From 3705a1ee1014e22b4d54a4f00bfa7610b03dd45b Mon Sep 17 00:00:00 2001 From: Anna Zaks Date: Wed, 22 Feb 2012 02:35:58 +0000 Subject: [analyzer] Change naming in bug reports "tainted" -> "untrusted" llvm-svn: 151120 --- clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) (limited to 'clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp') diff --git a/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp b/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp index 9f3220056db..4490ddbcc0c 100644 --- a/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp +++ b/clang/lib/StaticAnalyzer/Checkers/GenericTaintChecker.cpp @@ -45,7 +45,7 @@ private: mutable OwningPtr BT; inline void initBugType() const { if (!BT) - BT.reset(new BugType("Taint Analysis", "General")); + BT.reset(new BugType("Use of Untrusted Data", "Untrusted Data")); } /// \brief Catch taint related bugs. Check if tainted data is passed to a @@ -174,14 +174,15 @@ const unsigned GenericTaintChecker::ReturnValueIndex; const unsigned GenericTaintChecker::InvalidArgIndex; const char GenericTaintChecker::MsgUncontrolledFormatString[] = - "Tainted format string (CWE-134: Uncontrolled Format String)"; + "Untrusted data is used as a format string " + "(CWE-134: Uncontrolled Format String)"; const char GenericTaintChecker::MsgSanitizeSystemArgs[] = - "Tainted data passed to a system call " + "Untrusted data is passed to a system call " "(CERT/STR02-C. Sanitize data passed to complex subsystems)"; const char GenericTaintChecker::MsgTaintedBufferSize[] = - "Tainted data is used to specify the buffer size " + "Untrusted data is used to specify the buffer size " "(CERT/STR31-C. Guarantee that storage for strings has sufficient space for " "character data and the null terminator)"; -- cgit v1.2.3