...
Run
cpptestcli
with the-config
switch and specify a built-in, user-defined or DTP-hosted test configuration:Code Block -config "builtin://Recommended Rules" -config "user://Foo Configuration" -config "dtp://Foo Team Configuration" -config "dtp://FooTeamConfig.properties"
You can also provide a path or URL to the test configuration .properties file:
Code Block -config "C:\Devel\Configs\FooConfig.properties" -config "http://foo.bar.com/configs/FoodConfig.properties"
For example, your command line may resemble the following:Code Block cpptestcli -config "builtin://Recommended Rules" -compiler gcc_3_4 -input cpptest.bdf
In the .properties file, specify the default configuration that will be run when the
-config
option is not used:Code Block cpptest.configuration=user://Configuration Name
Viewing Available Test Configurations
...
Compliance Packs include test configurations tailored for particular compliance domains to help you enforce industry-specific compliance standards and practices. Compliance Packs
Info | ||||
---|---|---|---|---|
| ||||
Some test configurations in this category have a corresponding "Compliance" extension on DTP, which allows you to view your security compliance status, generate compliance reports, and monitor the progress towards your security compliance goals. These test configurations require dedicated license features to be activated. Contact Parasoft Support for more details on Compliance Packs licensing. See the "Extensions for DTP" section in the DTP documentation for the list of available extensions, requirements, and usage. |
Aerospace Pack
Scroll Table Layout | ||
---|---|---|
|
...
Built-in Test Configuration | Description |
---|---|
AUTOSAR C++14 Coding Guidelines | Checks rules that enforce the AUTOSAR C++ Coding Guidelines (Adaptive Platform, version 17-10).
|
HIS Source Code Metrics | Checks metrics required by the Herstellerinitiative Software (HIS) group. |
High Integrity C++ | Checks rules that enforce the High Integrity C++ Coding Standard. |
MISRA C 1998 | Checks rules that enforce the MISRA C coding standards |
MISRA C 2004 | Checks rules that enforce the MISRA C 2004 coding standard. |
MISRA C 2012 [2004, 2012] | Checks rules that enforce the MISRA C 2004 or2012 coding standard.
|
MISRA C++ 2008 | Checks rules that enforce the MISRA C++ 2008 coding standards. |
...
Built-in Test Configuration | Description |
---|---|
CWE-SANS Top 25 Most Dangerous Programming Errors | Includes rules that find issues classified as Top 25 Most Dangerous Programming Errors of the CWE-SANS standard. |
OWASP Top 10 2017 | Includes rules that find issues identified in OWASP’s Top 10 standard |
Payment Card Industry Data Security Standard | Includes rules that find issues identified in PCI Data Security Standard |
SEI CERT C Guidelines | Checks rules and recommendations for the SEI CERT C Coding Standard. This standard provides guidelines for secure coding. The goal is to facilitate the development of safe, reliable, and secure systems by, for example, eliminating undefined behaviors that can lead to undefined program behaviors and exploitable vulnerabilities. |
SEI CERT C Rules | Checks rules for the SEI CERT C Coding Standard. This standard provides guidelines for secure coding. The goal is to facilitate the development of safe, reliable, and secure systems by, for example, eliminating undefined behaviors that can lead to undefined program behaviors and exploitable vulnerabilities.
|
SEI CERT C++ Rules | Checks rules for the SEI CERT C++ Coding Standard. This standard provides guidelines for secure coding. The goal is to facilitate the development of safe, reliable, and secure systems by, for example, eliminating undefined behaviors that can lead to undefined program behaviors and exploitable vulnerabilities.
|
Security Rules | General test configuration that finds security issues |
UL 2900 | Includes rules that find issues identified in the UL-2900 standard. |
...