Result for 1A139DFDFD969AFF79A089F21CC1A24E7C73C845

Query result

Key Value
FileName./usr/share/cppcheck/cfg/qt.cfg
FileSize177931
MD50AAEE2A077DD4DB770D2FBFE60CEF027
SHA-11A139DFDFD969AFF79A089F21CC1A24E7C73C845
SHA-256005D65F0CA581C04204859D709654FF2D398DD02F150CE5018ABE5888898293F
SSDEEP1536:mrWv+vlT5LQZohhnrYsHbVCUtRirml1kVmu73ZQTSzN/B1+rUvNRYktN0U2UWYLw:IL9or9X+U9tNMY8
TLSHT1E104AC15F8FA686AC00205B06E634825BD758ED3B36E29F0F8DD6EA47F830456127BDD
tar:gnameroot
tar:unameroot
hashlookup:parent-total14
hashlookup:trust100

Network graph view

Parents (Total: 14)

The searched file hash is included in 14 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize1666692
MD5799F156B734C90DF8DB3685F3185C889
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-13B85092EAC026CDCD7E8003BC401FAD2F1CA89F8
SHA-256E3D1D627EB997A61330DCACC2FEA498D498E7C3BEA988D5F8312E347D132350B
Key Value
FileSize1757812
MD5A1E8B6C054DC73EF4F1073315261DA88
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-16F5DE540D6A3BFA246DFCC337E49684B5E742371
SHA-256C7549EAE8CECA5A537A849CB3AAE72892350F80FF74DF5924A4E3907C9D5E911
Key Value
FileSize1903612
MD5831D91AC9D74CDBC806053FD12CEE455
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-1965C4AAF22E51DC198FDBB21B39E41B6F58CB5BA
SHA-2560755C1E608A07C99DD7AF2E365B3844F9C2932D880F4A3C1AB22AEBBEC2FBCC5
Key Value
FileSize2034268
MD5D3C10BD5850F50367C1A76E493560967
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-14566FD2EBFB4084EE5755E2928716781F5262215
SHA-256230E5102E57B42B42DD46823B1D9659DA447196EF213F48E3490C7B170BF8453
Key Value
FileSize1722948
MD5D9EACB5A9F81FC4A3746FB15D630C1CD
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-17FA5755E3468EAEFECFAAD658A14C9463118BAF3
SHA-2560A9D43E65845CF88701A4956032CCB628EE6E5E0A45E4C6DB2B33C5A249B6AE9
Key Value
FileSize1735236
MD5688D353036C002AFD31891CE86A55242
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-13D1D77A8778ABC31C9F30598D7136FD4A8EFA434
SHA-25656567878F9D5C29AD66F70A5F4C9CC3FFA1C1026D603DDE332EE07978956726B
Key Value
FileNamehttp://mirror.math.princeton.edu/pub/blackarch/blackarch/os//aarch64//cppcheck-2.5-1-aarch64.pkg.tar.xz
MD5C27B7AA58832A663CBA4511EA2C80899
SHA-1F9A54EEC165952110EE0410687B062AE53E0A507
SHA-256C170BA197EF77F1993D8BEDA04EA3F08E40879F87AD10EC82EF8B905EB2CD21D
SSDEEP49152:+8RVqtebQT5VzQ/O7vPJijd+tHVb25sgos1zjHsgrfRo0a1eoc:RsebizQm7vPAjd+td24stbsIJzaM
TLSHT118B53372C498843C2ED692D5C032C1BBEF156785EDBE210149472B79A2FBFD56384E8A
Key Value
FileSize1701052
MD5F4553E2C96B355FAE67975B1B72D95F0
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-1626F2F4802113080A359661EF5ACB58D79425C44
SHA-2568F423B31056D77C8DBAB4ECB6459EF1D527514B9A9B33B1843A66AE4CB6E8B1B
Key Value
MD5DBAB23913D23FF2B3ECC4F045F9C8ED0
PackageArchs390x
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageReleasebp154.1.87
PackageVersion2.5
SHA-1F65A42BCABF3655CF87E24DBD14299808FE05B0E
SHA-256C69D9073B13419407AEA1E06956C2A6AA53C9ED846126D171A85F5D2CB3B0960
Key Value
MD52BBD769A593EDEA5C1BE27C21BD55288
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageReleasebp154.1.87
PackageVersion2.5
SHA-1FADE3C36B5D9E41E581F163849A2C3CE5EBC5712
SHA-256D30DC88150194173DF12CB40DE3BD389771E7AF623E96AFA0D0AF85678867BBE
Key Value
FileNamehttp://mirror.math.princeton.edu/pub/blackarch/blackarch/os//x86_64//cppcheck-2.5-1-x86_64.pkg.tar.zst
MD52B0FA1076F5473A7CBFE256B1C553CF7
SHA-1EAEDAF0A02F316D5017213C80264B0076CAA39E9
SHA-2561221A88D27FBA4B1C4CA85FA6DF775A899FF15E706F92CE5D5A877791E8920E1
SSDEEP49152:/rLOIjVCHuoV/IK6atblIIH8aZzdCxNfozEB3ynIcvBgx:DLOVQjatblIraZxMf2i1cK
TLSHT1CED533306D42C17AF5C3F90A0B6D3268EC6307D77254CE99994960D6EF2D8FA1F66B02
Key Value
FileSize1899988
MD5AE7CC805864F1B90CFCAFA1DF6B142FD
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-14485FCB9674888E446189E1126E37BDD4334D8F5
SHA-256C9C7F0278F24438008CD528901A03DE5F672A12BE17A3D0ACB6C664C11486B20
Key Value
MD52C2072BEA4B7A4788BBF354232DCD63F
PackageArchx86_64
PackageDescriptionCppcheck is a static analysis tool for C/C++ code. Unlike C/C++ compilers and many other analysis tools it does not detect syntax errors in the code. Cppcheck primarily detects the types of bugs that the compilers normally do not detect. The goal is to detect only real errors in the code (i.e. have zero false positives).
PackageMaintainerFedora Project
PackageNamecppcheck
PackageRelease1.el7
PackageVersion2.5
SHA-18CA76E0C2639B8708BE4D4C3E95C2D35BB1FE51D
SHA-2562D7A593327D957BD2D6411152AEE28E62C7AEDD4FAB7B5E603F4C0914AEAE5DB
Key Value
FileSize1722956
MD558A3AFA040B90D7D463BE23D104DC26B
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-17E96F618B79302679C4B797C9AEB9790F017A17A
SHA-256205DAD05311D6C2B193B608692B6CBD96DC3CB389FD512286D44C05107782F48