This is the mail archive of the
cygwin-apps
mailing list for the Cygwin project.
[ITA] splint 3.1.1 - Check C programs for security vulnerabilities
- From: Jari Aalto <jari dot aalto at cante dot net>
- To: cygwin-apps at cygwin dot com
- Date: Tue, 14 Aug 2007 18:35:47 +0300
- Subject: [ITA] splint 3.1.1 - Check C programs for security vulnerabilities
Adopted from Elfyn McBratney
Jari
sdesc: "Check C programs for security vulnerabilities and programming
mistakes."
ldesc: "Splint does many of the traditional lint checks including
unused declarations, type inconsistencies, use before definition,
unreachable code, ignored return values, execution paths with no
return, likely infinite loops, and fall through cases. More powerful
checks are made possible by additional information given in source
code annotations. Annotations are stylized comments that document
assumptions about functions, variables, parameters and types. In
addition to the checks specifically enabled by annotations, many of
the traditional lint checks are improved by exploiting this additional
information."
category: Devel
requires: cygwin
a) manual
wget \
http://cygwin.cante.net/splint/splint-3.1.1-2.tar.bz2 \
http://cygwin.cante.net/splint/splint-3.1.1-2-src.tar.bz2 \
http://cygwin.cante.net/splint/setup.hint
b) automated: get.sh displays further instructions
gpg --keyserver wwwkeys.pgp.net --recv-keys 955A92D8
mkdir splint ; cd splint
rm -f get.sh get.sh.sig
wget http://cygwin.cante.net/splint/get.sh \
http://cygwin.cante.net/splint/get.sh.sig
gpg --verify get.sh.sig get.sh &&
sh get.sh