[{"data":1,"prerenderedAt":4381},["ShallowReactive",2],{"global-navigation":3,"page-\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp37-c":28,"surround-\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp37-c":2615,"sidebar-sei-cert-c-coding-standard":2622},[4,8],{"title":5,"path":6,"_path":6,"fromAppConfig":7},"Home","\u002F",true,{"title":9,"path":10,"children":11,"_path":27,"fromAppConfig":7},"Coding Standards","\u002Fcoding-standards\u002F",[12,15,18,21,24],{"title":13,"path":14},"Android Coding Standard","\u002Fandroid-secure-coding-standard\u002F",{"title":16,"path":17},"C Coding Standard","\u002Fsei-cert-c-coding-standard\u002F",{"title":19,"path":20},"C++ Coding Standard","\u002Fsei-cert-cpp-coding-standard\u002F",{"title":22,"path":23},"Java Coding Standard","\u002Fsei-cert-oracle-coding-standard-for-java\u002F",{"title":25,"path":26},"Perl Coding Standard","\u002Fsei-cert-perl-coding-standard\u002F","\u002Fcoding-standards",{"id":29,"title":30,"body":31,"description":41,"extension":2598,"meta":2599,"navigation":7,"path":2611,"seo":2612,"stem":2613,"__hash__":2614},"content\u002F4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F08.exp37-c.md","EXP37-C. Call functions with the correct number and type of arguments",{"type":32,"value":33,"toc":2576},"minimark",[34,38,42,51,104,122,127,148,154,373,376,478,482,500,580,584,587,656,659,675,681,687,831,835,844,972,975,992,1103,1106,1117,1235,1239,1251,1281,1294,1320,1355,1358,1362,1367,1481,1485,1493,1553,1558,2248,2252,2264,2268,2275,2410,2414,2420,2424,2427,2431,2434,2439,2442,2447,2450,2455,2458,2461,2465,2468,2476,2480,2547,2550,2572],[35,36,30],"h1",{"id":37},"exp37-c-call-functions-with-the-correct-number-and-type-of-arguments",[39,40,41],"p",{},"Do not call a function with the wrong number or type of arguments.",[39,43,44,45,50],{},"The C Standard identifies two distinct situations in which ",[46,47,49],"a",{"href":48},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fbb-definitions#BB.Definitions-undefinedbehavior","undefined behavior"," (UB) may arise as a result of invoking a function using a declaration that is incompatible with its definition or by supplying incorrect types or numbers of arguments:",[52,53,54,65],"table",{},[55,56,57],"thead",{},[58,59,60,63],"tr",{},[61,62],"th",{},[61,64],{},[66,67,68,77,91],"tbody",{},[58,69,70,74],{},[71,72,73],"td",{},"UB",[71,75,76],{},"Description",[58,78,79,85],{},[71,80,81],{},[46,82,84],{"href":83},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fcc-undefined-behavior#CC.UndefinedBehavior-ub_25","25",[71,86,87],{},[88,89,90],"em",{},"A pointer is used to call a function whose type is not compatible with the referenced type (6.3.2.3).",[58,92,93,99],{},[71,94,95],{},[46,96,98],{"href":97},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fcc-undefined-behavior#CC.UndefinedBehavior-ub_37","37",[71,100,101],{},[88,102,103],{},"A function is defined with a type that is not compatible with the type (of the expression) pointed to by the expression that denotes the called function (6.5.2.2).",[39,105,106,107,111,112,116,117,121],{},"Functions that are appropriately declared (as in ",[46,108,110],{"href":109},"\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl40-c","DCL40-C. Do not create incompatible declarations of the same function or object"," ) will typically generate a compiler diagnostic message if they are supplied with the wrong number or types of arguments. However, there are cases in which supplying the incorrect arguments to a function will, at best, generate compiler ",[46,113,115],{"href":114},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fbb-definitions#BB.Definitions-warning","warnings"," . Although such warnings should be resolved, they do not prevent program compilation. (See ",[46,118,120],{"href":119},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc00-c","MSC00-C. Compile cleanly at high warning levels"," .)",[123,124,126],"h2",{"id":125},"noncompliant-code-example","Noncompliant Code Example",[39,128,129,130,134,135,138,139,142,143,147],{},"The header ",[131,132,133],"code",{},"\u003Ctgmath.h>"," provides type-generic macros for math functions. Although most functions from the ",[131,136,137],{},"\u003Cmath.h>"," header have a complex counterpart in ",[131,140,141],{},"\u003Ccomplex.h>"," , several functions do not. Calling any of the following type-generic functions with complex values is ",[46,144,146],{"href":145},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fcc-undefined-behavior#CC.UndefinedBehavior-ub_205","undefined behavior 205"," .",[39,149,150],{},[151,152,153],"strong",{},"Functions That Should Not Be Called with Complex Values",[52,155,158],{"className":156},[157],"wrapped",[66,159,160,214,268,321],{},[58,161,164,169,174,179,184,189,194,199,204,209],{"className":162},[163],"odd",[71,165,166],{},[131,167,168],{},"      atan2()     ",[71,170,171],{},[131,172,173],{},"      erf             ()      ",[71,175,176],{},[131,177,178],{},"      fdim             ()      ",[71,180,181],{},[131,182,183],{},"      fmin             ()      ",[71,185,186],{},[131,187,188],{},"      ilogb             ()      ",[71,190,191],{},[131,192,193],{},"      llround             ()      ",[71,195,196],{},[131,197,198],{},"      logb             ()      ",[71,200,201],{},[131,202,203],{},"      nextafter             ()      ",[71,205,206],{},[131,207,208],{},"      rint             ()      ",[71,210,211],{},[131,212,213],{},"      tgamma             ()      ",[58,215,218,223,228,233,238,243,248,253,258,263],{"className":216},[217],"even",[71,219,220],{},[131,221,222],{},"      cbrt             ()      ",[71,224,225],{},[131,226,227],{},"      erfc             ()      ",[71,229,230],{},[131,231,232],{},"      floor             ()      ",[71,234,235],{},[131,236,237],{},"      fmod             ()      ",[71,239,240],{},[131,241,242],{},"      ldexp             ()      ",[71,244,245],{},[131,246,247],{},"      log10             ()      ",[71,249,250],{},[131,251,252],{},"      lrint             ()      ",[71,254,255],{},[131,256,257],{},"      nexttoward             ()      ",[71,259,260],{},[131,261,262],{},"      round             ()      ",[71,264,265],{},[131,266,267],{},"      trunc             ()      ",[58,269,271,276,281,286,291,296,301,306,311,316],{"className":270},[163],[71,272,273],{},[131,274,275],{},"      ceil             ()      ",[71,277,278],{},[131,279,280],{},"      exp2             ()      ",[71,282,283],{},[131,284,285],{},"      fma             ()      ",[71,287,288],{},[131,289,290],{},"      frexp             ()      ",[71,292,293],{},[131,294,295],{},"      lgamma             ()      ",[71,297,298],{},[131,299,300],{},"      log1p             ()      ",[71,302,303],{},[131,304,305],{},"      lround             ()      ",[71,307,308],{},[131,309,310],{},"      remainder             ()      ",[71,312,313],{},[131,314,315],{},"      scalbn             ()      ",[71,317,318],{},[319,320],"br",{},[58,322,324,329,334,339,344,349,354,359,364,369],{"className":323},[217],[71,325,326],{},[131,327,328],{},"      copysign             ()      ",[71,330,331],{},[131,332,333],{},"      expm1             ()      ",[71,335,336],{},[131,337,338],{},"      fmax             ()      ",[71,340,341],{},[131,342,343],{},"      hypot             ()      ",[71,345,346],{},[131,347,348],{},"      llrint             ()      ",[71,350,351],{},[131,352,353],{},"      log2             ()      ",[71,355,356],{},[131,357,358],{},"      nearbyint             ()      ",[71,360,361],{},[131,362,363],{},"      remquo             ()      ",[71,365,366],{},[131,367,368],{},"      scalbln             ()      ",[71,370,371],{},[319,372],{},[39,374,375],{},"This noncompliant code example attempts to take the base-2 logarithm of a complex number, resulting in undefined behavior:",[377,378,380],"code-block",{"quality":379},"bad",[381,382,387],"pre",{"className":383,"code":384,"language":385,"meta":386,"style":386},"language-c shiki shiki-themes github-light github-dark monokai","#include \u003Ctgmath.h>\n \nvoid func(void) {\n  double complex c = 2.0 + 4.0 * I;\n  double complex result = log2(c);\n}\n","c","",[131,388,389,402,409,428,456,472],{"__ignoreMap":386},[390,391,394,398],"span",{"class":392,"line":393},"line",1,[390,395,397],{"class":396},"sC2Qs","#include",[390,399,401],{"class":400},"sstjo"," \u003Ctgmath.h>\n",[390,403,405],{"class":392,"line":404},2,[390,406,408],{"class":407},"sMOD_"," \n",[390,410,412,416,420,423,425],{"class":392,"line":411},3,[390,413,415],{"class":414},"sq6CD","void",[390,417,419],{"class":418},"srTi1"," func",[390,421,422],{"class":407},"(",[390,424,415],{"class":414},[390,426,427],{"class":407},") {\n",[390,429,431,434,437,440,444,447,450,453],{"class":392,"line":430},4,[390,432,433],{"class":414},"  double",[390,435,436],{"class":407}," complex c ",[390,438,439],{"class":396},"=",[390,441,443],{"class":442},"s7F3e"," 2.0",[390,445,446],{"class":396}," +",[390,448,449],{"class":442}," 4.0",[390,451,452],{"class":396}," *",[390,454,455],{"class":407}," I;\n",[390,457,459,461,464,466,469],{"class":392,"line":458},5,[390,460,433],{"class":414},[390,462,463],{"class":407}," complex result ",[390,465,439],{"class":396},[390,467,468],{"class":418}," log2",[390,470,471],{"class":407},"(c);\n",[390,473,475],{"class":392,"line":474},6,[390,476,477],{"class":407},"}\n",[123,479,481],{"id":480},"compliant-solution-complex-number","Compliant Solution (Complex Number)",[39,483,484,485,488,489,492,493,496,497,499],{},"If the ",[131,486,487],{},"clog2()"," function is not available for an implementation as an extension, the programmer can take the base-2 logarithm of a complex number, using ",[131,490,491],{},"log()"," instead of ",[131,494,495],{},"log2()"," , because ",[131,498,491],{}," can be used on complex arguments, as shown in this compliant solution:",[377,501,503],{"quality":502},"good",[381,504,506],{"className":383,"code":505,"language":385,"meta":386,"style":386},"#include \u003Ctgmath.h>\n \nvoid func(void) {\n  double complex c = 2.0 + 4.0 * I;\n  double complex result = log(c)\u002Flog(2);\n}\n",[131,507,508,514,519,531,549,576],{"__ignoreMap":386},[390,509,510,512],{"class":392,"line":393},[390,511,397],{"class":396},[390,513,401],{"class":400},[390,515,516],{"class":392,"line":404},[390,517,518],{"class":407}," \n",[390,520,521,523,525,527,529],{"class":392,"line":411},[390,522,415],{"class":414},[390,524,419],{"class":418},[390,526,422],{"class":407},[390,528,415],{"class":414},[390,530,427],{"class":407},[390,532,533,535,537,539,541,543,545,547],{"class":392,"line":430},[390,534,433],{"class":414},[390,536,436],{"class":407},[390,538,439],{"class":396},[390,540,443],{"class":442},[390,542,446],{"class":396},[390,544,449],{"class":442},[390,546,452],{"class":396},[390,548,455],{"class":407},[390,550,551,553,555,557,560,563,565,568,570,573],{"class":392,"line":458},[390,552,433],{"class":414},[390,554,463],{"class":407},[390,556,439],{"class":396},[390,558,559],{"class":418}," log",[390,561,562],{"class":407},"(c)",[390,564,6],{"class":396},[390,566,567],{"class":418},"log",[390,569,422],{"class":407},[390,571,572],{"class":442},"2",[390,574,575],{"class":407},");\n",[390,577,578],{"class":392,"line":474},[390,579,477],{"class":407},[123,581,583],{"id":582},"compliant-solution-real-number","Compliant Solution (Real Number)",[39,585,586],{},"The programmer can use this compliant solution if the intent is to take the base-2 logarithm of the real part of the complex number:",[377,588,589],{"quality":502},[381,590,592],{"className":383,"code":591,"language":385,"meta":386,"style":386},"#include \u003Ctgmath.h>\n \nvoid func(void) {\n  double complex c = 2.0 + 4.0 * I;\n  double complex result = log2(creal(c));\n}\n",[131,593,594,600,604,616,634,652],{"__ignoreMap":386},[390,595,596,598],{"class":392,"line":393},[390,597,397],{"class":396},[390,599,401],{"class":400},[390,601,602],{"class":392,"line":404},[390,603,408],{"class":407},[390,605,606,608,610,612,614],{"class":392,"line":411},[390,607,415],{"class":414},[390,609,419],{"class":418},[390,611,422],{"class":407},[390,613,415],{"class":414},[390,615,427],{"class":407},[390,617,618,620,622,624,626,628,630,632],{"class":392,"line":430},[390,619,433],{"class":414},[390,621,436],{"class":407},[390,623,439],{"class":396},[390,625,443],{"class":442},[390,627,446],{"class":396},[390,629,449],{"class":442},[390,631,452],{"class":396},[390,633,455],{"class":407},[390,635,636,638,640,642,644,646,649],{"class":392,"line":458},[390,637,433],{"class":414},[390,639,463],{"class":407},[390,641,439],{"class":396},[390,643,468],{"class":418},[390,645,422],{"class":407},[390,647,648],{"class":418},"creal",[390,650,651],{"class":407},"(c));\n",[390,653,654],{"class":392,"line":474},[390,655,477],{"class":407},[123,657,126],{"id":658},"noncompliant-code-example-1",[39,660,661,662,665,666,669,670,674],{},"In this noncompliant example, the C standard library function ",[131,663,664],{},"strchr()"," is called through the function pointer ",[131,667,668],{},"fp"," declared with a prototype with incorrectly typed arguments. According to the C Standard, 6.3.2.3, paragraph 8 [ ",[46,671,673],{"href":672},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-ISO-IEC9899-2024","ISO\u002FIEC 9899:2024"," ]",[676,677,678],"blockquote",{},[39,679,680],{},"A pointer to a function of one type may be converted to a pointer to a function of another type and back again; the result shall compare equal to the original pointer. If a converted pointer is used to call a function whose type is not compatible with the referenced type, the behavior is undefined.",[39,682,683,684],{},"See ",[46,685,686],{"href":83},"undefined behavior 25.",[377,688,689],{"quality":379},[381,690,692],{"className":383,"code":691,"language":385,"meta":386,"style":386},"#include \u003Cstdio.h>\n#include \u003Cstring.h>\n\nchar *(*fp)();\n\nint main(void) {\n  const char *c;\n  fp = strchr;\n  c = fp('e', \"Hello\");\n  printf(\"%s\\n\", c);\n  return 0;\n}\n",[131,693,694,701,708,713,728,732,746,760,771,795,814,826],{"__ignoreMap":386},[390,695,696,698],{"class":392,"line":393},[390,697,397],{"class":396},[390,699,700],{"class":400}," \u003Cstdio.h>\n",[390,702,703,705],{"class":392,"line":404},[390,704,397],{"class":396},[390,706,707],{"class":400}," \u003Cstring.h>\n",[390,709,710],{"class":392,"line":411},[390,711,712],{"emptyLinePlaceholder":7},"\n",[390,714,715,718,720,722,725],{"class":392,"line":430},[390,716,717],{"class":414},"char",[390,719,452],{"class":396},[390,721,422],{"class":407},[390,723,724],{"class":396},"*",[390,726,727],{"class":407},"fp)();\n",[390,729,730],{"class":392,"line":458},[390,731,712],{"emptyLinePlaceholder":7},[390,733,734,737,740,742,744],{"class":392,"line":474},[390,735,736],{"class":414},"int",[390,738,739],{"class":418}," main",[390,741,422],{"class":407},[390,743,415],{"class":414},[390,745,427],{"class":407},[390,747,749,752,755,757],{"class":392,"line":748},7,[390,750,751],{"class":396},"  const",[390,753,754],{"class":414}," char",[390,756,452],{"class":396},[390,758,759],{"class":407},"c;\n",[390,761,763,766,768],{"class":392,"line":762},8,[390,764,765],{"class":407},"  fp ",[390,767,439],{"class":396},[390,769,770],{"class":407}," strchr;\n",[390,772,774,777,779,782,784,787,790,793],{"class":392,"line":773},9,[390,775,776],{"class":407},"  c ",[390,778,439],{"class":396},[390,780,781],{"class":418}," fp",[390,783,422],{"class":407},[390,785,786],{"class":400},"'e'",[390,788,789],{"class":407},", ",[390,791,792],{"class":400},"\"Hello\"",[390,794,575],{"class":407},[390,796,798,801,803,806,809,811],{"class":392,"line":797},10,[390,799,800],{"class":418},"  printf",[390,802,422],{"class":407},[390,804,805],{"class":400},"\"",[390,807,808],{"class":442},"%s\\n",[390,810,805],{"class":400},[390,812,813],{"class":407},", c);\n",[390,815,817,820,823],{"class":392,"line":816},11,[390,818,819],{"class":396},"  return",[390,821,822],{"class":442}," 0",[390,824,825],{"class":407},";\n",[390,827,829],{"class":392,"line":828},12,[390,830,477],{"class":407},[123,832,834],{"id":833},"compliant-solution","Compliant Solution",[39,836,837,838,840,841,843],{},"In this compliant solution, the function pointer ",[131,839,668],{}," , which points to the C standard library function ",[131,842,664],{}," , is declared with the correct parameters and is invoked with the correct number and type of arguments:",[377,845,846],{"quality":502},[381,847,849],{"className":383,"code":848,"language":385,"meta":386,"style":386},"#include \u003Cstdio.h>\n#include \u003Cstring.h>\n\nchar *(*fp)(const char *, int);\n\nint main(void) {\n  const char *c;\n  fp = strchr;\n  c = fp(\"Hello\",'e');\n  printf(\"%s\\n\", c);\n  return 0;\n}\n",[131,850,851,857,863,867,893,897,909,919,927,946,960,968],{"__ignoreMap":386},[390,852,853,855],{"class":392,"line":393},[390,854,397],{"class":396},[390,856,700],{"class":400},[390,858,859,861],{"class":392,"line":404},[390,860,397],{"class":396},[390,862,707],{"class":400},[390,864,865],{"class":392,"line":411},[390,866,712],{"emptyLinePlaceholder":7},[390,868,869,871,873,875,877,880,883,885,887,889,891],{"class":392,"line":430},[390,870,717],{"class":414},[390,872,452],{"class":396},[390,874,422],{"class":407},[390,876,724],{"class":396},[390,878,879],{"class":407},"fp)(",[390,881,882],{"class":396},"const",[390,884,754],{"class":414},[390,886,452],{"class":396},[390,888,789],{"class":407},[390,890,736],{"class":414},[390,892,575],{"class":407},[390,894,895],{"class":392,"line":458},[390,896,712],{"emptyLinePlaceholder":7},[390,898,899,901,903,905,907],{"class":392,"line":474},[390,900,736],{"class":414},[390,902,739],{"class":418},[390,904,422],{"class":407},[390,906,415],{"class":414},[390,908,427],{"class":407},[390,910,911,913,915,917],{"class":392,"line":748},[390,912,751],{"class":396},[390,914,754],{"class":414},[390,916,452],{"class":396},[390,918,759],{"class":407},[390,920,921,923,925],{"class":392,"line":762},[390,922,765],{"class":407},[390,924,439],{"class":396},[390,926,770],{"class":407},[390,928,929,931,933,935,937,939,942,944],{"class":392,"line":773},[390,930,776],{"class":407},[390,932,439],{"class":396},[390,934,781],{"class":418},[390,936,422],{"class":407},[390,938,792],{"class":400},[390,940,941],{"class":407},",",[390,943,786],{"class":400},[390,945,575],{"class":407},[390,947,948,950,952,954,956,958],{"class":392,"line":797},[390,949,800],{"class":418},[390,951,422],{"class":407},[390,953,805],{"class":400},[390,955,808],{"class":442},[390,957,805],{"class":400},[390,959,813],{"class":407},[390,961,962,964,966],{"class":392,"line":816},[390,963,819],{"class":396},[390,965,822],{"class":442},[390,967,825],{"class":407},[390,969,970],{"class":392,"line":828},[390,971,477],{"class":407},[123,973,126],{"id":974},"noncompliant-code-example-2",[39,976,977,978,981,982,985,986,988,989,991],{},"In this noncompliant example, the function ",[131,979,980],{},"f()"," is defined to take an argument of type ",[131,983,984],{},"long"," but ",[131,987,980],{}," is called from another file with an argument of type ",[131,990,736],{}," :",[377,993,994],{"quality":379},[381,995,997],{"className":383,"code":996,"language":385,"meta":386,"style":386},"\u002F* In another source file *\u002F\nlong f(long x) {\n  return x \u003C 0 ? -x : x;\n}\n\n\u002F* In this source file, no f prototype in scope *\u002F\nlong f();\n \nlong g(int x) {\n  return f(x);\n}\n",[131,998,999,1005,1022,1049,1053,1057,1062,1071,1075,1090,1099],{"__ignoreMap":386},[390,1000,1001],{"class":392,"line":393},[390,1002,1004],{"class":1003},"s8-w5","\u002F* In another source file *\u002F\n",[390,1006,1007,1009,1012,1014,1016,1020],{"class":392,"line":404},[390,1008,984],{"class":414},[390,1010,1011],{"class":418}," f",[390,1013,422],{"class":407},[390,1015,984],{"class":414},[390,1017,1019],{"class":1018},"sTHNf"," x",[390,1021,427],{"class":407},[390,1023,1024,1026,1029,1032,1034,1037,1040,1043,1046],{"class":392,"line":411},[390,1025,819],{"class":396},[390,1027,1028],{"class":407}," x ",[390,1030,1031],{"class":396},"\u003C",[390,1033,822],{"class":442},[390,1035,1036],{"class":396}," ?",[390,1038,1039],{"class":396}," -",[390,1041,1042],{"class":407},"x ",[390,1044,1045],{"class":396},":",[390,1047,1048],{"class":407}," x;\n",[390,1050,1051],{"class":392,"line":430},[390,1052,477],{"class":407},[390,1054,1055],{"class":392,"line":458},[390,1056,712],{"emptyLinePlaceholder":7},[390,1058,1059],{"class":392,"line":474},[390,1060,1061],{"class":1003},"\u002F* In this source file, no f prototype in scope *\u002F\n",[390,1063,1064,1066,1068],{"class":392,"line":748},[390,1065,984],{"class":414},[390,1067,1011],{"class":418},[390,1069,1070],{"class":407},"();\n",[390,1072,1073],{"class":392,"line":762},[390,1074,518],{"class":407},[390,1076,1077,1079,1082,1084,1086,1088],{"class":392,"line":773},[390,1078,984],{"class":414},[390,1080,1081],{"class":418}," g",[390,1083,422],{"class":407},[390,1085,736],{"class":414},[390,1087,1019],{"class":1018},[390,1089,427],{"class":407},[390,1091,1092,1094,1096],{"class":392,"line":797},[390,1093,819],{"class":396},[390,1095,1011],{"class":418},[390,1097,1098],{"class":407},"(x);\n",[390,1100,1101],{"class":392,"line":816},[390,1102,477],{"class":407},[123,1104,834],{"id":1105},"compliant-solution-1",[39,1107,1108,1109,1111,1112,1114,1115,991],{},"In this compliant solution, the prototype for the function ",[131,1110,980],{}," is included in the source file in the scope of where it is called, and the function ",[131,1113,980],{}," is correctly called with an argument of type ",[131,1116,984],{},[377,1118,1119],{"quality":502},[381,1120,1122],{"className":383,"code":1121,"language":385,"meta":386,"style":386},"\u002F* In another source file *\u002F\n \nlong f(long x) {\n  return x \u003C 0 ? -x : x;\n}\n\n\u002F* f prototype in scope in this source file *\u002F\n\nlong f(long x); \n\nlong g(int x) {\n  return f((long)x);  \n}\n",[131,1123,1124,1128,1132,1146,1166,1170,1174,1179,1183,1198,1202,1216,1230],{"__ignoreMap":386},[390,1125,1126],{"class":392,"line":393},[390,1127,1004],{"class":1003},[390,1129,1130],{"class":392,"line":404},[390,1131,518],{"class":407},[390,1133,1134,1136,1138,1140,1142,1144],{"class":392,"line":411},[390,1135,984],{"class":414},[390,1137,1011],{"class":418},[390,1139,422],{"class":407},[390,1141,984],{"class":414},[390,1143,1019],{"class":1018},[390,1145,427],{"class":407},[390,1147,1148,1150,1152,1154,1156,1158,1160,1162,1164],{"class":392,"line":430},[390,1149,819],{"class":396},[390,1151,1028],{"class":407},[390,1153,1031],{"class":396},[390,1155,822],{"class":442},[390,1157,1036],{"class":396},[390,1159,1039],{"class":396},[390,1161,1042],{"class":407},[390,1163,1045],{"class":396},[390,1165,1048],{"class":407},[390,1167,1168],{"class":392,"line":458},[390,1169,477],{"class":407},[390,1171,1172],{"class":392,"line":474},[390,1173,712],{"emptyLinePlaceholder":7},[390,1175,1176],{"class":392,"line":748},[390,1177,1178],{"class":1003},"\u002F* f prototype in scope in this source file *\u002F\n",[390,1180,1181],{"class":392,"line":762},[390,1182,712],{"emptyLinePlaceholder":7},[390,1184,1185,1187,1189,1191,1193,1195],{"class":392,"line":773},[390,1186,984],{"class":414},[390,1188,1011],{"class":418},[390,1190,422],{"class":407},[390,1192,984],{"class":414},[390,1194,1019],{"class":1018},[390,1196,1197],{"class":407},"); \n",[390,1199,1200],{"class":392,"line":797},[390,1201,712],{"emptyLinePlaceholder":7},[390,1203,1204,1206,1208,1210,1212,1214],{"class":392,"line":816},[390,1205,984],{"class":414},[390,1207,1081],{"class":418},[390,1209,422],{"class":407},[390,1211,736],{"class":414},[390,1213,1019],{"class":1018},[390,1215,427],{"class":407},[390,1217,1218,1220,1222,1225,1227],{"class":392,"line":828},[390,1219,819],{"class":396},[390,1221,1011],{"class":418},[390,1223,1224],{"class":407},"((",[390,1226,984],{"class":414},[390,1228,1229],{"class":407},")x);  \n",[390,1231,1233],{"class":392,"line":1232},13,[390,1234,477],{"class":407},[123,1236,1238],{"id":1237},"noncompliant-code-example-posix","Noncompliant Code Example (POSIX)",[39,1240,1241,1242,1245,1246,1250],{},"The POSIX function ",[131,1243,1244],{},"open()"," [ ",[46,1247,1249],{"href":1248},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-IEEEStd1003.1-2013","IEEE Std 1003.1:2013"," ] is a variadic function with the following prototype:",[381,1252,1256],{"className":1253,"code":1254,"language":1255,"meta":386,"style":386},"language-java shiki shiki-themes github-light github-dark monokai","int open(const char *path, int oflag, ... );\n","java",[131,1257,1258],{"__ignoreMap":386},[390,1259,1260,1262,1265,1267,1269,1271,1273,1276,1278],{"class":392,"line":393},[390,1261,736],{"class":414},[390,1263,1264],{"class":418}," open",[390,1266,422],{"class":407},[390,1268,882],{"class":396},[390,1270,754],{"class":414},[390,1272,452],{"class":396},[390,1274,1275],{"class":407},"path, ",[390,1277,736],{"class":414},[390,1279,1280],{"class":407}," oflag, ... );\n",[39,1282,1283,1284,1286,1287,1289,1290,121],{},"The ",[131,1285,1244],{}," function accepts a third argument to determine a newly created file's access mode. If ",[131,1288,1244],{}," is used to create a new file and the third argument is omitted, the file may be created with unintended access permissions. (See ",[46,1291,1293],{"href":1292},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio06-c","FIO06-C. Create files with appropriate access permissions",[39,1295,1296,1297,1301,1302,1305,1306,1309,1310,1316,1317,1319],{},"In this noncompliant code example from a ",[46,1298,1300],{"href":1299},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fbb-definitions#BB.Definitions-vulnerability","vulnerability"," in the ",[131,1303,1304],{},"useradd()"," function of the ",[131,1307,1308],{},"shadow-utils"," package ",[46,1311,1315],{"href":1312,"rel":1313},"http:\u002F\u002Fcve.mitre.org\u002Fcgi-bin\u002Fcvename.cgi?name=CVE-2006-1174",[1314],"nofollow","CVE-2006-1174"," , the third argument to ",[131,1318,1244],{}," is accidentally omitted:",[377,1321,1322],{"quality":379},[381,1323,1325],{"className":383,"code":1324,"language":385,"meta":386,"style":386},"fd = open(ms, O_CREAT | O_EXCL | O_WRONLY | O_TRUNC);\n",[131,1326,1327],{"__ignoreMap":386},[390,1328,1329,1332,1334,1336,1339,1342,1345,1347,1350,1352],{"class":392,"line":393},[390,1330,1331],{"class":407},"fd ",[390,1333,439],{"class":396},[390,1335,1264],{"class":418},[390,1337,1338],{"class":407},"(ms, O_CREAT ",[390,1340,1341],{"class":396},"|",[390,1343,1344],{"class":407}," O_EXCL ",[390,1346,1341],{"class":396},[390,1348,1349],{"class":407}," O_WRONLY ",[390,1351,1341],{"class":396},[390,1353,1354],{"class":407}," O_TRUNC);\n",[39,1356,1357],{},"Technically, it is incorrect to pass a third argument to open() when not creating a new file (that is, with the O_CREAT flag not set).",[123,1359,1361],{"id":1360},"compliant-solution-posix","Compliant Solution (POSIX)",[39,1363,1364,1365,991],{},"In this compliant solution, a third argument is specified in the call to ",[131,1366,1244],{},[377,1368,1369],{"quality":502},[381,1370,1372],{"className":383,"code":1371,"language":385,"meta":386,"style":386},"#include \u003Cfcntl.h>\n \nvoid func(const char *ms, mode_t perms) {\n  \u002F* ... *\u002F\n  int fd;\n  fd = open(ms, O_CREAT | O_EXCL | O_WRONLY | O_TRUNC, perms);\n  if (fd == -1) {\n    \u002F* Handle error *\u002F\n  }\n}\n",[131,1373,1374,1381,1385,1412,1417,1425,1449,1467,1472,1477],{"__ignoreMap":386},[390,1375,1376,1378],{"class":392,"line":393},[390,1377,397],{"class":396},[390,1379,1380],{"class":400}," \u003Cfcntl.h>\n",[390,1382,1383],{"class":392,"line":404},[390,1384,408],{"class":407},[390,1386,1387,1389,1391,1393,1395,1397,1399,1402,1404,1407,1410],{"class":392,"line":411},[390,1388,415],{"class":414},[390,1390,419],{"class":418},[390,1392,422],{"class":407},[390,1394,882],{"class":396},[390,1396,754],{"class":414},[390,1398,452],{"class":396},[390,1400,1401],{"class":1018},"ms",[390,1403,789],{"class":407},[390,1405,1406],{"class":414},"mode_t",[390,1408,1409],{"class":1018}," perms",[390,1411,427],{"class":407},[390,1413,1414],{"class":392,"line":430},[390,1415,1416],{"class":1003},"  \u002F* ... *\u002F\n",[390,1418,1419,1422],{"class":392,"line":458},[390,1420,1421],{"class":414},"  int",[390,1423,1424],{"class":407}," fd;\n",[390,1426,1427,1430,1432,1434,1436,1438,1440,1442,1444,1446],{"class":392,"line":474},[390,1428,1429],{"class":407},"  fd ",[390,1431,439],{"class":396},[390,1433,1264],{"class":418},[390,1435,1338],{"class":407},[390,1437,1341],{"class":396},[390,1439,1344],{"class":407},[390,1441,1341],{"class":396},[390,1443,1349],{"class":407},[390,1445,1341],{"class":396},[390,1447,1448],{"class":407}," O_TRUNC, perms);\n",[390,1450,1451,1454,1457,1460,1462,1465],{"class":392,"line":748},[390,1452,1453],{"class":396},"  if",[390,1455,1456],{"class":407}," (fd ",[390,1458,1459],{"class":396},"==",[390,1461,1039],{"class":396},[390,1463,1464],{"class":442},"1",[390,1466,427],{"class":407},[390,1468,1469],{"class":392,"line":762},[390,1470,1471],{"class":1003},"    \u002F* Handle error *\u002F\n",[390,1473,1474],{"class":392,"line":773},[390,1475,1476],{"class":407},"  }\n",[390,1478,1479],{"class":392,"line":797},[390,1480,477],{"class":407},[123,1482,1484],{"id":1483},"risk-assessment","Risk Assessment",[39,1486,1487,1488,1492],{},"Calling a function with incorrect arguments can result in ",[46,1489,1491],{"href":1490},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fbb-definitions#BB.Definitions-unexpectedbehavior","unexpected"," or unintended program behavior.",[52,1494,1495,1496,1495,1523],{},"\n  ",[55,1497,1498,1499,1495],{},"\n    ",[58,1500,1501,1502,1501,1505,1501,1508,1501,1511,1501,1514,1501,1517,1501,1520,1498],{},"\n      ",[61,1503,1504],{},"Rule",[61,1506,1507],{},"Severity",[61,1509,1510],{},"Likelihood",[61,1512,1513],{},"Detectable",[61,1515,1516],{},"Repairable",[61,1518,1519],{},"Priority",[61,1521,1522],{},"Level",[66,1524,1498,1525,1495],{},[58,1526,1501,1527,1501,1530,1501,1533,1501,1536,1501,1539,1501,1541,1501,1548,1498],{},[71,1528,1529],{},"EXP37-C",[71,1531,1532],{},"Medium",[71,1534,1535],{},"Probable",[71,1537,1538],{},"No",[71,1540,1538],{},[71,1542,1544],{"style":1543},"color: #27ae60;",[1545,1546,1547],"b",{},"P4",[71,1549,1550],{"style":1543},[1545,1551,1552],{},"L3",[1554,1555,1557],"h3",{"id":1556},"automated-detection","Automated Detection",[52,1559,1563,1579],{"className":1560,"style":1562},[157,1561],"relative-table","width: 99.9407%;",[1564,1565,1566,1570,1573,1576],"colgroup",{},[1567,1568],"col",{"style":1569},"width: 9%",[1567,1571],{"style":1572},"width: 25%",[1567,1574],{"style":1575},"width: 22%",[1567,1577],{"style":1578},"width: 43%",[66,1580,1581,1596,1638,1664,1689,1721,1758,1784,1815,1836,1867,1900,1923,1949,1993,2042,2138,2163,2189,2218],{},[58,1582,1585,1588,1591,1594],{"className":1583},[1584],"header",[61,1586,1587],{},"Tool",[61,1589,1590],{},"Version",[61,1592,1593],{},"Checker",[61,1595,76],{},[58,1597,1599,1605,1613,1635],{"className":1598},[163],[71,1600,1601],{},[46,1602,1604],{"href":1603},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fastree","Astrée",[71,1606,1607],{},[1608,1609,1612],"div",{"className":1610},[1611],"content-wrapper","25.10",[71,1614,1615,1620,1625,1630],{},[39,1616,1617],{},[151,1618,1619],{},"incompatible-argument-type",[39,1621,1622],{},[151,1623,1624],{},"parameter-match",[39,1626,1627],{},[151,1628,1629],{},"parameter-match-computed",[39,1631,1632],{},[151,1633,1634],{},"parameter-match-type",[71,1636,1637],{},"Fully checked",[58,1639,1641,1647,1655,1660],{"className":1640},[217],[71,1642,1643],{},[46,1644,1646],{"href":1645},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Faxivion-bauhaus-suite","Axivion Bauhaus Suite",[71,1648,1649],{},[1608,1650,1652],{"className":1651},[1611],[39,1653,1654],{},"7.2.0",[71,1656,1657],{},[151,1658,1659],{},"CertC-EXP37",[71,1661,1662],{},[319,1663],{},[58,1665,1667,1673,1679,1686],{"className":1666},[163],[71,1668,1669],{},[46,1670,1672],{"href":1671},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodesonar","CodeSonar",[71,1674,1675],{},[1608,1676,1678],{"className":1677},[1611],"9.1p0",[71,1680,1681],{},[39,1682,1683],{},[151,1684,1685],{},"LANG.FUNCS.APM",[71,1687,1688],{},"Array parameter mismatch",[58,1690,1692,1698,1702,1706],{"className":1691},[217],[71,1693,1694],{},[46,1695,1697],{"href":1696},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frose","Compass\u002FROSE",[71,1699,1700],{},[319,1701],{},[71,1703,1704],{},[319,1705],{},[71,1707,1708],{},[39,1709,1710,1711,1714,1715,1718,1719],{},"Can detect some violations of this rule. In particular, it ensures that all calls to ",[131,1712,1713],{},"       open()      "," supply exactly two arguments if the second argument does not involve ",[131,1716,1717],{},"       O_CREAT      "," , and exactly three arguments if the second argument does involve ",[131,1720,1717],{},[58,1722,1724,1730,1736,1750],{"className":1723},[163],[71,1725,1726],{},[46,1727,1729],{"href":1728},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcoverity","Coverity",[71,1731,1732],{},[1608,1733,1735],{"className":1734},[1611],"2017.07",[71,1737,1738,1743],{},[39,1739,1740],{},[151,1741,1742],{},"MISRA C 2012 Rule 8.2",[39,1744,1745],{},[151,1746,1747],{},[151,1748,1749],{},"MISRA C 2012 Rule 17.3",[71,1751,1752,1755],{},[39,1753,1754],{},"Implemented",[39,1756,1757],{},"Relies on functions declared with prototypes, allow compiler to check",[58,1759,1761,1767,1775,1780],{"className":1760},[217],[71,1762,1763],{},[46,1764,1766],{"href":1765},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck-premium","Cppcheck Premium",[71,1768,1769],{},[1608,1770,1772],{"className":1771},[1611],[39,1773,1774],{},"24.11.0",[71,1776,1777],{},[151,1778,1779],{},"premium-cert-exp37-c",[71,1781,1782],{},[319,1783],{},[58,1785,1787,1795,1801,1810],{"className":1786},[163],[71,1788,1789],{},[39,1790,1791],{},[46,1792,1794],{"href":1793},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Feclair","ECLAIR",[71,1796,1797],{},[1608,1798,1800],{"className":1799},[1611],"1.2",[71,1802,1803],{},[39,1804,1805],{},[151,1806,1807,1808],{},"CC2.EXP37",[319,1809],{},[71,1811,1812],{},[39,1813,1814],{},"Partially implemented",[58,1816,1818,1824,1828,1832],{"className":1817},[217],[71,1819,1820],{},[46,1821,1823],{"href":1822},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fedg","EDG",[71,1825,1826],{},[319,1827],{},[71,1829,1830],{},[319,1831],{},[71,1833,1834],{},[319,1835],{},[58,1837,1839,1845,1851,1855],{"className":1838},[163],[71,1840,1841],{},[46,1842,1844],{"href":1843},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fgcc","GCC",[71,1846,1847],{},[1608,1848,1850],{"className":1849},[1611],"4.3.5",[71,1852,1853],{},[319,1854],{},[71,1856,1857],{},[39,1858,1859,1860,1863,1864,1866],{},"Can detect violation of this rule when the ",[131,1861,1862],{},"       -Wstrict-prototypes      "," flag is used. However, it cannot detect violations involving variadic functions, such as the ",[131,1865,1713],{}," example described earlier",[58,1868,1870,1876,1884,1896],{"className":1869},[217],[71,1871,1872],{},[46,1873,1875],{"href":1874},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fhelix-qac","Helix QAC",[71,1877,1878],{},[1608,1879,1881],{"className":1880},[1611],[39,1882,1883],{},"2025.2",[71,1885,1886,1891],{},[39,1887,1888],{},[151,1889,1890],{},"C1331, C1332, C1333, C3002, C3320, C3335",[39,1892,1893],{},[151,1894,1895],{},"C++0403",[71,1897,1898],{},[319,1899],{},[58,1901,1903,1909,1914,1919],{"className":1902},[163],[71,1904,1905],{},[46,1906,1908],{"href":1907},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fklocwork","Klocwork",[71,1910,1911],{},[1608,1912,1883],{"className":1913},[1611],[71,1915,1916],{},[151,1917,1918],{},"MISRA.FUNC.UNMATCHED.PARAMS",[71,1920,1921],{},[319,1922],{},[58,1924,1926,1932,1938,1947],{"className":1925},[217],[71,1927,1928],{},[46,1929,1931],{"href":1930},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fldra","LDRA tool suite",[71,1933,1934],{},[1608,1935,1937],{"className":1936},[1611],"9.7.1",[71,1939,1940],{},[39,1941,1942],{},[151,1943,1944],{},[151,1945,1946],{},"41 D, 21 S, 98 S, 170 S, 496 S, 576 S",[71,1948,1814],{},[58,1950,1952,1958,1965,1982],{"className":1951},[163],[71,1953,1954],{},[46,1955,1957],{"href":1956},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fparasoft","Parasoft C\u002FC++test",[71,1959,1960],{},[1608,1961,1963],{"className":1962},[1611],[39,1964,1883],{},[71,1966,1967],{},[39,1968,1969,1972,1974,1977,1979],{},[151,1970,1971],{},"CERT_C-EXP37-a",[319,1973],{},[151,1975,1976],{},"CERT_C-EXP37-b",[319,1978],{},[151,1980,1981],{},"CERT_C-EXP37-d",[71,1983,1984],{},[39,1985,1986,1987,1989,1990,1992],{},"Conversions shall not be performed between non compatible pointer to a function types",[319,1988],{},"\nSpecify the access permission bits if a file is created using the 'open' or 'openat' system call",[319,1991],{},"\nFunctions shall always have visible prototype at the function call",[58,1994,1996,2002,2010,2018],{"className":1995},[217],[71,1997,1998],{},[46,1999,2001],{"href":2000},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpolyspace-bug-finder","Polyspace Bug Finder",[71,2003,2004],{},[1608,2005,2007],{"className":2006},[1611],[39,2008,2009],{},"R2025b",[71,2011,2012],{},[39,2013,2014],{},[46,2015,2017],{"href":2016},"https:\u002F\u002Fwww.mathworks.com\u002Fhelp\u002Fbugfinder\u002Fref\u002Fcertcruleexp37c.html","CERT C: Rule EXP37-C",[71,2019,2020,2023,2039],{},[39,2021,2022],{},"Checks for:",[2024,2025,2026,2030,2033,2036],"ul",{},[2027,2028,2029],"li",{},"Implicit function declaration",[2027,2031,2032],{},"Bad file access mode or status",[2027,2034,2035],{},"Unreliable cast of function pointer",[2027,2037,2038],{},"Standard function call with incorrect arguments",[39,2040,2041],{},"Rule partially covered.",[58,2043,2045,2051,2059,2134],{"className":2044},[163],[71,2046,2047],{},[46,2048,2050],{"href":2049},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpvs-studio","PVS-Studio",[71,2052,2053],{},[1608,2054,2056],{"className":2055},[1611],[39,2057,2058],{},"7.42",[71,2060,2061,2067,2068,2067,2074,2067,2080,2067,2086,2067,2092,2067,2098,2067,2104,2067,2110,2067,2116,2067,2122,2067,2128],{},[46,2062,2064],{"href":2063},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv540\u002F",[151,2065,2066],{},"V540"," , ",[46,2069,2071],{"href":2070},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv541\u002F",[151,2072,2073],{},"V541",[46,2075,2077],{"href":2076},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv549\u002F",[151,2078,2079],{},"V549",[46,2081,2083],{"href":2082},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv575\u002F",[151,2084,2085],{},"V575",[46,2087,2089],{"href":2088},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv632\u002F",[151,2090,2091],{},"V632",[46,2093,2095],{"href":2094},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv639\u002F",[151,2096,2097],{},"V639",[151,2099,2100],{},[46,2101,2103],{"href":2102},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv666\u002F","V666",[46,2105,2107],{"href":2106},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv671\u002F",[151,2108,2109],{},"V671",[46,2111,2113],{"href":2112},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv742\u002F",[151,2114,2115],{},"V742",[151,2117,2118],{},[46,2119,2121],{"href":2120},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv743\u002F","V743",[46,2123,2125],{"href":2124},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv764\u002F",[151,2126,2127],{},"V764",[151,2129,2130],{},[46,2131,2133],{"href":2132},"https:\u002F\u002Fpvs-studio.com\u002Fen\u002Fdocs\u002Fwarnings\u002Fv1004\u002F","V1004",[71,2135,2136],{},[319,2137],{},[58,2139,2141,2147,2155,2160],{"className":2140},[217],[71,2142,2143],{},[46,2144,2146],{"href":2145},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsecurity-reviewer-static-reviewer","Security Reviewer - Static Reviewer",[71,2148,2149],{},[1608,2150,2152],{"className":2151},[1611],[39,2153,2154],{},"6.02",[71,2156,2157],{},[151,2158,2159],{},"C71",[71,2161,2162],{},"Fully implemented",[58,2164,2166,2172,2178,2186],{"className":2165},[163],[71,2167,2168],{},[46,2169,2171],{"href":2170},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsonarqube-ccpp-plugin","SonarQube C\u002FC++ Plugin",[71,2173,2174],{},[1608,2175,2177],{"className":2176},[1611],"3.11",[71,2179,2180],{},[151,2181,2182],{},[46,2183,2185],{"href":2184},"https:\u002F\u002Fwww.sonarsource.com\u002Fproducts\u002Fcodeanalyzers\u002Fsonarcfamilyforcpp\u002Frules-c.html#RSPEC-930","S930",[71,2187,2188],{},"Detects incorrect argument count",[58,2190,2192,2198,2205,2215],{"className":2191},[217],[71,2193,2194],{},[46,2195,2197],{"href":2196},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frulechecker","RuleChecker",[71,2199,2200],{},[1608,2201,2203],{"className":2202},[1611],[39,2204,1612],{},[71,2206,2207,2211],{},[39,2208,2209],{},[151,2210,1624],{},[39,2212,2213],{},[151,2214,1634],{},[71,2216,2217],{},"Partially checked",[58,2219,2221,2227,2235,2240],{"className":2220},[163],[71,2222,2223],{},[46,2224,2226],{"href":2225},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Ftrustinsoft-analyzer","TrustInSoft Analyzer",[71,2228,2229],{},[1608,2230,2232],{"className":2231},[1611],[39,2233,2234],{},"1.38",[71,2236,2237],{},[151,2238,2239],{},"unclassified (\"function type matches\")",[71,2241,2242,2243,2247],{},"Partially verified (see ",[46,2244,2246],{"href":2245},"https:\u002F\u002Ftaas.trust-in-soft.com\u002Ftsnippet\u002Ft\u002F0fff4439","one compliant and one non-compliant example"," ).",[123,2249,2251],{"id":2250},"related-vulnerabilities","Related Vulnerabilities",[39,2253,2254,2255,2258,2259,147],{},"Search for ",[46,2256,2257],{"href":1299},"vulnerabilities"," resulting from the violation of this rule on the ",[46,2260,2263],{"href":2261,"rel":2262},"https:\u002F\u002Fwww.kb.cert.org\u002Fvulnotes\u002Fbymetric?searchview&query=FIELD+KEYWORDS+contains+EXP37-C",[1314],"CERT website",[123,2265,2267],{"id":2266},"related-guidelines","Related Guidelines",[39,2269,2270,2274],{},[46,2271,2273],{"href":2272},"\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fhow-this-coding-standard-is-organized#HowthisCodingStandardisOrganized-RelatedGuidelines","Key here"," (explains table format and definitions)",[52,2276,2277,2287],{},[55,2278,2279],{},[58,2280,2281,2283,2285],{},[61,2282],{},[61,2284],{},[61,2286],{},[66,2288,2289,2300,2316,2328,2340,2353,2366,2379,2390],{},[58,2290,2291,2294,2297],{},[71,2292,2293],{},"Taxonomy",[71,2295,2296],{},"Taxonomy item",[71,2298,2299],{},"Relationship",[58,2301,2302,2307,2313],{},[71,2303,2304],{},[46,2305,2306],{"href":17},"CERT C Secure Coding Standard",[71,2308,2309],{},[46,2310,2312],{"href":2311},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl07-c","DCL07-C. Include the appropriate type information in function declarators",[71,2314,2315],{},"Prior to 2018-01-12: CERT: Unspecified Relationship",[58,2317,2318,2322,2326],{},[71,2319,2320],{},[46,2321,2306],{"href":17},[71,2323,2324],{},[46,2325,120],{"href":119},[71,2327,2315],{},[58,2329,2330,2334,2338],{},[71,2331,2332],{},[46,2333,2306],{"href":17},[71,2335,2336],{},[46,2337,1293],{"href":1292},[71,2339,2315],{},[58,2341,2342,2348,2351],{},[71,2343,2344],{},[46,2345,2347],{"href":2346},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-ISO-IECTR24772-2013","ISO\u002FIEC TR 24772:2013",[71,2349,2350],{},"Subprogram Signature Mismatch [OTR]",[71,2352,2315],{},[58,2354,2355,2361,2364],{},[71,2356,2357],{},[46,2358,2360],{"href":2359},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-ISO-IECTS17961","ISO\u002FIEC TS 17961",[71,2362,2363],{},"Calling functions with incorrect arguments [argcomp]",[71,2365,2315],{},[58,2367,2368,2374,2377],{},[71,2369,2370],{},[46,2371,2373],{"href":2372},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-MISRA12","MISRA C:2012",[71,2375,2376],{},"Rule 8.2 (required)",[71,2378,2315],{},[58,2380,2381,2385,2388],{},[71,2382,2383],{},[46,2384,2373],{"href":2372},[71,2386,2387],{},"Rule 17.3 (mandatory)",[71,2389,2315],{},[58,2391,2392,2399,2407],{},[71,2393,2394],{},[46,2395,2398],{"href":2396,"rel":2397},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html",[1314],"CWE 2.11",[71,2400,2401,2406],{},[46,2402,2405],{"href":2403,"rel":2404},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F628.html",[1314],"CWE-628"," , Function Call with Incorrectly Specified Arguments",[71,2408,2409],{},"2017-07-05: CERT: Rule subset of CWE",[123,2411,2413],{"id":2412},"cert-cwe-mapping-notes","CERT-CWE Mapping Notes",[39,2415,2416,2419],{},[46,2417,2273],{"href":2418},"\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fhow-this-coding-standard-is-organized#HowthisCodingStandardisOrganized-CERT-CWEMappingNotes"," for mapping notes",[1554,2421,2423],{"id":2422},"cwe-685-and-exp37-c","CWE-685 and EXP37-C",[39,2425,2426],{},"EXP37-C = Union( CWE-685, CWE-686) Intersection( CWE-685, CWE-686) = Ø",[1554,2428,2430],{"id":2429},"cwe-686-and-exp37-c","CWE-686 and EXP37-C",[39,2432,2433],{},"Intersection( EXP37-C, FIO47-C) =",[2024,2435,2436],{},[2027,2437,2438],{},"Invalid argument types passed to format I\u002FO function",[39,2440,2441],{},"EXP37-C – FIO47-C =",[2024,2443,2444],{},[2027,2445,2446],{},"Invalid argument types passed to non-format I\u002FO function",[39,2448,2449],{},"FIO47-C – EXP37-C =",[2024,2451,2452],{},[2027,2453,2454],{},"Invalid format string, but correctly matches arguments in number and type",[39,2456,2457],{},"EXP37-C = Union( CWE-685, CWE-686)",[39,2459,2460],{},"Intersection( CWE-685, CWE-686) = Ø",[1554,2462,2464],{"id":2463},"cwe-628-and-exp37-c","CWE-628 and EXP37-C",[39,2466,2467],{},"CWE-628 = Union( EXP37-C, list) where list =",[2024,2469,2470,2473],{},[2027,2471,2472],{},"Improper ordering of function arguments (that does not violate argument types)",[2027,2474,2475],{},"Wrong argument values or references",[123,2477,2479],{"id":2478},"bibliography","Bibliography",[52,2481,2482,2490],{},[55,2483,2484],{},[58,2485,2486,2488],{},[61,2487],{},[61,2489],{},[66,2491,2492,2506,2517,2526,2536],{},[58,2493,2494,2501],{},[71,2495,2496,2497,674],{},"[ ",[46,2498,2500],{"href":2499},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-CVE","CVE",[71,2502,2503],{},[46,2504,1315],{"href":1312,"rel":2505},[1314],[58,2507,2508,2514],{},[71,2509,2496,2510,674],{},[46,2511,2513],{"href":2512},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-ISO-IEC9899-2011","ISO\u002FIEC 9899:2011",[71,2515,2516],{},"6.5.2.2, \"Function Calls\"",[58,2518,2519,2523],{},[71,2520,2496,2521,674],{},[46,2522,673],{"href":672},[71,2524,2525],{},"6.3.2.3, \"Pointers\"",[58,2527,2528,2532],{},[71,2529,2496,2530,674],{},[46,2531,1249],{"href":1248},[71,2533,2534],{},[131,2535,1244],{},[58,2537,2538,2544],{},[71,2539,2496,2540,674],{},[46,2541,2543],{"href":2542},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography#AA.Bibliography-Spinellis06","Spinellis 2006",[71,2545,2546],{},"Section 2.6.1, \"Incorrect Routine or Arguments\"",[2548,2549],"hr",{},[39,2551,2552,2559,2560,2559,2566],{},[46,2553,2555],{"href":2554},"\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp36-c",[2556,2557],"img",{"src":2558},"\u002Fattachments\u002F87152044\u002F88034188.png"," ",[46,2561,2563],{"href":2562},"\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002F",[2556,2564],{"src":2565},"\u002Fattachments\u002F87152044\u002F88034190.png",[46,2567,2569],{"href":2568},"\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp39-c",[2556,2570],{"src":2571},"\u002Fattachments\u002F87152044\u002F88034189.png",[2573,2574,2575],"style",{},"html pre.shiki code .sC2Qs, html code.shiki .sC2Qs{--shiki-default:#D73A49;--shiki-dark:#F97583;--shiki-sepia:#F92672}html pre.shiki code .sstjo, html code.shiki .sstjo{--shiki-default:#032F62;--shiki-dark:#9ECBFF;--shiki-sepia:#E6DB74}html pre.shiki code .sMOD_, html code.shiki .sMOD_{--shiki-default:#24292E;--shiki-dark:#E1E4E8;--shiki-sepia:#F8F8F2}html pre.shiki code .sq6CD, html code.shiki .sq6CD{--shiki-default:#D73A49;--shiki-default-font-style:inherit;--shiki-dark:#F97583;--shiki-dark-font-style:inherit;--shiki-sepia:#66D9EF;--shiki-sepia-font-style:italic}html pre.shiki code .srTi1, html code.shiki .srTi1{--shiki-default:#6F42C1;--shiki-dark:#B392F0;--shiki-sepia:#A6E22E}html pre.shiki code .s7F3e, html code.shiki .s7F3e{--shiki-default:#005CC5;--shiki-dark:#79B8FF;--shiki-sepia:#AE81FF}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html .sepia .shiki span {color: var(--shiki-sepia);background: var(--shiki-sepia-bg);font-style: var(--shiki-sepia-font-style);font-weight: var(--shiki-sepia-font-weight);text-decoration: var(--shiki-sepia-text-decoration);}html.sepia .shiki span {color: var(--shiki-sepia);background: var(--shiki-sepia-bg);font-style: var(--shiki-sepia-font-style);font-weight: var(--shiki-sepia-font-weight);text-decoration: var(--shiki-sepia-text-decoration);}html pre.shiki code .s8-w5, html code.shiki .s8-w5{--shiki-default:#6A737D;--shiki-dark:#6A737D;--shiki-sepia:#88846F}html pre.shiki code .sTHNf, html code.shiki .sTHNf{--shiki-default:#E36209;--shiki-default-font-style:inherit;--shiki-dark:#FFAB70;--shiki-dark-font-style:inherit;--shiki-sepia:#FD971F;--shiki-sepia-font-style:italic}",{"title":386,"searchDepth":404,"depth":404,"links":2577},[2578,2579,2580,2581,2582,2583,2584,2585,2586,2587,2590,2591,2592,2597],{"id":125,"depth":404,"text":126},{"id":480,"depth":404,"text":481},{"id":582,"depth":404,"text":583},{"id":658,"depth":404,"text":126},{"id":833,"depth":404,"text":834},{"id":974,"depth":404,"text":126},{"id":1105,"depth":404,"text":834},{"id":1237,"depth":404,"text":1238},{"id":1360,"depth":404,"text":1361},{"id":1483,"depth":404,"text":1484,"children":2588},[2589],{"id":1556,"depth":411,"text":1557},{"id":2250,"depth":404,"text":2251},{"id":2266,"depth":404,"text":2267},{"id":2412,"depth":404,"text":2413,"children":2593},[2594,2595,2596],{"id":2422,"depth":411,"text":2423},{"id":2429,"depth":411,"text":2430},{"id":2463,"depth":411,"text":2464},{"id":2478,"depth":404,"text":2479},"md",{"tags":2600},[2601,2602,2603,2604,2605,2606,2607,2608,2609,2610],"in-cpp","cwe-628","nptc","compass\u002Frose","nptc-wpa","exp","gcc","rose-partial","rule","android-applicable","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp37-c",{"title":30,"description":41},"4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F08.exp37-c","JL6aoFo5F7thYM2jj281amVIaLc8T7c2CKuCXedGz3w",[2616,2619],{"title":2617,"path":2554,"stem":2618,"children":-1},"EXP36-C. Do not cast pointers into more strictly aligned pointer types","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F07.exp36-c",{"title":2620,"path":2568,"stem":2621,"children":-1},"EXP39-C. Do not access a variable through a pointer of an incompatible type","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F09.exp39-c",[2623],{"title":2624,"path":2625,"stem":2626,"children":2627},"SEI CERT C Coding Standard","\u002Fsei-cert-c-coding-standard","4.sei-cert-c-coding-standard\u002F01.index",[2628,2629,2701,3280,3542,3556,3560,3564,3568,4377],{"title":2624,"path":2625,"stem":2626},{"title":2630,"path":2631,"stem":2632,"children":2633},"Front Matter","\u002Fsei-cert-c-coding-standard\u002Ffront-matter","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F1.index",[2634,2635],{"title":2630,"path":2631,"stem":2632},{"title":2636,"path":2637,"stem":2638,"children":2639},"Introduction","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F01.index",[2640,2641,2645,2649,2653,2657,2661,2665,2669,2673,2677,2681,2685,2689,2693,2697],{"title":2636,"path":2637,"stem":2638},{"title":2642,"path":2643,"stem":2644},"Scope","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fscope","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F01.scope",{"title":2646,"path":2647,"stem":2648},"Audience","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Faudience","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F02.audience",{"title":2650,"path":2651,"stem":2652},"How this Coding Standard is Organized","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fhow-this-coding-standard-is-organized","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F03.how-this-coding-standard-is-organized",{"title":2654,"path":2655,"stem":2656},"History","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fhistory","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F04.history",{"title":2658,"path":2659,"stem":2660},"ISO\u002FIEC TS 17961 C Secure Coding Rules","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fisoiec-ts-17961-c-secure-coding-rules","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F05.isoiec-ts-17961-c-secure-coding-rules",{"title":2662,"path":2663,"stem":2664},"Tool Selection and Validation","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Ftool-selection-and-validation","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F06.tool-selection-and-validation",{"title":2666,"path":2667,"stem":2668},"Taint Analysis","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Ftaint-analysis","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F07.taint-analysis",{"title":2670,"path":2671,"stem":2672},"Rules versus Recommendations","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Frules-versus-recommendations","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F08.rules-versus-recommendations",{"title":2674,"path":2675,"stem":2676},"Conformance Testing","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fconformance-testing","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F09.conformance-testing",{"title":2678,"path":2679,"stem":2680},"Development Process","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fdevelopment-process","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F10.development-process",{"title":2682,"path":2683,"stem":2684},"Usage","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fusage","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F11.usage",{"title":2686,"path":2687,"stem":2688},"System Qualities","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fsystem-qualities","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F12.system-qualities",{"title":2690,"path":2691,"stem":2692},"Automatically Generated Code","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fautomatically-generated-code","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F13.automatically-generated-code",{"title":2694,"path":2695,"stem":2696},"Government Regulations","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fgovernment-regulations","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F14.government-regulations",{"title":2698,"path":2699,"stem":2700},"Acknowledgments","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Facknowledgments","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F15.acknowledgments",{"title":2702,"path":2703,"stem":2704,"children":2705},"Rules","\u002Fsei-cert-c-coding-standard\u002Frules","4.sei-cert-c-coding-standard\u002F03.rules\u002F01.index",[2706,2707,2711,2741,2771,2833,2869,2895,2917,2974,3000,3058,3092,3122,3132,3170,3240,3258],{"title":2702,"path":2703,"stem":2704},{"title":2708,"path":2709,"stem":2710},"Application Programming Interfaces (API)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fapplication-programming-interfaces-api","4.sei-cert-c-coding-standard\u002F03.rules\u002F02.application-programming-interfaces-api",{"title":2712,"path":2713,"stem":2714,"children":2715},"Arrays (ARR)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F1.index",[2716,2717,2721,2725,2729,2733,2737],{"title":2712,"path":2713,"stem":2714},{"title":2718,"path":2719,"stem":2720},"ARR30-C. Do not form or use out-of-bounds pointers or array subscripts","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F2.arr30-c",{"title":2722,"path":2723,"stem":2724},"ARR32-C. Ensure size arguments for variable length arrays are in a valid range","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F3.arr32-c",{"title":2726,"path":2727,"stem":2728},"ARR36-C. Do not subtract or compare two pointers that do not refer to the same array","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F4.arr36-c",{"title":2730,"path":2731,"stem":2732},"ARR37-C. Do not add or subtract an integer to a pointer to a non-array object","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F5.arr37-c",{"title":2734,"path":2735,"stem":2736},"ARR38-C. Guarantee that library functions do not form invalid pointers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F6.arr38-c",{"title":2738,"path":2739,"stem":2740},"ARR39-C. Do not add or subtract a scaled integer to a pointer","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F7.arr39-c",{"title":2742,"path":2743,"stem":2744,"children":2745},"Characters and Strings (STR)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F1.index",[2746,2747,2751,2755,2759,2763,2767],{"title":2742,"path":2743,"stem":2744},{"title":2748,"path":2749,"stem":2750},"STR30-C. Do not attempt to modify string literals","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F2.str30-c",{"title":2752,"path":2753,"stem":2754},"STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F3.str31-c",{"title":2756,"path":2757,"stem":2758},"STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F4.str32-c",{"title":2760,"path":2761,"stem":2762},"STR34-C. Cast characters to unsigned char before converting to larger integer sizes","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F5.str34-c",{"title":2764,"path":2765,"stem":2766},"STR37-C. Arguments to character-handling functions must be representable as an unsigned char","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F6.str37-c",{"title":2768,"path":2769,"stem":2770},"STR38-C. Do not confuse narrow and wide character strings and functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F7.str38-c",{"title":2772,"path":2773,"stem":2774,"children":2775},"Concurrency (CON)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F01.index",[2776,2777,2781,2785,2789,2793,2797,2801,2805,2809,2813,2817,2821,2825,2829],{"title":2772,"path":2773,"stem":2774},{"title":2778,"path":2779,"stem":2780},"CON30-C. Clean up thread-specific storage","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F02.con30-c",{"title":2782,"path":2783,"stem":2784},"CON31-C. Do not destroy a mutex while it is locked","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F03.con31-c",{"title":2786,"path":2787,"stem":2788},"CON32-C. Prevent data races when accessing bit-fields from multiple threads","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F04.con32-c",{"title":2790,"path":2791,"stem":2792},"CON33-C. Avoid race conditions when using library functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F05.con33-c",{"title":2794,"path":2795,"stem":2796},"CON34-C. Declare objects shared between threads with appropriate storage durations","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F06.con34-c",{"title":2798,"path":2799,"stem":2800},"CON35-C. Avoid deadlock by locking in a predefined order","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F07.con35-c",{"title":2802,"path":2803,"stem":2804},"CON36-C. Wrap functions that can spuriously wake up in a loop","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F08.con36-c",{"title":2806,"path":2807,"stem":2808},"CON37-C. Do not call signal() in a multithreaded program","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F09.con37-c",{"title":2810,"path":2811,"stem":2812},"CON38-C. Preserve thread safety and liveness when using condition variables","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F10.con38-c",{"title":2814,"path":2815,"stem":2816},"CON39-C. Do not join or detach a thread that was previously joined or detached","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F11.con39-c",{"title":2818,"path":2819,"stem":2820},"CON40-C. Do not refer to an atomic variable twice in an expression","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F12.con40-c",{"title":2822,"path":2823,"stem":2824},"CON41-C. Wrap functions that can fail spuriously in a loop","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon41-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F13.con41-c",{"title":2826,"path":2827,"stem":2828},"CON42-C. Don't allow attackers to influence environment variables that control concurrency parameters","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon42-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F14.con42-c",{"title":2830,"path":2831,"stem":2832},"CON43-C. Do not allow data races in multithreaded code","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon43-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F15.con43-c",{"title":2834,"path":2835,"stem":2836,"children":2837},"Declarations and Initialization (DCL)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F1.index",[2838,2839,2843,2847,2851,2855,2859,2863,2865],{"title":2834,"path":2835,"stem":2836},{"title":2840,"path":2841,"stem":2842},"DCL30-C. Declare objects with appropriate storage durations","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F2.dcl30-c",{"title":2844,"path":2845,"stem":2846},"DCL31-C. Declare identifiers before using them","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F3.dcl31-c",{"title":2848,"path":2849,"stem":2850},"DCL36-C. Do not declare an identifier with conflicting linkage classifications","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F4.dcl36-c",{"title":2852,"path":2853,"stem":2854},"DCL37-C. Do not declare or define a reserved identifier","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F5.dcl37-c",{"title":2856,"path":2857,"stem":2858},"DCL38-C. Use the correct syntax when declaring a flexible array member","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F6.dcl38-c",{"title":2860,"path":2861,"stem":2862},"DCL39-C. Avoid information leakage when passing a structure across a trust boundary","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F7.dcl39-c",{"title":110,"path":109,"stem":2864},"4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F8.dcl40-c",{"title":2866,"path":2867,"stem":2868},"DCL41-C. Do not declare variables inside a switch statement before the first case label","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl41-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F9.dcl41-c",{"title":2870,"path":2871,"stem":2872,"children":2873},"Environment (ENV)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F1.index",[2874,2875,2879,2883,2887,2891],{"title":2870,"path":2871,"stem":2872},{"title":2876,"path":2877,"stem":2878},"ENV30-C. Do not modify the object referenced by the return value of certain functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F2.env30-c",{"title":2880,"path":2881,"stem":2882},"ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F3.env31-c",{"title":2884,"path":2885,"stem":2886},"ENV32-C. All exit handlers must return normally","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F4.env32-c",{"title":2888,"path":2889,"stem":2890},"ENV33-C. Do not call system()","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F5.env33-c",{"title":2892,"path":2893,"stem":2894},"ENV34-C. Do not store pointers returned by certain functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F6.env34-c",{"title":2896,"path":2897,"stem":2898,"children":2899},"Error Handling (ERR)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F1.index",[2900,2901,2905,2909,2913],{"title":2896,"path":2897,"stem":2898},{"title":2902,"path":2903,"stem":2904},"ERR30-C. Take care when reading errno","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F2.err30-c",{"title":2906,"path":2907,"stem":2908},"ERR32-C. Do not rely on indeterminate values of errno","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F3.err32-c",{"title":2910,"path":2911,"stem":2912},"ERR33-C. Detect and handle standard library errors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F4.err33-c",{"title":2914,"path":2915,"stem":2916},"ERR34-C. Detect errors when converting a string to a number","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F5.err34-c",{"title":2918,"path":2919,"stem":2920,"children":2921},"Expressions (EXP)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F01.index",[2922,2923,2927,2931,2935,2939,2943,2944,2945,2946,2950,2954,2958,2962,2966,2970],{"title":2918,"path":2919,"stem":2920},{"title":2924,"path":2925,"stem":2926},"EXP30-C. Do not depend on the order of evaluation for side effects","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F02.exp30-c",{"title":2928,"path":2929,"stem":2930},"EXP32-C. Do not access a volatile object through a nonvolatile reference","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F03.exp32-c",{"title":2932,"path":2933,"stem":2934},"EXP33-C. Do not read uninitialized memory","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F04.exp33-c",{"title":2936,"path":2937,"stem":2938},"EXP34-C. Do not dereference null pointers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F05.exp34-c",{"title":2940,"path":2941,"stem":2942},"EXP35-C. Do not modify objects with temporary lifetime","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F06.exp35-c",{"title":2617,"path":2554,"stem":2618},{"title":30,"path":2611,"stem":2613},{"title":2620,"path":2568,"stem":2621},{"title":2947,"path":2948,"stem":2949},"EXP40-C. Do not modify constant objects","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F10.exp40-c",{"title":2951,"path":2952,"stem":2953},"EXP42-C. Do not compare padding data","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp42-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F11.exp42-c",{"title":2955,"path":2956,"stem":2957},"EXP43-C. Avoid undefined behavior when using restrict-qualified pointers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp43-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F12.exp43-c",{"title":2959,"path":2960,"stem":2961},"EXP44-C. Do not rely on side effects in operands to sizeof, _Alignof, or _Generic","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp44-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F13.exp44-c",{"title":2963,"path":2964,"stem":2965},"EXP45-C. Do not perform assignments in selection statements","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp45-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F14.exp45-c",{"title":2967,"path":2968,"stem":2969},"EXP46-C. Do not use a bitwise operator with a Boolean-like operand","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp46-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F15.exp46-c",{"title":2971,"path":2972,"stem":2973},"EXP47-C. Do not call va_arg with an argument of the incorrect type","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp47-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F16.exp47-c",{"title":2975,"path":2976,"stem":2977,"children":2978},"Floating Point (FLP)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F1.index",[2979,2980,2984,2988,2992,2996],{"title":2975,"path":2976,"stem":2977},{"title":2981,"path":2982,"stem":2983},"FLP30-C. Do not use floating-point variables as loop counters","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F2.flp30-c",{"title":2985,"path":2986,"stem":2987},"FLP32-C. Prevent or detect domain and range errors in math functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F3.flp32-c",{"title":2989,"path":2990,"stem":2991},"FLP34-C. Ensure that floating-point conversions are within range of the new type","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F4.flp34-c",{"title":2993,"path":2994,"stem":2995},"FLP36-C. Preserve precision when converting integral values to floating-point type","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F5.flp36-c",{"title":2997,"path":2998,"stem":2999},"FLP37-C. Do not use object representations to compare floating-point values","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F6.flp37-c",{"title":3001,"path":3002,"stem":3003,"children":3004},"Input Output (FIO)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F01.index",[3005,3006,3010,3014,3018,3022,3026,3030,3034,3038,3042,3046,3050,3054],{"title":3001,"path":3002,"stem":3003},{"title":3007,"path":3008,"stem":3009},"FIO30-C. Exclude user input from format strings","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F02.fio30-c",{"title":3011,"path":3012,"stem":3013},"FIO32-C. Do not perform operations on devices that are only appropriate for files","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F03.fio32-c",{"title":3015,"path":3016,"stem":3017},"FIO34-C. Distinguish between characters read from a file and EOF or WEOF","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F04.fio34-c",{"title":3019,"path":3020,"stem":3021},"FIO37-C. Do not assume that fgets() or fgetws() returns a nonempty string when successful","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F05.fio37-c",{"title":3023,"path":3024,"stem":3025},"FIO38-C. Do not copy a FILE object","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F06.fio38-c",{"title":3027,"path":3028,"stem":3029},"FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F07.fio39-c",{"title":3031,"path":3032,"stem":3033},"FIO40-C. Reset strings on fgets() or fgetws() failure","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F08.fio40-c",{"title":3035,"path":3036,"stem":3037},"FIO41-C. Do not call getc(), putc(), getwc(), or putwc() with a stream argument that has side effects","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio41-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F09.fio41-c",{"title":3039,"path":3040,"stem":3041},"FIO42-C. Close files when they are no longer needed","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio42-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F10.fio42-c",{"title":3043,"path":3044,"stem":3045},"FIO44-C. Only use values for fsetpos() that are returned from fgetpos()","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio44-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F11.fio44-c",{"title":3047,"path":3048,"stem":3049},"FIO45-C. Avoid TOCTOU race conditions while accessing files","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio45-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F12.fio45-c",{"title":3051,"path":3052,"stem":3053},"FIO46-C. Do not access a closed file","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio46-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F13.fio46-c",{"title":3055,"path":3056,"stem":3057},"FIO47-C. Use valid format strings","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio47-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F14.fio47-c",{"title":3059,"path":3060,"stem":3061,"children":3062},"Integers (INT)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F1.index",[3063,3064,3068,3072,3076,3080,3084,3088],{"title":3059,"path":3060,"stem":3061},{"title":3065,"path":3066,"stem":3067},"INT30-C. Ensure that unsigned integer operations do not wrap","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F2.int30-c",{"title":3069,"path":3070,"stem":3071},"INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F3.int31-c",{"title":3073,"path":3074,"stem":3075},"INT32-C. Ensure that operations on signed integers do not result in overflow","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F4.int32-c",{"title":3077,"path":3078,"stem":3079},"INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F5.int33-c",{"title":3081,"path":3082,"stem":3083},"INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F6.int34-c",{"title":3085,"path":3086,"stem":3087},"INT35-C. Use correct integer precisions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F7.int35-c",{"title":3089,"path":3090,"stem":3091},"INT36-C. Converting a pointer to integer or integer to pointer","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F8.int36-c",{"title":3093,"path":3094,"stem":3095,"children":3096},"Memory Management (MEM)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F1.index",[3097,3098,3102,3106,3110,3114,3118],{"title":3093,"path":3094,"stem":3095},{"title":3099,"path":3100,"stem":3101},"MEM30-C. Do not access freed memory","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F2.mem30-c",{"title":3103,"path":3104,"stem":3105},"MEM31-C. Free dynamically allocated memory when no longer needed","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F3.mem31-c",{"title":3107,"path":3108,"stem":3109},"MEM33-C. Allocate and copy structures containing a flexible array member dynamically","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F4.mem33-c",{"title":3111,"path":3112,"stem":3113},"MEM34-C. Only free memory allocated dynamically","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F5.mem34-c",{"title":3115,"path":3116,"stem":3117},"MEM35-C. Allocate sufficient memory for an object","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F6.mem35-c",{"title":3119,"path":3120,"stem":3121},"MEM36-C. Do not modify the alignment of objects by calling realloc()","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F7.mem36-c",{"title":3123,"path":3124,"stem":3125,"children":3126},"Microsoft Windows (WIN)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmicrosoft-windows-win","4.sei-cert-c-coding-standard\u002F03.rules\u002F14.microsoft-windows-win\u002F1.index",[3127,3128],{"title":3123,"path":3124,"stem":3125},{"title":3129,"path":3130,"stem":3131},"WIN30-C. Properly pair allocation and deallocation functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmicrosoft-windows-win\u002Fwin30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F14.microsoft-windows-win\u002F2.win30-c",{"title":3133,"path":3134,"stem":3135,"children":3136},"Miscellaneous (MSC)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F1.index",[3137,3138,3142,3146,3150,3154,3158,3162,3166],{"title":3133,"path":3134,"stem":3135},{"title":3139,"path":3140,"stem":3141},"MSC30-C. Do not use the rand() function for generating pseudorandom numbers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F2.msc30-c",{"title":3143,"path":3144,"stem":3145},"MSC32-C. Properly seed pseudorandom number generators","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F3.msc32-c",{"title":3147,"path":3148,"stem":3149},"MSC33-C. Do not pass invalid data to the asctime() function","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F4.msc33-c",{"title":3151,"path":3152,"stem":3153},"MSC37-C. Ensure that control never reaches the end of a non-void function","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F5.msc37-c",{"title":3155,"path":3156,"stem":3157},"MSC38-C. Do not treat a predefined identifier as an object if it might only be implemented as a macro","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F6.msc38-c",{"title":3159,"path":3160,"stem":3161},"MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F7.msc39-c",{"title":3163,"path":3164,"stem":3165},"MSC40-C. Do not violate constraints","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F8.msc40-c",{"title":3167,"path":3168,"stem":3169},"MSC41-C. Never hard code sensitive information","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc41-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F9.msc41-c",{"title":3171,"path":3172,"stem":3173,"children":3174},"POSIX (POS)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F01.index",[3175,3176,3180,3184,3188,3192,3196,3200,3204,3208,3212,3216,3220,3224,3228,3232,3236],{"title":3171,"path":3172,"stem":3173},{"title":3177,"path":3178,"stem":3179},"POS30-C. Use the readlink() function properly","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F02.pos30-c",{"title":3181,"path":3182,"stem":3183},"POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F03.pos34-c",{"title":3185,"path":3186,"stem":3187},"POS35-C. Avoid race conditions while checking for the existence of a symbolic link","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F04.pos35-c",{"title":3189,"path":3190,"stem":3191},"POS36-C. Observe correct revocation order while relinquishing privileges","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F05.pos36-c",{"title":3193,"path":3194,"stem":3195},"POS37-C. Ensure that privilege relinquishment is successful","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F06.pos37-c",{"title":3197,"path":3198,"stem":3199},"POS38-C. Beware of race conditions when using fork and file descriptors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F07.pos38-c",{"title":3201,"path":3202,"stem":3203},"POS39-C. Use the correct byte ordering when transferring data between systems","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F08.pos39-c",{"title":3205,"path":3206,"stem":3207},"POS44-C. Do not use signals to terminate threads","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos44-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F09.pos44-c",{"title":3209,"path":3210,"stem":3211},"POS47-C. Do not use threads that can be canceled asynchronously","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos47-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F10.pos47-c",{"title":3213,"path":3214,"stem":3215},"POS48-C. Do not unlock or destroy another POSIX thread's mutex","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos48-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F11.pos48-c",{"title":3217,"path":3218,"stem":3219},"POS49-C. When data must be accessed by multiple threads, provide a mutex and guarantee no adjacent data is also accessed","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos49-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F12.pos49-c",{"title":3221,"path":3222,"stem":3223},"POS50-C. Declare objects shared between POSIX threads with appropriate storage durations","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos50-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F13.pos50-c",{"title":3225,"path":3226,"stem":3227},"POS51-C. Avoid deadlock with POSIX threads by locking in predefined order","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos51-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F14.pos51-c",{"title":3229,"path":3230,"stem":3231},"POS52-C. Do not perform operations that can block while holding a POSIX lock","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos52-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F15.pos52-c",{"title":3233,"path":3234,"stem":3235},"POS53-C. Do not use more than one mutex for concurrent waiting operations on a condition variable","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos53-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F16.pos53-c",{"title":3237,"path":3238,"stem":3239},"POS54-C. Detect and handle POSIX library errors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos54-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F17.pos54-c",{"title":3241,"path":3242,"stem":3243,"children":3244},"Preprocessor (PRE)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F1.index",[3245,3246,3250,3254],{"title":3241,"path":3242,"stem":3243},{"title":3247,"path":3248,"stem":3249},"PRE30-C. Do not create a universal character name through concatenation","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre\u002Fpre30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F2.pre30-c",{"title":3251,"path":3252,"stem":3253},"PRE31-C. Avoid side effects in arguments to unsafe macros","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre\u002Fpre31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F3.pre31-c",{"title":3255,"path":3256,"stem":3257},"PRE32-C. Do not use preprocessor directives in invocations of function-like macros","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre\u002Fpre32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F4.pre32-c",{"title":3259,"path":3260,"stem":3261,"children":3262},"Signals (SIG)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F1.index",[3263,3264,3268,3272,3276],{"title":3259,"path":3260,"stem":3261},{"title":3265,"path":3266,"stem":3267},"SIG30-C. Call only asynchronous-safe functions within signal handlers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F2.sig30-c",{"title":3269,"path":3270,"stem":3271},"SIG31-C. Do not access shared objects in signal handlers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F3.sig31-c",{"title":3273,"path":3274,"stem":3275},"SIG34-C. Do not call signal() from within interruptible signal handlers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F4.sig34-c",{"title":3277,"path":3278,"stem":3279},"SIG35-C. Do not return from a computational exception signal handler","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F5.sig35-c",{"title":3281,"path":3282,"stem":3283,"children":3284},"Back Matter","\u002Fsei-cert-c-coding-standard\u002Fback-matter","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F1.index",[3285,3286,3290,3294,3298,3302,3481,3538],{"title":3281,"path":3282,"stem":3283},{"title":3287,"path":3288,"stem":3289},"AA. Bibliography","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F2.aa-bibliography",{"title":3291,"path":3292,"stem":3293},"BB. Definitions","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fbb-definitions","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F3.bb-definitions",{"title":3295,"path":3296,"stem":3297},"CC. Undefined Behavior","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fcc-undefined-behavior","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F4.cc-undefined-behavior",{"title":3299,"path":3300,"stem":3301},"DD. Unspecified Behavior","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fdd-unspecified-behavior","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F5.dd-unspecified-behavior",{"title":3303,"path":3304,"stem":3305,"children":3306},"EE. Analyzers","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F01.index",[3307,3308,3310,3314,3316,3320,3324,3328,3332,3336,3340,3344,3348,3350,3354,3356,3360,3364,3366,3370,3374,3376,3380,3382,3386,3388,3392,3394,3398,3400,3404,3407,3411,3414,3418,3422,3426,3428,3432,3434,3438,3441,3445,3449,3451,3455,3457,3461,3463,3467,3471,3475,3477],{"title":3303,"path":3304,"stem":3305},{"title":1604,"path":1603,"stem":3309},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F02.astree",{"title":3311,"path":3312,"stem":3313},"Astrée_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fastree_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F03.astree_v",{"title":1646,"path":1645,"stem":3315},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F04.axivion-bauhaus-suite",{"title":3317,"path":3318,"stem":3319},"Axivion Bauhaus Suite_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Faxivion-bauhaus-suite_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F05.axivion-bauhaus-suite_v",{"title":3321,"path":3322,"stem":3323},"Clang","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F06.clang",{"title":3325,"path":3326,"stem":3327},"Clang_38_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_38_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F07.clang_38_v",{"title":3329,"path":3330,"stem":3331},"Clang_39_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_39_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F08.clang_39_v",{"title":3333,"path":3334,"stem":3335},"Clang_40_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_40_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F09.clang_40_v",{"title":3337,"path":3338,"stem":3339},"Clang_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F10.clang_v",{"title":3341,"path":3342,"stem":3343},"Codee","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodee","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F11.codee",{"title":3345,"path":3346,"stem":3347},"Codee_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodee_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F12.codee_v",{"title":1672,"path":1671,"stem":3349},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F13.codesonar",{"title":3351,"path":3352,"stem":3353},"CodeSonar_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodesonar_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F14.codesonar_v",{"title":1729,"path":1728,"stem":3355},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F15.coverity",{"title":3357,"path":3358,"stem":3359},"Coverity_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcoverity_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F16.coverity_v",{"title":3361,"path":3362,"stem":3363},"Cppcheck","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F17.cppcheck",{"title":1766,"path":1765,"stem":3365},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F18.cppcheck-premium",{"title":3367,"path":3368,"stem":3369},"Cppcheck Premium_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck-premium_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F19.cppcheck-premium_v",{"title":3371,"path":3372,"stem":3373},"Cppcheck_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F20.cppcheck_v",{"title":1794,"path":1793,"stem":3375},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F21.eclair",{"title":3377,"path":3378,"stem":3379},"ECLAIR_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Feclair_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F22.eclair_v",{"title":1823,"path":1822,"stem":3381},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F23.edg",{"title":3383,"path":3384,"stem":3385},"EDG_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fedg_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F24.edg_v",{"title":1844,"path":1843,"stem":3387},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F25.gcc",{"title":3389,"path":3390,"stem":3391},"GCC_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fgcc_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F26.gcc_v",{"title":1875,"path":1874,"stem":3393},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F27.helix-qac",{"title":3395,"path":3396,"stem":3397},"Helix QAC_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fhelix-qac_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F28.helix-qac_v",{"title":1908,"path":1907,"stem":3399},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F29.klocwork",{"title":3401,"path":3402,"stem":3403},"Klocwork_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fklocwork_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F30.klocwork_v",{"title":3405,"path":1930,"stem":3406},"LDRA","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F31.ldra",{"title":3408,"path":3409,"stem":3410},"LDRA_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fldra_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F32.ldra_v",{"title":3412,"path":1956,"stem":3413},"Parasoft","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F33.parasoft",{"title":3415,"path":3416,"stem":3417},"Parasoft_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fparasoft_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F34.parasoft_v",{"title":3419,"path":3420,"stem":3421},"PC-lint Plus","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpc-lint-plus","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F35.pc-lint-plus",{"title":3423,"path":3424,"stem":3425},"PC-lint Plus_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpc-lint-plus_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F36.pc-lint-plus_v",{"title":2001,"path":2000,"stem":3427},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F37.polyspace-bug-finder",{"title":3429,"path":3430,"stem":3431},"Polyspace Bug Finder_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpolyspace-bug-finder_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F38.polyspace-bug-finder_v",{"title":2050,"path":2049,"stem":3433},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F39.pvs-studio",{"title":3435,"path":3436,"stem":3437},"PVS-Studio_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpvs-studio_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F40.pvs-studio_v",{"title":3439,"path":1696,"stem":3440},"Rose","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F41.rose",{"title":3442,"path":3443,"stem":3444},"Rose_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frose_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F42.rose_v",{"title":3446,"path":3447,"stem":3448},"Rosecheckers Code","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frosecheckers-code","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F43.rosecheckers-code",{"title":2197,"path":2196,"stem":3450},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F44.rulechecker",{"title":3452,"path":3453,"stem":3454},"RuleChecker_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frulechecker_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F45.rulechecker_v",{"title":2146,"path":2145,"stem":3456},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F46.security-reviewer-static-reviewer",{"title":3458,"path":3459,"stem":3460},"Security Reviewer - Static Reviewer_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsecurity-reviewer-static-reviewer_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F47.security-reviewer-static-reviewer_v",{"title":2171,"path":2170,"stem":3462},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F48.sonarqube-ccpp-plugin",{"title":3464,"path":3465,"stem":3466},"SonarQube C\u002FC++ Plugin_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsonarqube-ccpp-plugin_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F49.sonarqube-ccpp-plugin_v",{"title":3468,"path":3469,"stem":3470},"Splint","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsplint","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F50.splint",{"title":3472,"path":3473,"stem":3474},"Splint_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsplint_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F51.splint_v",{"title":2226,"path":2225,"stem":3476},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F52.trustinsoft-analyzer",{"title":3478,"path":3479,"stem":3480},"TrustInSoft Analyzer_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Ftrustinsoft-analyzer_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F53.trustinsoft-analyzer_v",{"title":3482,"path":3483,"stem":3484,"children":3485},"FF. Related Guidelines","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F01.index",[3486,3487,3491,3495,3499,3503,3507,3511,3515,3519,3522,3526,3530,3534],{"title":3482,"path":3483,"stem":3484},{"title":3488,"path":3489,"stem":3490},"2003","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F02.2003","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F02.2003",{"title":3492,"path":3493,"stem":3494},"2006","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F03.2006","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F03.2006",{"title":3496,"path":3497,"stem":3498},"2007","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F04.2007","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F04.2007",{"title":3500,"path":3501,"stem":3502},"2008","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F05.2008","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F05.2008",{"title":3504,"path":3505,"stem":3506},"2010","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F06.2010","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F06.2010",{"title":3508,"path":3509,"stem":3510},"2011","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F07.2011","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F07.2011",{"title":3512,"path":3513,"stem":3514},"2012","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F08.2012","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F08.2012",{"title":3516,"path":3517,"stem":3518},"2013","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F09.2013","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F09.2013",{"title":3516,"path":3520,"stem":3521},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F10.2013","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F10.2013",{"title":3523,"path":3524,"stem":3525},"MITRE CWE","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F11.mitre-cwe",{"title":3527,"path":3528,"stem":3529},"MITRE CWE 2.11","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe-211","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F12.mitre-cwe-211",{"title":3531,"path":3532,"stem":3533},"MITRE CWE 3.1","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe-31","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F13.mitre-cwe-31",{"title":3535,"path":3536,"stem":3537},"MITRE CWE 3.11","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe-311","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F14.mitre-cwe-311",{"title":3539,"path":3540,"stem":3541},"GG. Risk Assessments","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fgg-risk-assessments","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F8.gg-risk-assessments",{"title":3543,"path":3544,"stem":3545,"children":3546},"Admin","\u002Fsei-cert-c-coding-standard\u002Fadmin","4.sei-cert-c-coding-standard\u002F05.admin\u002F1.index",[3547,3548,3552],{"title":3543,"path":3544,"stem":3545},{"title":3549,"path":3550,"stem":3551},"TODO List","\u002Fsei-cert-c-coding-standard\u002Fadmin\u002Ftodo-list","4.sei-cert-c-coding-standard\u002F05.admin\u002F2.todo-list",{"title":3553,"path":3554,"stem":3555},"Undefined and implementation-defined behaviors not deemed ruleworthy","\u002Fsei-cert-c-coding-standard\u002Fadmin\u002Fundefined-and-implementation-defined-behaviors-not-deemed-ruleworthy","4.sei-cert-c-coding-standard\u002F05.admin\u002F3.undefined-and-implementation-defined-behaviors-not-deemed-ruleworthy",{"title":3557,"path":3558,"stem":3559},"Coding Style Guidelines","\u002Fsei-cert-c-coding-standard\u002Fcoding-style-guidelines","4.sei-cert-c-coding-standard\u002F05.coding-style-guidelines",{"title":3561,"path":3562,"stem":3563},"Errata for SEI CERT C Coding Standard (2016 Edition)","\u002Fsei-cert-c-coding-standard\u002Ferrata-for-sei-cert-c-coding-standard-2016-edition","4.sei-cert-c-coding-standard\u002F06.errata-for-sei-cert-c-coding-standard-2016-edition",{"title":3565,"path":3566,"stem":3567},"Wiki Contents","\u002Fsei-cert-c-coding-standard\u002Fwiki-contents","4.sei-cert-c-coding-standard\u002F06.wiki-contents",{"title":3569,"path":3570,"stem":3571,"children":3572},"Recommendations","\u002Fsei-cert-c-coding-standard\u002Frecommendations","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F01.index",[3573,3574,3615,3632,3677,3718,3813,3830,3863,3932,3969,4052,4117,4166,4191,4282,4303,4360],{"title":3569,"path":3570,"stem":3571},{"title":2708,"path":3575,"stem":3576,"children":3577},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F01.index",[3578,3579,3583,3587,3591,3595,3599,3603,3607,3611],{"title":2708,"path":3575,"stem":3576},{"title":3580,"path":3581,"stem":3582},"API00-C. Functions should validate their parameters","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F02.api00-c",{"title":3584,"path":3585,"stem":3586},"API01-C. Avoid laying out strings in memory directly before sensitive data","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F03.api01-c",{"title":3588,"path":3589,"stem":3590},"API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F04.api02-c",{"title":3592,"path":3593,"stem":3594},"API03-C. Create consistent interfaces and capabilities across related functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F05.api03-c",{"title":3596,"path":3597,"stem":3598},"API04-C. Provide a consistent and usable error-checking mechanism","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F06.api04-c",{"title":3600,"path":3601,"stem":3602},"API05-C. Use conformant array parameters","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F07.api05-c",{"title":3604,"path":3605,"stem":3606},"API07-C. Enforce type safety","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F08.api07-c",{"title":3608,"path":3609,"stem":3610},"API09-C. Compatible values should have the same type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F09.api09-c",{"title":3612,"path":3613,"stem":3614},"API10-C. APIs should have security options enabled by default","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F10.api10-c",{"title":2712,"path":3616,"stem":3617,"children":3618},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F1.index",[3619,3620,3624,3628],{"title":2712,"path":3616,"stem":3617},{"title":3621,"path":3622,"stem":3623},"ARR00-C. Understand how arrays work","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr\u002Farr00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F2.arr00-c",{"title":3625,"path":3626,"stem":3627},"ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr\u002Farr01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F3.arr01-c",{"title":3629,"path":3630,"stem":3631},"ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr\u002Farr02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F4.arr02-c",{"title":2742,"path":3633,"stem":3634,"children":3635},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F01.index",[3636,3637,3641,3645,3649,3653,3657,3661,3665,3669,3673],{"title":2742,"path":3633,"stem":3634},{"title":3638,"path":3639,"stem":3640},"STR00-C. Represent characters using an appropriate type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F02.str00-c",{"title":3642,"path":3643,"stem":3644},"STR01-C. Adopt and implement a consistent plan for managing strings","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F03.str01-c",{"title":3646,"path":3647,"stem":3648},"STR02-C. Sanitize data passed to complex subsystems","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F04.str02-c",{"title":3650,"path":3651,"stem":3652},"STR03-C. Do not inadvertently truncate a string","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F05.str03-c",{"title":3654,"path":3655,"stem":3656},"STR04-C. Use plain char for characters in the basic character set","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F06.str04-c",{"title":3658,"path":3659,"stem":3660},"STR05-C. Use pointers to const when referring to string literals","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F07.str05-c",{"title":3662,"path":3663,"stem":3664},"STR06-C. Do not assume that strtok() leaves the parse string unchanged","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F08.str06-c",{"title":3666,"path":3667,"stem":3668},"STR09-C. Don't assume numeric values for expressions with type plain character","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F09.str09-c",{"title":3670,"path":3671,"stem":3672},"STR10-C. Do not concatenate different type of string literals","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F10.str10-c",{"title":3674,"path":3675,"stem":3676},"STR11-C. Do not specify the bound of a character array initialized with a string literal","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F11.str11-c",{"title":2772,"path":3678,"stem":3679,"children":3680},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F01.index",[3681,3682,3686,3690,3694,3698,3702,3706,3710,3714],{"title":2772,"path":3678,"stem":3679},{"title":3683,"path":3684,"stem":3685},"CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F02.con01-c",{"title":3687,"path":3688,"stem":3689},"CON02-C. Do not use volatile as a synchronization primitive","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F03.con02-c",{"title":3691,"path":3692,"stem":3693},"CON03-C. Ensure visibility when accessing shared variables","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F04.con03-c",{"title":3695,"path":3696,"stem":3697},"CON04-C. Join or detach threads even if their exit status is unimportant","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F05.con04-c",{"title":3699,"path":3700,"stem":3701},"CON05-C. Do not perform operations that can block while holding a lock","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F06.con05-c",{"title":3703,"path":3704,"stem":3705},"CON06-C. Ensure that every mutex outlives the data it protects","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F07.con06-c",{"title":3707,"path":3708,"stem":3709},"CON07-C. Ensure that compound operations on shared variables are atomic","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F08.con07-c",{"title":3711,"path":3712,"stem":3713},"CON08-C. Do not assume that a group of calls to independently atomic methods is atomic","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F09.con08-c",{"title":3715,"path":3716,"stem":3717},"CON09-C. Avoid the ABA problem when using lock-free algorithms","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F10.con09-c",{"title":2834,"path":3719,"stem":3720,"children":3721},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F01.index",[3722,3723,3727,3731,3735,3739,3743,3747,3751,3753,3757,3761,3765,3769,3773,3777,3781,3785,3789,3793,3797,3801,3805,3809],{"title":2834,"path":3719,"stem":3720},{"title":3724,"path":3725,"stem":3726},"DCL00-C. Const-qualify immutable objects","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F02.dcl00-c",{"title":3728,"path":3729,"stem":3730},"DCL01-C. Do not reuse variable names in subscopes","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F03.dcl01-c",{"title":3732,"path":3733,"stem":3734},"DCL02-C. Use visually distinct identifiers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F04.dcl02-c",{"title":3736,"path":3737,"stem":3738},"DCL03-C. Use a static assertion to test the value of a constant expression","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F05.dcl03-c",{"title":3740,"path":3741,"stem":3742},"DCL04-C. Do not declare more than one variable per declaration","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F06.dcl04-c",{"title":3744,"path":3745,"stem":3746},"DCL05-C. Use typedefs of non-pointer types only","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F07.dcl05-c",{"title":3748,"path":3749,"stem":3750},"DCL06-C. Use meaningful symbolic constants to represent literal values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F08.dcl06-c",{"title":2312,"path":2311,"stem":3752},"4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F09.dcl07-c",{"title":3754,"path":3755,"stem":3756},"DCL08-C. Properly encode relationships in constant definitions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F10.dcl08-c",{"title":3758,"path":3759,"stem":3760},"DCL09-C. Declare functions that return errno with a return type of errno_t","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F11.dcl09-c",{"title":3762,"path":3763,"stem":3764},"DCL10-C. Maintain the contract between the writer and caller of variadic functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F12.dcl10-c",{"title":3766,"path":3767,"stem":3768},"DCL11-C. Understand the type issues associated with variadic functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F13.dcl11-c",{"title":3770,"path":3771,"stem":3772},"DCL12-C. Implement abstract data types using opaque types","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F14.dcl12-c",{"title":3774,"path":3775,"stem":3776},"DCL13-C. Declare function parameters that are pointers to values not changed by the function as const","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F15.dcl13-c",{"title":3778,"path":3779,"stem":3780},"DCL15-C. Declare file-scope objects or functions that do not need external linkage as static","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl15-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F16.dcl15-c",{"title":3782,"path":3783,"stem":3784},"DCL16-C. Use \"L,\" not \"l,\" to indicate a long value","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl16-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F17.dcl16-c",{"title":3786,"path":3787,"stem":3788},"DCL17-C. Beware of miscompiled volatile-qualified variables","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F18.dcl17-c",{"title":3790,"path":3791,"stem":3792},"DCL18-C. Do not begin integer constants with 0 when specifying a decimal value","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl18-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F19.dcl18-c",{"title":3794,"path":3795,"stem":3796},"DCL19-C. Minimize the scope of variables and functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F20.dcl19-c",{"title":3798,"path":3799,"stem":3800},"DCL20-C. Explicitly specify void when a function accepts no arguments","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F21.dcl20-c",{"title":3802,"path":3803,"stem":3804},"DCL21-C. Understand the storage of compound literals","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl21-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F22.dcl21-c",{"title":3806,"path":3807,"stem":3808},"DCL22-C. Use volatile for data that cannot be cached","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl22-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F23.dcl22-c",{"title":3810,"path":3811,"stem":3812},"DCL23-C. Guarantee that mutually visible identifiers are unique","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl23-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F24.dcl23-c",{"title":2870,"path":3814,"stem":3815,"children":3816},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F1.index",[3817,3818,3822,3826],{"title":2870,"path":3814,"stem":3815},{"title":3819,"path":3820,"stem":3821},"ENV01-C. Do not make assumptions about the size of an environment variable","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env\u002Fenv01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F2.env01-c",{"title":3823,"path":3824,"stem":3825},"ENV02-C. Beware of multiple environment variables with the same effective name","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env\u002Fenv02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F3.env02-c",{"title":3827,"path":3828,"stem":3829},"ENV03-C. Sanitize the environment when invoking external programs","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env\u002Fenv03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F4.env03-c",{"title":2896,"path":3831,"stem":3832,"children":3833},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F1.index",[3834,3835,3839,3843,3847,3851,3855,3859],{"title":2896,"path":3831,"stem":3832},{"title":3836,"path":3837,"stem":3838},"ERR00-C. Adopt and implement a consistent and comprehensive error-handling policy","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F2.err00-c",{"title":3840,"path":3841,"stem":3842},"ERR01-C. Use ferror() rather than errno to check for FILE stream errors","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F3.err01-c",{"title":3844,"path":3845,"stem":3846},"ERR02-C. Avoid in-band error indicators","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F4.err02-c",{"title":3848,"path":3849,"stem":3850},"ERR04-C. Choose an appropriate termination strategy","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F5.err04-c",{"title":3852,"path":3853,"stem":3854},"ERR05-C. Application-independent code should provide error detection without dictating error handling","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F6.err05-c",{"title":3856,"path":3857,"stem":3858},"ERR06-C. Understand the termination behavior of assert() and abort()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F7.err06-c",{"title":3860,"path":3861,"stem":3862},"ERR07-C. Prefer functions that support error checking over equivalent functions that don't","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F8.err07-c",{"title":2918,"path":3864,"stem":3865,"children":3866},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F01.index",[3867,3868,3872,3876,3880,3884,3888,3892,3896,3900,3904,3908,3912,3916,3920,3924,3928],{"title":2918,"path":3864,"stem":3865},{"title":3869,"path":3870,"stem":3871},"EXP00-C. Use parentheses for precedence of operation","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F02.exp00-c",{"title":3873,"path":3874,"stem":3875},"EXP02-C. Be aware of the short-circuit behavior of the logical AND and OR operators","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F03.exp02-c",{"title":3877,"path":3878,"stem":3879},"EXP03-C. Do not assume the size of a structure is the sum of the sizes of its members","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F04.exp03-c",{"title":3881,"path":3882,"stem":3883},"EXP05-C. Do not cast away a const qualification","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F05.exp05-c",{"title":3885,"path":3886,"stem":3887},"EXP07-C. Do not diminish the benefits of constants by assuming their values in expressions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F06.exp07-c",{"title":3889,"path":3890,"stem":3891},"EXP08-C. Ensure pointer arithmetic is used correctly","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F07.exp08-c",{"title":3893,"path":3894,"stem":3895},"EXP09-C. Use sizeof to determine the size of a type or variable","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F08.exp09-c",{"title":3897,"path":3898,"stem":3899},"EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F09.exp10-c",{"title":3901,"path":3902,"stem":3903},"EXP11-C. Do not make assumptions regarding the layout of structures with bit-fields","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F10.exp11-c",{"title":3905,"path":3906,"stem":3907},"EXP12-C. Do not ignore values returned by functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F11.exp12-c",{"title":3909,"path":3910,"stem":3911},"EXP13-C. Treat relational and equality operators as if they were nonassociative","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F12.exp13-c",{"title":3913,"path":3914,"stem":3915},"EXP14-C. Beware of integer promotion when performing bitwise operations on integer types smaller than int","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F13.exp14-c",{"title":3917,"path":3918,"stem":3919},"EXP15-C. Do not place a semicolon on the same line as an if, for, or while statement","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp15-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F14.exp15-c",{"title":3921,"path":3922,"stem":3923},"EXP16-C. Do not compare function pointers to constant values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp16-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F15.exp16-c",{"title":3925,"path":3926,"stem":3927},"EXP19-C. Use braces for the body of an if, for, or while statement","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F16.exp19-c",{"title":3929,"path":3930,"stem":3931},"EXP20-C. Perform explicit tests to determine success, true and false, and equality","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F17.exp20-c",{"title":2975,"path":3933,"stem":3934,"children":3935},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F1.index",[3936,3937,3941,3945,3949,3953,3957,3961,3965],{"title":2975,"path":3933,"stem":3934},{"title":3938,"path":3939,"stem":3940},"FLP00-C. Understand the limitations of floating-point numbers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F2.flp00-c",{"title":3942,"path":3943,"stem":3944},"FLP01-C. Take care in rearranging floating-point expressions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F3.flp01-c",{"title":3946,"path":3947,"stem":3948},"FLP02-C. Avoid using floating-point numbers when precise computation is needed","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F4.flp02-c",{"title":3950,"path":3951,"stem":3952},"FLP03-C. Detect and handle floating-point errors","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F5.flp03-c",{"title":3954,"path":3955,"stem":3956},"FLP04-C. Check floating-point inputs for exceptional values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F6.flp04-c",{"title":3958,"path":3959,"stem":3960},"FLP05-C. Do not use denormalized numbers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F7.flp05-c",{"title":3962,"path":3963,"stem":3964},"FLP06-C. Convert integers to floating point for floating-point operations","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F8.flp06-c",{"title":3966,"path":3967,"stem":3968},"FLP07-C. Cast the return value of a function that returns a floating-point type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F9.flp07-c",{"title":3001,"path":3970,"stem":3971,"children":3972},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F01.index",[3973,3974,3978,3982,3986,3990,3992,3996,4000,4004,4008,4012,4016,4020,4024,4028,4032,4036,4040,4044,4048],{"title":3001,"path":3970,"stem":3971},{"title":3975,"path":3976,"stem":3977},"FIO01-C. Be careful using functions that use file names for identification","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F02.fio01-c",{"title":3979,"path":3980,"stem":3981},"FIO02-C. Canonicalize path names originating from tainted sources","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F03.fio02-c",{"title":3983,"path":3984,"stem":3985},"FIO03-C. Do not make assumptions about fopen() and file creation","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F04.fio03-c",{"title":3987,"path":3988,"stem":3989},"FIO05-C. Identify files using multiple file attributes","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F05.fio05-c",{"title":1293,"path":1292,"stem":3991},"4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F06.fio06-c",{"title":3993,"path":3994,"stem":3995},"FIO08-C. Take care when calling remove() on an open file","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F07.fio08-c",{"title":3997,"path":3998,"stem":3999},"FIO09-C. Be careful with binary data when transferring data across systems","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F08.fio09-c",{"title":4001,"path":4002,"stem":4003},"FIO10-C. Take care when using the rename() function","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F09.fio10-c",{"title":4005,"path":4006,"stem":4007},"FIO11-C. Take care when specifying the mode parameter of fopen()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F10.fio11-c",{"title":4009,"path":4010,"stem":4011},"FIO13-C. Never push back anything other than one read character","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F11.fio13-c",{"title":4013,"path":4014,"stem":4015},"FIO14-C. Understand the difference between text mode and binary mode with file streams","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F12.fio14-c",{"title":4017,"path":4018,"stem":4019},"FIO15-C. Ensure that file operations are performed in a secure directory","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio15-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F13.fio15-c",{"title":4021,"path":4022,"stem":4023},"FIO17-C. Do not rely on an ending null character when using fread()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F14.fio17-c",{"title":4025,"path":4026,"stem":4027},"FIO18-C. Never expect fwrite() to terminate the writing process at a null character","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio18-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F15.fio18-c",{"title":4029,"path":4030,"stem":4031},"FIO19-C. Do not use fseek() and ftell() to compute the size of a regular file","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F16.fio19-c",{"title":4033,"path":4034,"stem":4035},"FIO20-C. Avoid unintentional truncation when using fgets() or fgetws()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F17.fio20-c",{"title":4037,"path":4038,"stem":4039},"FIO21-C. Do not create temporary files in shared directories","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio21-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F18.fio21-c",{"title":4041,"path":4042,"stem":4043},"FIO22-C. Close files before spawning processes","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio22-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F19.fio22-c",{"title":4045,"path":4046,"stem":4047},"FIO23-C. Do not exit with unflushed data in stdout or stderr","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio23-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F20.fio23-c",{"title":4049,"path":4050,"stem":4051},"FIO24-C. Do not open a file that is already open","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio24-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F21.fio24-c",{"title":3059,"path":4053,"stem":4054,"children":4055},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F01.index",[4056,4057,4061,4065,4069,4073,4077,4081,4085,4089,4093,4097,4101,4105,4109,4113],{"title":3059,"path":4053,"stem":4054},{"title":4058,"path":4059,"stem":4060},"INT00-C. Understand the data model used by your implementation(s)","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F02.int00-c",{"title":4062,"path":4063,"stem":4064},"INT01-C. Use size_t or rsize_t for all integer values representing the size of an object","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F03.int01-c",{"title":4066,"path":4067,"stem":4068},"INT04-C. Enforce limits on integer values originating from tainted sources","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F05.int04-c",{"title":4070,"path":4071,"stem":4072},"INT05-C. Do not use input functions to convert character data if they cannot handle all possible inputs","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F06.int05-c",{"title":4074,"path":4075,"stem":4076},"INT07-C. Use only explicitly signed or unsigned char type for numeric values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F07.int07-c",{"title":4078,"path":4079,"stem":4080},"INT08-C. Verify that all integer values are in range","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F08.int08-c",{"title":4082,"path":4083,"stem":4084},"INT09-C. Ensure enumeration constants map to unique values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F09.int09-c",{"title":4086,"path":4087,"stem":4088},"INT10-C. Do not assume a positive remainder when using the % operator","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F10.int10-c",{"title":4090,"path":4091,"stem":4092},"INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F11.int12-c",{"title":4094,"path":4095,"stem":4096},"INT13-C. Use bitwise operators only on unsigned operands","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F12.int13-c",{"title":4098,"path":4099,"stem":4100},"INT14-C. Avoid performing bitwise and arithmetic operations on the same data","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F13.int14-c",{"title":4102,"path":4103,"stem":4104},"INT15-C. Use intmax_t or uintmax_t for formatted IO on programmer-defined integer types","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint15-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F14.int15-c",{"title":4106,"path":4107,"stem":4108},"INT16-C. Do not make assumptions about representation of signed integers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint16-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F15.int16-c",{"title":4110,"path":4111,"stem":4112},"INT17-C. Define integer constants in an implementation-independent manner","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F16.int17-c",{"title":4114,"path":4115,"stem":4116},"INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint18-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F17.int18-c",{"title":3093,"path":4118,"stem":4119,"children":4120},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F01.index",[4121,4122,4126,4130,4134,4138,4142,4146,4150,4154,4158,4162],{"title":3093,"path":4118,"stem":4119},{"title":4123,"path":4124,"stem":4125},"MEM00-C. Allocate and free memory in the same module, at the same level of abstraction","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F02.mem00-c",{"title":4127,"path":4128,"stem":4129},"MEM01-C. Store a new value in pointers immediately after free()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F03.mem01-c",{"title":4131,"path":4132,"stem":4133},"MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F04.mem02-c",{"title":4135,"path":4136,"stem":4137},"MEM03-C. Clear sensitive information stored in reusable resources","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F05.mem03-c",{"title":4139,"path":4140,"stem":4141},"MEM04-C. Beware of zero-length allocations","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F06.mem04-c",{"title":4143,"path":4144,"stem":4145},"MEM05-C. Avoid large stack allocations","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F07.mem05-c",{"title":4147,"path":4148,"stem":4149},"MEM06-C. Ensure that sensitive data is not written out to disk","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F08.mem06-c",{"title":4151,"path":4152,"stem":4153},"MEM07-C. Ensure that the arguments to calloc(), when multiplied, do not wrap","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F09.mem07-c",{"title":4155,"path":4156,"stem":4157},"MEM10-C. Define and use a pointer validation function","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F10.mem10-c",{"title":4159,"path":4160,"stem":4161},"MEM11-C. Do not assume infinite heap space","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F11.mem11-c",{"title":4163,"path":4164,"stem":4165},"MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F12.mem12-c",{"title":3123,"path":4167,"stem":4168,"children":4169},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F1.index",[4170,4171,4175,4179,4183,4187],{"title":3123,"path":4167,"stem":4168},{"title":4172,"path":4173,"stem":4174},"WIN00-C. Be specific when dynamically loading libraries","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F2.win00-c",{"title":4176,"path":4177,"stem":4178},"WIN01-C. Do not forcibly terminate execution","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F3.win01-c",{"title":4180,"path":4181,"stem":4182},"WIN02-C. Restrict privileges when spawning child processes","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F4.win02-c",{"title":4184,"path":4185,"stem":4186},"WIN03-C. Understand HANDLE inheritance","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F5.win03-c",{"title":4188,"path":4189,"stem":4190},"WIN04-C. Consider encrypting function pointers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F6.win04-c",{"title":3133,"path":4192,"stem":4193,"children":4194},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F01.index",[4195,4196,4198,4202,4206,4210,4214,4218,4222,4226,4230,4234,4238,4242,4246,4250,4254,4258,4262,4266,4270,4274,4278],{"title":3133,"path":4192,"stem":4193},{"title":120,"path":119,"stem":4197},"4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F02.msc00-c",{"title":4199,"path":4200,"stem":4201},"MSC01-C. Strive for logical completeness","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F03.msc01-c",{"title":4203,"path":4204,"stem":4205},"MSC04-C. Use comments consistently and in a readable fashion","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F04.msc04-c",{"title":4207,"path":4208,"stem":4209},"MSC05-C. Do not manipulate time_t typed values directly","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F05.msc05-c",{"title":4211,"path":4212,"stem":4213},"MSC06-C. Beware of compiler optimizations","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F06.msc06-c",{"title":4215,"path":4216,"stem":4217},"MSC07-C. Detect and remove dead code","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F07.msc07-c",{"title":4219,"path":4220,"stem":4221},"UTF8-related issues","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Futf8-related-issues","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F08.utf8-related-issues",{"title":4223,"path":4224,"stem":4225},"MSC11-C. Incorporate diagnostic tests using assertions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F09.msc11-c",{"title":4227,"path":4228,"stem":4229},"MSC12-C. Detect and remove code that has no effect or is never executed","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F10.msc12-c",{"title":4231,"path":4232,"stem":4233},"MSC13-C. Detect and remove unused values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F11.msc13-c",{"title":4235,"path":4236,"stem":4237},"MSC14-C. Do not introduce unnecessary platform dependencies","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F12.msc14-c",{"title":4239,"path":4240,"stem":4241},"MSC15-C. Do not depend on undefined behavior","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc15-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F13.msc15-c",{"title":4243,"path":4244,"stem":4245},"MSC17-C. Finish every set of statements associated with a case label with a break statement","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F14.msc17-c",{"title":4247,"path":4248,"stem":4249},"MSC18-C. Be careful while handling sensitive data, such as passwords, in program code","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc18-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F15.msc18-c",{"title":4251,"path":4252,"stem":4253},"MSC19-C. For functions that return an array, prefer returning an empty array over a null value","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F16.msc19-c",{"title":4255,"path":4256,"stem":4257},"MSC20-C. Do not use a switch statement to transfer control into a complex block","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F17.msc20-c",{"title":4259,"path":4260,"stem":4261},"MSC21-C. Use robust loop termination conditions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc21-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F18.msc21-c",{"title":4263,"path":4264,"stem":4265},"MSC22-C. Use the setjmp(), longjmp() facility securely","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc22-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F19.msc22-c",{"title":4267,"path":4268,"stem":4269},"MSC23-C. Beware of vendor-specific library and language differences","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc23-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F20.msc23-c",{"title":4271,"path":4272,"stem":4273},"MSC24-C. Do not use deprecated or obsolescent functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc24-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F21.msc24-c",{"title":4275,"path":4276,"stem":4277},"MSC25-C. Do not use insecure or weak cryptographic algorithms","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc25-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F22.msc25-c",{"title":4279,"path":4280,"stem":4281},"Use subset of ASCII for safety","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fuse-subset-of-ascii-for-safety","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F23.use-subset-of-ascii-for-safety",{"title":3171,"path":4283,"stem":4284,"children":4285},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F1.index",[4286,4287,4291,4295,4299],{"title":3171,"path":4283,"stem":4284},{"title":4288,"path":4289,"stem":4290},"POS01-C. Check for the existence of links when dealing with files","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F2.pos01-c",{"title":4292,"path":4293,"stem":4294},"POS02-C. Follow the principle of least privilege","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F3.pos02-c",{"title":4296,"path":4297,"stem":4298},"POS04-C. Avoid using PTHREAD_MUTEX_NORMAL type mutex locks","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F4.pos04-c",{"title":4300,"path":4301,"stem":4302},"POS05-C. Limit access to files by creating a jail","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F5.pos05-c",{"title":3241,"path":4304,"stem":4305,"children":4306},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F01.index",[4307,4308,4312,4316,4320,4324,4328,4332,4336,4340,4344,4348,4352,4356],{"title":3241,"path":4304,"stem":4305},{"title":4309,"path":4310,"stem":4311},"PRE00-C. Prefer inline or static functions to function-like macros","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F02.pre00-c",{"title":4313,"path":4314,"stem":4315},"PRE01-C. Use parentheses within macros around parameter names","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F03.pre01-c",{"title":4317,"path":4318,"stem":4319},"PRE02-C. Macro replacement lists should be parenthesized","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F04.pre02-c",{"title":4321,"path":4322,"stem":4323},"PRE04-C. Do not reuse a standard header file name","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F05.pre04-c",{"title":4325,"path":4326,"stem":4327},"PRE05-C. Understand macro replacement when concatenating tokens or performing stringification","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F06.pre05-c",{"title":4329,"path":4330,"stem":4331},"PRE06-C. Enclose header files in an include guard","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F07.pre06-c",{"title":4333,"path":4334,"stem":4335},"PRE07-C. Avoid using repeated question marks","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F08.pre07-c",{"title":4337,"path":4338,"stem":4339},"PRE08-C. Guarantee that header file names are unique","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F09.pre08-c",{"title":4341,"path":4342,"stem":4343},"PRE09-C. Do not replace secure functions with deprecated or obsolescent functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F10.pre09-c",{"title":4345,"path":4346,"stem":4347},"PRE10-C. Wrap multistatement macros in a do-while loop","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F11.pre10-c",{"title":4349,"path":4350,"stem":4351},"PRE11-C. Do not conclude macro definitions with a semicolon","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F12.pre11-c",{"title":4353,"path":4354,"stem":4355},"PRE12-C. Do not define unsafe macros","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F13.pre12-c",{"title":4357,"path":4358,"stem":4359},"PRE13-C. Use the Standard predefined macros to test for versions and features.","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F14.pre13-c",{"title":3259,"path":4361,"stem":4362,"children":4363},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F1.index",[4364,4365,4369,4373],{"title":3259,"path":4361,"stem":4362},{"title":4366,"path":4367,"stem":4368},"SIG00-C. Mask signals handled by noninterruptible signal handlers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig\u002Fsig00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F2.sig00-c",{"title":4370,"path":4371,"stem":4372},"SIG01-C. Understand implementation-specific details regarding signal handler persistence","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig\u002Fsig01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F3.sig01-c",{"title":4374,"path":4375,"stem":4376},"SIG02-C. Avoid using signals to implement normal functionality","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig\u002Fsig02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F4.sig02-c",{"title":4378,"path":4379,"stem":4380},"CERT manifest files","\u002Fsei-cert-c-coding-standard\u002Fcert-manifest-files","4.sei-cert-c-coding-standard\u002F09.cert-manifest-files",1775657796058]