Ted Kremenek
|
4f50875f3b
Tweak insecureAPI analyzer checks to have the ability to be individually disabled.
|
13 سال پیش |
Ted Kremenek
|
07189521a1
Include the "issue context" (e.g. function or method) where a static analyzer issue occurred in the plist output.
|
13 سال پیش |
Dylan Noblesmith
|
f7ccbad5d9
Basic: import SmallString<> into clang namespace
|
13 سال پیش |
Benjamin Kramer
|
8fe83e1df9
Move a method from IdentifierTable.h out of line and remove the SmallString include.
|
13 سال پیش |
Anna Zaks
|
393b9793da
[analyzer] Change the warning to suggest 'strlcat/strlcpy' as
|
13 سال پیش |
Ted Kremenek
|
b63d8d8f7b
Implement checker that looks for calls to mktemps and friends that have fewer than 6 Xs. Implements <rdar://problem/6336672>.
|
13 سال پیش |
Ted Kremenek
|
76a54246db
Turn 'SecuritySyntaxChecker' into a "meta" security checker for insecure APIs. Now
|
13 سال پیش |
Ted Kremenek
|
1d26f48dc2
Rename AnalysisContext to AnalysisDeclContext. Not only is this name more accurate, but it frees up the name AnalysisContext for other uses.
|
14 سال پیش |
Benjamin Kramer
|
b8989f27f1
Change operator<< for raw_ostream and NamedDecl to take a reference instead of a pointer.
|
14 سال پیش |
Anna Zaks
|
a7957ff18c
[analyzer] Warn about the use of insecure, deprecated vfork() function PR11053 (http://llvm.org/bugs/show_bug.cgi?id=11053).
|
14 سال پیش |
Anna Zaks
|
590dd8e095
[analyzer] Refactor PathDiagnosticLocation: Make PathDiagnosticLocation(SourceLocation...) private. Most of the effort here goes to making BugReport refer to a PathDiagnosticLocation instead of FullSourceLocation.
|
14 سال پیش |
Douglas Gregor
|
bcfd1f55bf
Extend the ASTContext constructor to delay the initialization of
|
14 سال پیش |
Ted Kremenek
|
e0e29332c8
Remove dead code.
|
14 سال پیش |
Chris Lattner
|
5f9e272e63
remove unneeded llvm:: namespace qualifiers on some core types now that LLVM.h imports
|
14 سال پیش |
Lenny Maiorani
|
9cb677e3d8
Add security syntax checker for strcat() which causes the Static Analyzer to generate a warning any time the strcat() function is used with a note suggesting to use a function which provides bounded buffers. CWE-119.
|
14 سال پیش |
Lenny Maiorani
|
c2dace1119
Refactoring the security checker a little bit so that each CallExpr check doesn't get called for each CallExpr. Instead it does a switch and only runs the check for the proper identifier. Slight speed improvement (probably significant on very large ASTs), and should make it easier and more clear to add more checks for other CallExpr's later.
|
14 سال پیش |
Lenny Maiorani
|
5b67a82a26
Add security syntax checker for strcpy() which causes the Static Analyzer to generate a warning any time the strcpy() function is used with a note suggesting to use a function which provides bounded buffers.
|
14 سال پیش |
Lenny Maiorani
|
ea4411e3ee
Fix spelling in a comment. (test commit)
|
14 سال پیش |
Argyrios Kyrtzidis
|
ec8605f1d7
[analyzer] Rename CheckerV2 -> Checker.
|
14 سال پیش |
Argyrios Kyrtzidis
|
7dd445ec20
[analyzer] Use the new registration mechanism on the non-path-sensitive-checkers:
|
14 سال پیش |
Ted Kremenek
|
9b66371644
Split 'include/clang/StaticAnalyzer' into 'include/clang/StaticAnalyzer/Core' and 'include/clang/StaticAnalyzer/Checkers'.
|
14 سال پیش |
Douglas Gregor
|
0f565591bc
NetBSD, OpenBSD, and Dragonfly BSD also have arc4random. Patch from
|
14 سال پیش |
Ted Kremenek
|
21142581d5
Chris Lattner has strong opinions about directory
|
14 سال پیش |