This script is for Slackware 12.2 only and may be outdated.

SlackBuilds Repository

12.2 > Development > splint (3.1.2)

splint is a tool for statically checking C programs for security vulnerabilities
and programming mistakes. Splint does many of the traditional lint checks
including unused declarations, type inconsistencies, use before definition,
unreachable code, ignored return values, execution paths with no return,
likely infinite loops, and fall through cases.

More powerful checks are made possible by additional information given
in source code annotations. Annotations are stylized comments that
document assumptions about functions, variables, parameters and types.
In addition to the checks specifically enabled by annotations, many
of the traditional lint checks are improved by exploiting this additional
information.

As more effort is put into annotating programs, better checking results.
Splint is designed to be flexible and allow programmers to select
appropriate points on the effort-benefit curve for particular projects.
As different checks are turned on and more information is given in code
annotations the number of bugs that can be detected increases dramatically.

This package configures splint als the default lint if no other command by
that name is encountered on the system.

Maintained by: Menno E. Duursma
Keywords: lint,c,security,static analysis
ChangeLog: splint

Homepage:
http://www.splint.org/

Source Downloads:
splint-3.1.2.src.tgz (25f47d70bd9c8bdddf6b03de5949c4fd)

Download SlackBuild:
splint.tar.gz
splint.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
doinst.sh
slack-desc
splint.SlackBuild
splint.info

Validated for Slackware 12.2

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds