Splint - Secure Programming Lint |
|
Download - Documentation - Manual - Links | Sponsors - Credits |
The sample uses the employee database program from Appendix B of the Larch Book: db: Employee Database Program
Guttag, John V. and Horning, James J., with Stephen J. Garland, Kevin D. Jones, Andrés Modet, and Jeannette M. Wing, Larch: Languages and Tools for Formal Specification , Springer-Verlag, Texts and Monographs in Computer Science, 1993.An account describing using LCLint 1.2 on the program is found inDavid Evans, Using Specifications to Check Source Code, MIT/LCS/TR-628, June 1994.In each iteration, LCLint is run incrementally on the code and certain anomalies are detected. The next section fixes these anomalies and runs LCLint again (sometimes with different flag settings) to detect more anomalies.If you want to experiment with the code on your own system, you can also download the code.
- Original version published in the Larch Book
- Weak checking on original version with LSL dependancies removed
- Using stylized iterators
- Standard checking
- Memory checking, part 1
- Memory checking, part 2
- Memory checking, part 3
- Checking all macros
- Checks mode checking, part 1
- Checks mode checking, part 2
- Naming conventions
- Strict mode checking
- Using strict standard library
- Final
|