Result for 1A5D3BE7FA8F6B60DF5D8CAE4843DDE9502469BB

Query result

Key Value
FileName./usr/share/cppcheck/cfg/googletest.cfg
FileSize7164
MD56C958793D1DA1376EA3CAFD5F80E7B77
SHA-11A5D3BE7FA8F6B60DF5D8CAE4843DDE9502469BB
SHA-2564E1E039B098121154AAFF9BCE3022529CF9E9E825E160884D4B576A6F51E75D5
SSDEEP96:N+2a2gRXXVpVVw9VsgsRBJ09/m9/SmtoDBtJDIpGtlDIpj3tyDIpj2at0DIpj2Pu:N+l7pjwrlChd99TdQuZLb
TLSHT1F8E18BB59D8ABC9484450E3999149E64B23CE5F7930CB3EA84FFAE950821C4348FB3D7
tar:gnameroot
tar:unameroot
hashlookup:parent-total61
hashlookup:trust100

Network graph view

Parents (Total: 61)

The searched file hash is included in 61 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5FB29906BC2EE5D8A34363DCAAC18AE2E
PackageArchx86_64
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageRelease1.2
PackageVersion2.6.3
SHA-1169A34562CEA26BC5E4E1B392372E42FAF7B65C3
SHA-256603B72878CD51B05491C42F17B5D3C07CCB1AFD8AC593295DAC92C7165F2FC45
Key Value
MD5E440A0D59B90B360ADDADD226B1C9EBF
PackageArchs390x
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://www.suse.com/
PackageNamecppcheck
PackageRelease45.d_t.1
PackageVersion2.6.3
SHA-124291517CF98DB45345E524B0B569D670827DD23
SHA-256989A8A40FBB961DFBDF4E892CF6792D59293678D43F6BB7C3A80559BA36AD014
Key Value
FileSize1540420
MD54014B29B9092F3088ED8142433D15EE8
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.3-1
SHA-130818591B0CE72548DB5E55D739BAFFD6692850D
SHA-25693279331062EF97FBF03955FE1D55E8066FCF1142454199E874641D29F53E348
Key Value
FileSize1517204
MD54E29355B877B39AAAEACE57AB7B5170F
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.3-1
SHA-13B26CB5162EBA18C1E5DE9C2741E7689AF71A259
SHA-256FB3AFDE5692D181FE747255C0BA82812D9445BE9A3CF2264733751047596F85B
Key Value
FileSize1666692
MD5799F156B734C90DF8DB3685F3185C889
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-13B85092EAC026CDCD7E8003BC401FAD2F1CA89F8
SHA-256E3D1D627EB997A61330DCACC2FEA498D498E7C3BEA988D5F8312E347D132350B
Key Value
FileSize1735236
MD5688D353036C002AFD31891CE86A55242
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-13D1D77A8778ABC31C9F30598D7136FD4A8EFA434
SHA-25656567878F9D5C29AD66F70A5F4C9CC3FFA1C1026D603DDE332EE07978956726B
Key Value
MD513F5C6E6E4A45336B17FE495180194DE
PackageArchi586
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageMaintainerhttps://bugs.opensuse.org
PackageNamecppcheck
PackageRelease1.2
PackageVersion2.6.3
SHA-13DA24BFFB312881B3D6CF083A7FAE9E1B997F54A
SHA-2561FF05B904DB15B9D71E91B2231AD0D80B4110DFFF3CD4F7D3DB65753941F74EC
Key Value
FileSize1899988
MD5AE7CC805864F1B90CFCAFA1DF6B142FD
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-14485FCB9674888E446189E1126E37BDD4334D8F5
SHA-256C9C7F0278F24438008CD528901A03DE5F672A12BE17A3D0ACB6C664C11486B20
Key Value
FileSize2034268
MD5D3C10BD5850F50367C1A76E493560967
PackageDescriptiontool for static C/C++ code analysis (CLI) Cppcheck is a command-line tool that tries to detect bugs that your C/C++ compiler doesn't see. It is versatile, and can check non-standard code including various compiler extensions, inline assembly code, etc. Its internal preprocessor can handle includes, macros, and several preprocessor commands. While Cppcheck is highly configurable, you can start using it just by giving it a path to the source code. . It includes checks for: * pointers to out-of-scope auto variables; * assignment of auto variables to an effective parameter of a function; * out-of-bounds errors in arrays and STL; * missing class constructors; * variables not initialized by a constructor; * use of memset, memcpy, etcetera on a class; * non-virtual destructors for base classes; * operator= not returning a constant reference to itself; * use of deprecated functions (mktemp, gets, scanf); * exceptions thrown in destructors; * memory leaks in class or function variables; * C-style pointer cast in C++ code; * redundant if; * misuse of the strtol or sprintf functions; * unsigned division or division by zero; * unused functions and struct members; * passing parameters by value; * misuse of signed char variables; * unusual pointer arithmetic (such as "abc" + 'd'); * dereferenced null pointers; * incomplete statements; * misuse of iterators when iterating through a container; * dereferencing of erased iterators; * use of invalidated vector iterators/pointers; . This package contains the command-line interface for cppcheck.
PackageMaintainerJoachim Reichel <reichel@debian.org>
PackageNamecppcheck
PackageSectiondevel
PackageVersion2.5-4
SHA-14566FD2EBFB4084EE5755E2928716781F5262215
SHA-256230E5102E57B42B42DD46823B1D9659DA447196EF213F48E3490C7B170BF8453
Key Value
MD52D3652C073618F8F23A9B373244D1C64
PackageArcharmv7hl
PackageDescriptionThis program tries to detect bugs that your C/C++ compiler don't see. Cppcheck is versatile. You can check non-standard code that includes various compiler extensions, inline assembly code, etc. Checking covers for example these errors: * Out of bounds * Uninitialized member variable 'classname::varname' * Using 'memfunc' on class * Using 'memfunc' on struct that contains a 'std::classname' * Class Base which is inherited by class Derived does not have a virtual destructor * Memory leak: varname * Resource leak: varname * Deallocating a deallocated pointer: varname * Using 'varname' after it is deallocated / released * Invalid radix in call to strtol or strtoul. Must be 0 or 2-36 * Overlapping data buffer varname * Unsigned division. The result will be wrong. * Unusual pointer arithmetic
PackageNamecppcheck
PackageRelease45.d_t.3
PackageVersion2.6.3
SHA-147AEFF32F48A989A0A65D44DDC4E0A8917327ACB
SHA-2568D5CCAE8C46A1C84033C9A3589C286CF38156D3CD021BBC8226DB7D5C41FD0F3