Craig Topper
|
1843a2095a
[C++11] Use 'nullptr'. StaticAnalyzer edition.
|
11 years ago |
Alp Toker
|
89a69a81af
Fix typos
|
11 years ago |
Alexander Kornienko
|
15c01b27f5
Expose the name of the checker producing each diagnostic message.
|
11 years ago |
Alp Toker
|
c50bf3d128
Rename FunctionProtoType accessors from 'arguments' to 'parameters'
|
11 years ago |
Jordan Rose
|
31b71f3097
[analyzer] ArrayRef-ize BugReporter::EmitBasicReport.
|
12 years ago |
Eli Friedman
|
fa8277c52a
Use getAs<> where appropriate on QualTypes instead of using dyn_cast.
|
12 years ago |
Reid Kleckner
|
dbcc7561f6
Check the canonical parameter type with getAs<>() in a static checker
|
12 years ago |
Jordan Rose
|
a5796f8722
[analyzer] Replace isIntegerType() with isIntegerOrEnumerationType().
|
12 years ago |
Anna Zaks
|
adecec3948
[analyzer] Move DefaultBool so that all checkers can share it.
|
12 years ago |
Chandler Carruth
|
55fc873017
Sort all of Clang's files under 'lib', and fix up the broken headers
|
12 years ago |
Ted Kremenek
|
d0f3d7148c
Silence static analyzer issue by documenting that in this context
|
13 years ago |
Eli Friedman
|
42f74f21ec
clang support for Bitrig (an OpenBSD fork); patch by David Hill.
|
13 years ago |
Ted Kremenek
|
b0754170b2
Revert "Tweak insecureAPI analyzer checks to have the ability to be individually disabled."
|
13 years ago |
Ted Kremenek
|
4f50875f3b
Tweak insecureAPI analyzer checks to have the ability to be individually disabled.
|
13 years ago |
Ted Kremenek
|
07189521a1
Include the "issue context" (e.g. function or method) where a static analyzer issue occurred in the plist output.
|
13 years ago |
Dylan Noblesmith
|
f7ccbad5d9
Basic: import SmallString<> into clang namespace
|
13 years ago |
Benjamin Kramer
|
8fe83e1df9
Move a method from IdentifierTable.h out of line and remove the SmallString include.
|
13 years ago |
Anna Zaks
|
393b9793da
[analyzer] Change the warning to suggest 'strlcat/strlcpy' as
|
13 years ago |
Ted Kremenek
|
b63d8d8f7b
Implement checker that looks for calls to mktemps and friends that have fewer than 6 Xs. Implements <rdar://problem/6336672>.
|
13 years ago |
Ted Kremenek
|
76a54246db
Turn 'SecuritySyntaxChecker' into a "meta" security checker for insecure APIs. Now
|
13 years ago |
Ted Kremenek
|
1d26f48dc2
Rename AnalysisContext to AnalysisDeclContext. Not only is this name more accurate, but it frees up the name AnalysisContext for other uses.
|
14 years ago |
Benjamin Kramer
|
b8989f27f1
Change operator<< for raw_ostream and NamedDecl to take a reference instead of a pointer.
|
14 years ago |
Anna Zaks
|
a7957ff18c
[analyzer] Warn about the use of insecure, deprecated vfork() function PR11053 (http://llvm.org/bugs/show_bug.cgi?id=11053).
|
14 years ago |
Anna Zaks
|
590dd8e095
[analyzer] Refactor PathDiagnosticLocation: Make PathDiagnosticLocation(SourceLocation...) private. Most of the effort here goes to making BugReport refer to a PathDiagnosticLocation instead of FullSourceLocation.
|
14 years ago |
Douglas Gregor
|
bcfd1f55bf
Extend the ASTContext constructor to delay the initialization of
|
14 years ago |
Ted Kremenek
|
e0e29332c8
Remove dead code.
|
14 years ago |
Chris Lattner
|
5f9e272e63
remove unneeded llvm:: namespace qualifiers on some core types now that LLVM.h imports
|
14 years ago |
Lenny Maiorani
|
9cb677e3d8
Add security syntax checker for strcat() which causes the Static Analyzer to generate a warning any time the strcat() function is used with a note suggesting to use a function which provides bounded buffers. CWE-119.
|
14 years ago |
Lenny Maiorani
|
c2dace1119
Refactoring the security checker a little bit so that each CallExpr check doesn't get called for each CallExpr. Instead it does a switch and only runs the check for the proper identifier. Slight speed improvement (probably significant on very large ASTs), and should make it easier and more clear to add more checks for other CallExpr's later.
|
14 years ago |
Lenny Maiorani
|
5b67a82a26
Add security syntax checker for strcpy() which causes the Static Analyzer to generate a warning any time the strcpy() function is used with a note suggesting to use a function which provides bounded buffers.
|
14 years ago |