembly code, etc. Checking covers for example these
errors:
* Out of bounds
* Uninitialized member variable 'classname::varname'
* Using 'memfunc' on class
* Using 'memfunc' on struct that contains a 'std::classname'
* Class Base which is inherited by class Derived does not have a virtual
destructor
* Memory leak: varname
* Resource leak: varname
* Deallocating a deallocated pointer: varname
* Using 'varname' after it is deallocated / released
* Invalid radix in call to strtol or strtoul. Must be 0 or 2-36
* Overlapping data buffer varname
* Unsigned division. The result will be wrong.
* Unusual pointer arithmetic |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | cppcheck |
PackageRelease | bp155.1.5 |
PackageVersion | 2.10 |
SHA-1 | 446B65476EE9D629B9B993C4EAF27F956953665B |
SHA-256 | A8AD252B0F50D215005DE038D9FE0B54017CB581E2C16CB1EE7947B5D14E3CB1 |