summaryrefslogtreecommitdiffstats
path: root/clang-tools-extra/clang-tidy/misc/StringLiteralWithEmbeddedNulCheck.cpp
Commit message (Collapse)AuthorAgeFilesLines
* Rename more checks from misc- to bugprone-.Alexander Kornienko2018-02-281-85/+0
| | | | | | | | | | | | | | | | Summary: clang-tidy/rename_check.py {misc,bugprone}-string-integer-assignment clang-tidy/rename_check.py {misc,bugprone}-string-literal-with-embedded-nul clang-tidy/rename_check.py {misc,bugprone}-suspicious-enum-usage clang-tidy/rename_check.py {misc,bugprone}-suspicious-missing-comma Reviewers: hokein, sammccall, aaron.ballman Subscribers: klimek, cfe-commits, mgorny Differential Revision: https://reviews.llvm.org/D43868 llvm-svn: 326384
* [tidy] Move private ast matchers into anonymous namespaces to avoid ODR ↵Benjamin Kramer2018-02-181-0/+2
| | | | | | | | conflicts. No functionality change intended. llvm-svn: 325467
* [clang-tidy] add new checker for string literal with NUL character.Etienne Bergeron2016-04-071-0/+83
Summary: This patch adds the support for detecting suspicious string literals and their //incorrect// usage. The following example shows a incorrect character escaping leading to an embedded NUL character. ``` std::string str = "\0x42"; // Should be "\x42". ``` The patch also add detection of truncated literal when a literal is passed to a string constructor. Reviewers: hokein, alexfh Subscribers: LegalizeAdulthood, bcraig, Eugene.Zelenko, bkramer, cfe-commits Differential Revision: http://reviews.llvm.org/D18783 llvm-svn: 265691
OpenPOWER on IntegriCloud