2014-08-27 09:42:09 +02:00
|
|
|
/*
|
|
|
|
* Cppcheck - A tool for static C/C++ code analysis
|
2015-01-03 12:14:58 +01:00
|
|
|
* Copyright (C) 2007-2015 Daniel Marjamäki and Cppcheck team.
|
2014-08-27 09:42:09 +02:00
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
#ifndef checkstringH
|
|
|
|
#define checkstringH
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
#include "check.h"
|
|
|
|
|
|
|
|
/// @addtogroup Checks
|
|
|
|
/// @{
|
|
|
|
|
|
|
|
|
|
|
|
/** @brief Detect misusage of C-style strings and related standard functions */
|
|
|
|
|
|
|
|
class CPPCHECKLIB CheckString : public Check {
|
|
|
|
public:
|
|
|
|
/** @brief This constructor is used when registering the CheckClass */
|
2014-11-20 14:20:09 +01:00
|
|
|
CheckString() : Check(myName()) {
|
2014-08-27 09:42:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** @brief This constructor is used when running checks. */
|
|
|
|
CheckString(const Tokenizer *tokenizer, const Settings *settings, ErrorLogger *errorLogger)
|
2014-11-20 14:20:09 +01:00
|
|
|
: Check(myName(), tokenizer, settings, errorLogger) {
|
2014-08-27 09:42:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/** @brief Run checks against the normal token list */
|
2014-11-20 14:20:09 +01:00
|
|
|
void runChecks(const Tokenizer *tokenizer, const Settings *settings, ErrorLogger *errorLogger) {
|
2014-08-27 09:42:09 +02:00
|
|
|
CheckString checkString(tokenizer, settings, errorLogger);
|
|
|
|
|
|
|
|
// Checks
|
|
|
|
checkString.strPlusChar();
|
|
|
|
checkString.checkSuspiciousStringCompare();
|
|
|
|
}
|
|
|
|
|
|
|
|
/** @brief Run checks against the simplified token list */
|
2014-11-20 14:20:09 +01:00
|
|
|
void runSimplifiedChecks(const Tokenizer *tokenizer, const Settings *settings, ErrorLogger *errorLogger) {
|
2014-08-27 09:42:09 +02:00
|
|
|
CheckString checkString(tokenizer, settings, errorLogger);
|
|
|
|
|
|
|
|
// Checks
|
|
|
|
checkString.checkIncorrectStringCompare();
|
|
|
|
checkString.checkAlwaysTrueOrFalseStringCompare();
|
|
|
|
checkString.sprintfOverlappingData();
|
|
|
|
}
|
|
|
|
|
|
|
|
/** @brief str plus char (unusual pointer arithmetic) */
|
|
|
|
void strPlusChar();
|
|
|
|
|
|
|
|
/** @brief %Check for using bad usage of strncmp and substr */
|
|
|
|
void checkIncorrectStringCompare();
|
|
|
|
|
|
|
|
/** @brief %Check for comparison of a string literal with a char* variable */
|
|
|
|
void checkSuspiciousStringCompare();
|
|
|
|
|
|
|
|
/** @brief %Check for suspicious code that compares string literals for equality */
|
|
|
|
void checkAlwaysTrueOrFalseStringCompare();
|
|
|
|
|
|
|
|
/** @brief %Check for overlapping source and destination passed to sprintf() */
|
|
|
|
void sprintfOverlappingData();
|
|
|
|
|
|
|
|
private:
|
|
|
|
void sprintfOverlappingDataError(const Token *tok, const std::string &varname);
|
|
|
|
void strPlusCharError(const Token *tok);
|
|
|
|
void incorrectStringCompareError(const Token *tok, const std::string& func, const std::string &string);
|
|
|
|
void incorrectStringBooleanError(const Token *tok, const std::string& string);
|
|
|
|
void alwaysTrueFalseStringCompareError(const Token *tok, const std::string& str1, const std::string& str2);
|
|
|
|
void alwaysTrueStringVariableCompareError(const Token *tok, const std::string& str1, const std::string& str2);
|
|
|
|
void suspiciousStringCompareError(const Token* tok, const std::string& var);
|
|
|
|
void suspiciousStringCompareError_char(const Token* tok, const std::string& var);
|
|
|
|
|
2014-11-20 14:20:09 +01:00
|
|
|
void getErrorMessages(ErrorLogger *errorLogger, const Settings *settings) const {
|
2014-08-27 09:42:09 +02:00
|
|
|
CheckString c(0, settings, errorLogger);
|
|
|
|
|
|
|
|
c.sprintfOverlappingDataError(0, "varname");
|
|
|
|
c.strPlusCharError(0);
|
|
|
|
c.incorrectStringCompareError(0, "substr", "\"Hello World\"");
|
|
|
|
c.suspiciousStringCompareError(0, "foo");
|
|
|
|
c.suspiciousStringCompareError_char(0, "foo");
|
|
|
|
c.incorrectStringBooleanError(0, "\"Hello World\"");
|
|
|
|
c.alwaysTrueFalseStringCompareError(0, "str1", "str2");
|
|
|
|
c.alwaysTrueStringVariableCompareError(0, "varname1", "varname2");
|
|
|
|
}
|
|
|
|
|
2014-11-20 14:20:09 +01:00
|
|
|
static std::string myName() {
|
2014-08-27 09:42:09 +02:00
|
|
|
return "String";
|
|
|
|
}
|
|
|
|
|
2014-11-20 14:20:09 +01:00
|
|
|
std::string classInfo() const {
|
2014-08-27 09:42:09 +02:00
|
|
|
return "Detect misusage of C-style strings:\n"
|
2014-09-30 14:56:12 +02:00
|
|
|
"- overlapping buffers passed to sprintf as source and destination\n"
|
|
|
|
"- incorrect length arguments for 'substr' and 'strncmp'\n"
|
|
|
|
"- suspicious condition (runtime comparison of string literals)\n"
|
|
|
|
"- suspicious condition (string literals as boolean)\n"
|
|
|
|
"- suspicious comparison of a string literal with a char* variable\n"
|
|
|
|
"- suspicious comparison of '\\0' with a char* variable\n";
|
2014-08-27 09:42:09 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
/// @}
|
|
|
|
//---------------------------------------------------------------------------
|
|
|
|
#endif // checkstringH
|