=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== pccts-1.33MR33/antlr/antlr.g-2106- $eh = (ExceptionHandler *)calloc(1, sizeof(ExceptionHandler)); pccts-1.33MR33/antlr/antlr.g:2107: require($eh!=NULL, "exception: cannot allocate handler"); pccts-1.33MR33/antlr/antlr.g-2108- >> ############################################## pccts-1.33MR33/antlr/antlr.g-2111- $eh->signalname = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); pccts-1.33MR33/antlr/antlr.g:2112: require($eh->signalname!=NULL, "exception: cannot allocate sig name"); pccts-1.33MR33/antlr/antlr.g-2113- strcpy($eh->signalname, LATEXT(1)); ############################################## pccts-1.33MR33/antlr/antlr.g-2117- $eh->signalname = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); pccts-1.33MR33/antlr/antlr.g:2118: require($eh->signalname!=NULL, "exception: cannot allocate sig name"); pccts-1.33MR33/antlr/antlr.g-2119- strcpy($eh->signalname, LATEXT(1)); ############################################## pccts-1.33MR33/antlr/antlr.g-2126- $eh->action = (char *) calloc(strlen(LATEXT(1))+1, sizeof(char)); pccts-1.33MR33/antlr/antlr.g:2127: require($eh->action!=NULL, "exception: cannot allocate action"); pccts-1.33MR33/antlr/antlr.g-2128- strcpy($eh->action, LATEXT(1));