| Tool | Version | Checker | Description | 
|---|
| Astrée |  | 
 | Supported via MISRA C:2012 Rules 10.1, 10.3, 10.4, 10.6 and 10.7 | 
| CodeSonar |  | LANG.CAST.PC.AVLANG.CAST.PC.CONST2PTR
 LANG.CAST.PC.INT
 LANG.CAST.COERCELANG.CAST.VALUE
 ALLOC.SIZE.TRUNCMISC.MEM.SIZE.TRUNC
 LANG.MEM.TBA
 | Cast: arithmetic type/void pointerConversion: integer constant to pointer
 Conversion: pointer/integer
 Coercion alters valueCast alters value
 Truncation of allocation sizeTruncation of size
 Tainted buffer access | 
| Compass/ROSE | 
 | 
 | Can detect violations of this rule. However, false warnings may be raised if limits.his included | 
| Coverity* |  | NEGATIVE_RETURNS REVERSE_NEGATIVE MISRA_CAST | Can find array accesses, loop bounds, and other expressions that may contain dangerous implied integer conversions that would result in unexpected behavior Can find instances where a negativity check occurs after the negative value has been used for something else Can find instances where an integer expression is implicitly converted to a narrower integer type, where the signedness of an integer value is implicitly converted, or where the type of a complex expression is implicitly converted | 
| Cppcheck |  | memsetValueOutOfRange | Partially implemented The second argument to memset()cannot be represented asunsigned char | 
| Cppcheck Premium | | Include Page | 
|---|
 | |  | Cppcheck Premium_V | 
|---|
 |  | Cppcheck Premium_V | 
|---|
 | 
 | memsetValueOutOfRange premium-cert-int31-c | Partially implemented The second argument to
 memset()cannot be represented asunsigned char | 
| Helix QAC |  | C2850, C2855, C2890, C2895, C2900, C2905,  C++2850, C++2855, C++2890, C++2895, C++2900, C++2905,  C++3000, C++3010 
 DF2851, DF2852, DF2853,  DF2856, DF2857, DF2858, DF2891, DF2892, DF2893, DF2896, DF2897, DF2898, DF2901, DF2902, DF2903, DF2906, DF2907, DF2908 | 
 | 
| Klocwork |  | PORTING.CAST.SIZE | 
 | 
| LDRA tool suite |  | 93 S, 433 S, 434 S | Partially implemented | 
| Parasoft C/C++test |  | CERT_C-INT31-aCERT_C-INT31-b
 CERT_C-INT31-c
 CERT_C-INT31-d
 CERT_C-INT31-e
 CERT_C-INT31-f
 CERT_C-INT31-g
 CERT_C-INT31-h
 CERT_C-INT31-i
 CERT_C-INT31-j
 CERT_C-INT31-k
 CERT_C-INT31-l
 CERT_C-INT31-m
 CERT_C-INT31-n
 CERT_C-INT31-o
 CERT_C-INT31-p
 
 | An expression of essentially Boolean type should always be used where an operand is interpreted as a Boolean valueAn operand of essentially Boolean type should not be used where an operand is interpreted as a numeric value
 An operand of essentially character type should not be used where an operand is interpreted as a numeric value
 An operand of essentially enum type should not be used in an arithmetic operation
 Shift and bitwise operations should not be performed on operands of essentially signed or enum type
 An operand of essentially signed or enum type should not be used as the right hand operand to the bitwise shifting operator
 An operand of essentially unsigned type should not be used as the operand to the unary minus operator
 The value of an expression shall not be assigned to an object with a narrower essential type
 The value of an expression shall not be assigned to an object of a different essential type category
 Both operands of an operator in which the usual arithmetic conversions are performed shall have the same essential type category
 The second and third operands of the ternary operator shall have the same essential type category
 The value of a composite expression shall not be assigned to an object with wider essential type
 If a composite expression is used as one operand of an operator in which the usual arithmetic conversions are performed then the other operand shall not have wider essential type
 If a composite expression is used as one (second or third) operand of a conditional operator then the other operand shall not have wider essential type
 Avoid data loss when converting between integer types
 Avoid value change when converting between integer types
 | 
| Polyspace Bug Finder | | Include Page | 
|---|
 | |  | Polyspace Bug Finder_V | 
|---|
 |  | Polyspace Bug Finder_V | 
|---|
 | 
 | CERT C: Rule INT31-C 
 | Checks for: Integer conversion overflowCall to memset with unintended value Sign change integer conversion overflowTainted sign change conversionUnsigned integer conversion overflow
 Rule partially covered. | 
| PVS-Studio |  | V562, V569, V642, V676, V716, V721, V724, V732, V739, V784, V793, V1019,  V1029, V1046 
 | 
 | 
| RuleChecker | | Include Page | 
|---|
 | |  | RuleChecker_V | 
|---|
 |  | RuleChecker_V | 
|---|
 | 
 | 
 | Supported via MISRA C:2012 Rules 10.1, 10.3, 10.4, 10.6 and 10.7 | 
| TrustInSoft Analyzer | | Include Page | 
|---|
 | |  | TrustInSoft Analyzer_V | 
|---|
 |  | TrustInSoft Analyzer_V | 
|---|
 | 
 | signed_downcast | Exhaustively verified. |