diff --git a/src/checkother.cpp b/src/checkother.cpp index d4854af73..0351efb79 100644 --- a/src/checkother.cpp +++ b/src/checkother.cpp @@ -428,7 +428,7 @@ void CheckOther::CheckUnsignedDivision() else if (!Token::Match(tok, "[).]") && Token::Match(tok->next(), "%var% / - %num%")) { - if (ErrorMessage::udivError(_settings)) + if (ErrorMessage::udivError()) { const char *varname1 = tok->strAt(1); char sign1 = varsign[varname1]; @@ -441,7 +441,7 @@ void CheckOther::CheckUnsignedDivision() else if (Token::Match(tok, "[([=*/+-] - %num% / %var%")) { - if (ErrorMessage::udivError(_settings)) + if (ErrorMessage::udivError()) { const char *varname2 = tok->strAt(4); char sign2 = varsign[varname2]; diff --git a/src/cppcheck.cpp b/src/cppcheck.cpp index 5e069f659..01fb731ac 100644 --- a/src/cppcheck.cpp +++ b/src/cppcheck.cpp @@ -235,7 +235,7 @@ void CppCheck::checkFile(const std::string &code, const char FileName[]) // The 'memset' function can do dangerous things if used wrong. // Important: The checking doesn't work on simplified tokens list. CheckClass checkClass(&_tokenizer, _settings, this); - if (ErrorMessage::memsetClass(_settings)) + if (ErrorMessage::memsetClass()) checkClass.noMemset(); @@ -243,7 +243,7 @@ void CppCheck::checkFile(const std::string &code, const char FileName[]) CheckOther checkOther(&_tokenizer, _settings, this); // Check for unsigned divisions where one operand is signed - if (ErrorMessage::udivWarning(_settings) || ErrorMessage::udivError(_settings)) + if (ErrorMessage::udivWarning(_settings) || ErrorMessage::udivError()) checkOther.CheckUnsignedDivision(); // Give warning when using char variable as array index @@ -267,15 +267,15 @@ void CppCheck::checkFile(const std::string &code, const char FileName[]) // Memory leak CheckMemoryLeakClass checkMemoryLeak(&_tokenizer, _settings, this); - if (ErrorMessage::memleak(_settings) && ErrorMessage::mismatchAllocDealloc(_settings)) + if (ErrorMessage::memleak() && ErrorMessage::mismatchAllocDealloc()) checkMemoryLeak.CheckMemoryLeak(); // Check that all class constructors are ok. - if (ErrorMessage::noConstructor(_settings) && ErrorMessage::uninitVar(_settings)) + if (ErrorMessage::noConstructor(_settings) && ErrorMessage::uninitVar()) checkClass.constructors(); // Check that all base classes have virtual destructors - if (ErrorMessage::virtualDestructor(_settings)) + if (ErrorMessage::virtualDestructor()) checkClass.virtualDestructor(); // Array index out of bounds / Buffer overruns.. @@ -302,8 +302,8 @@ void CppCheck::checkFile(const std::string &code, const char FileName[]) checkOther.WarningRedundantCode(); // strtol and strtoul usage - if (ErrorMessage::dangerousUsageStrtol(_settings) || - ErrorMessage::sprintfOverlappingData(_settings)) + if (ErrorMessage::dangerousUsageStrtol() || + ErrorMessage::sprintfOverlappingData()) checkOther.InvalidFunctionUsage(); // Check that all private functions are called. @@ -323,15 +323,15 @@ void CppCheck::checkFile(const std::string &code, const char FileName[]) checkOther.CheckStructMemberUsage(); // Unreachable code below a 'return' statement - if (ErrorMessage::unreachableCode(_settings)) + if (ErrorMessage::unreachableCode()) checkOther.unreachableCode(); // Check if a constant function parameter is passed by value - if (ErrorMessage::passedByValue(_settings)) + if (ErrorMessage::passedByValue()) checkOther.CheckConstantFunctionParameter(); // Variable scope (check if the scope could be limited) - if (ErrorMessage::variableScope(_settings)) + if (ErrorMessage::variableScope()) checkOther.CheckVariableScope(); // Check for various types of incomplete statements that could for example @@ -340,7 +340,7 @@ void CppCheck::checkFile(const std::string &code, const char FileName[]) checkOther.CheckIncompleteStatement(); // Unusual pointer arithmetic - if (ErrorMessage::strPlusChar(_settings)) + if (ErrorMessage::strPlusChar()) checkOther.strPlusChar(); } //--------------------------------------------------------------------------- diff --git a/src/errormessage.h b/src/errormessage.h index 976bbb92f..bb3870bc9 100644 --- a/src/errormessage.h +++ b/src/errormessage.h @@ -1,358 +1,358 @@ -/* - * cppcheck - c/c++ syntax checking - * Copyright (C) 2007-2009 Daniel Marjamäki, Reijo Tomperi, Nicolas Le Cam - * - * This program is free software: you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation, either version 3 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program. If not, see -#include "settings.h" -class Token; -class Tokenizer; -class ErrorMessage -{ -private: - ErrorMessage() { } - static std::string msg1(const Tokenizer *tokenizer, const Token *Location); -public: - static std::string arrayIndexOutOfBounds(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Array index out of bounds"; - } - static bool arrayIndexOutOfBounds(const Settings &s) - { - return s._showAll; - } - - static std::string bufferOverrun(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Buffer overrun"; - } - static bool bufferOverrun(const Settings &s) - { - return s._showAll; - } - - static std::string outOfBounds(const Tokenizer *tokenizer, const Token *Location, const std::string &what) - { - return msg1(tokenizer, Location) + "" + what + " is out of bounds"; - } - static bool outOfBounds(const Settings &s) - { - return true; - } - - static std::string noConstructor(const Tokenizer *tokenizer, const Token *Location, const std::string &classname) - { - return msg1(tokenizer, Location) + "The class '" + classname + "' has no constructor"; - } - static bool noConstructor(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string uninitVar(const Tokenizer *tokenizer, const Token *Location, const std::string &classname, const std::string &varname) - { - return msg1(tokenizer, Location) + "Uninitialized member variable '" + classname + "::" + varname + "'"; - } - static bool uninitVar(const Settings &s) - { - return true; - } - - static std::string unusedPrivateFunction(const Tokenizer *tokenizer, const Token *Location, const std::string &classname, const std::string &funcname) - { - return msg1(tokenizer, Location) + "Unused private function '" + classname + "::" + funcname + "'"; - } - static bool unusedPrivateFunction(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string memsetClass(const Tokenizer *tokenizer, const Token *Location, const std::string &memfunc) - { - return msg1(tokenizer, Location) + "Using '" + memfunc + "' on class"; - } - static bool memsetClass(const Settings &s) - { - return true; - } - - static std::string memsetStruct(const Tokenizer *tokenizer, const Token *Location, const std::string &memfunc, const std::string &classname) - { - return msg1(tokenizer, Location) + "Using '" + memfunc + "' on struct that contains a 'std::" + classname + "'"; - } - static bool memsetStruct(const Settings &s) - { - return true; - } - - static std::string operatorEq(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "'operator=' should return something"; - } - static bool operatorEq(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string virtualDestructor(const Tokenizer *tokenizer, const Token *Location, const std::string &Base, const std::string &Derived) - { - return msg1(tokenizer, Location) + "Class " + Base + " which is inherited by class " + Derived + " does not have a virtual destructor"; - } - static bool virtualDestructor(const Settings &s) - { - return true; - } - - static std::string unusedFunction(const std::string &filename, const std::string &funcname) - { - return "[" + filename + "]: The function '" + funcname + "' is never used"; - } - static bool unusedFunction(const Settings &s) - { - return s._showAll & s._checkCodingStyle; - } - - static std::string mismatchAllocDealloc(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Mismatching allocation and deallocation: " + varname + ""; - } - static bool mismatchAllocDealloc(const Settings &s) - { - return true; - } - - static std::string memleak(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Memory leak: " + varname + ""; - } - static bool memleak(const Settings &s) - { - return true; - } - - static std::string resourceLeak(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Resource leak: " + varname + ""; - } - static bool resourceLeak(const Settings &s) - { - return true; - } - - static std::string deallocDealloc(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Deallocating a deallocated pointer: " + varname + ""; - } - static bool deallocDealloc(const Settings &s) - { - return true; - } - - static std::string cstyleCast(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "C-style pointer casting"; - } - static bool cstyleCast(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string redundantIfDelete0(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Redundant condition. It is safe to deallocate a NULL pointer"; - } - static bool redundantIfDelete0(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string redundantIfRemove(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Redundant condition. The remove function in the STL will not do anything if element doesn't exist"; - } - static bool redundantIfRemove(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string dangerousUsageStrtol(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Invalid radix in call to strtol or strtoul. Must be 0 or 2-36"; - } - static bool dangerousUsageStrtol(const Settings &s) - { - return true; - } - - static std::string ifNoAction(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Found redundant if condition - 'if (condition);'"; - } - static bool ifNoAction(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string sprintfOverlappingData(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Overlapping data buffer " + varname + ""; - } - static bool sprintfOverlappingData(const Settings &s) - { - return true; - } - - static std::string udivError(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Unsigned division. The result will be wrong."; - } - static bool udivError(const Settings &s) - { - return true; - } - - static std::string udivWarning(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Warning: Division with signed and unsigned operators"; - } - static bool udivWarning(const Settings &s) - { - return s._showAll & s._checkCodingStyle; - } - - static std::string unusedStructMember(const Tokenizer *tokenizer, const Token *Location, const std::string &structname, const std::string &varname) - { - return msg1(tokenizer, Location) + "struct or union member '" + structname + "::" + varname + "' is never used"; - } - static bool unusedStructMember(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string unreachableCode(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Unreachable code below a 'return'"; - } - static bool unreachableCode(const Settings &s) - { - return true; - } - - static std::string passedByValue(const Tokenizer *tokenizer, const Token *Location, const std::string &parname) - { - return msg1(tokenizer, Location) + "Function parameter '" + parname + "' is passed by value. It could be passed by reference instead."; - } - static bool passedByValue(const Settings &s) - { - return true; - } - - static std::string unusedVariable(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Unused variable '" + varname + "'"; - } - static bool unusedVariable(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string unreadVariable(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Variable '" + varname + "' is assigned a value that is never used"; - } - static bool unreadVariable(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string unassignedVariable(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "Variable '" + varname + "' is not assigned a value"; - } - static bool unassignedVariable(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string constStatement(const Tokenizer *tokenizer, const Token *Location, const std::string &type) - { - return msg1(tokenizer, Location) + "Redundant code: Found a statement that begins with " + type + " constant"; - } - static bool constStatement(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string charArrayIndex(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Warning - using char variable as array index"; - } - static bool charArrayIndex(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string charBitOp(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Warning - using char variable in bit operation"; - } - static bool charBitOp(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string variableScope(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) - { - return msg1(tokenizer, Location) + "The scope of the variable " + varname + " can be limited"; - } - static bool variableScope(const Settings &s) - { - return false; - } - - static std::string ifAssignment(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Assignment in if-condition"; - } - static bool ifAssignment(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string conditionAlwaysTrueFalse(const Tokenizer *tokenizer, const Token *Location, const std::string &truefalse) - { - return msg1(tokenizer, Location) + "Condition is always " + truefalse + ""; - } - static bool conditionAlwaysTrueFalse(const Settings &s) - { - return s._checkCodingStyle; - } - - static std::string strPlusChar(const Tokenizer *tokenizer, const Token *Location) - { - return msg1(tokenizer, Location) + "Unusual pointer arithmetic"; - } - static bool strPlusChar(const Settings &s) - { - return true; - } - -}; -#endif +/* + * cppcheck - c/c++ syntax checking + * Copyright (C) 2007-2009 Daniel Marjamäki, Reijo Tomperi, Nicolas Le Cam + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see +#include "settings.h" +class Token; +class Tokenizer; +class ErrorMessage +{ +private: + ErrorMessage() { } + static std::string msg1(const Tokenizer *tokenizer, const Token *Location); +public: + static std::string arrayIndexOutOfBounds(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Array index out of bounds"; + } + static bool arrayIndexOutOfBounds(const Settings &s) + { + return s._showAll; + } + + static std::string bufferOverrun(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Buffer overrun"; + } + static bool bufferOverrun(const Settings &s) + { + return s._showAll; + } + + static std::string outOfBounds(const Tokenizer *tokenizer, const Token *Location, const std::string &what) + { + return msg1(tokenizer, Location) + "" + what + " is out of bounds"; + } + static bool outOfBounds() + { + return true; + } + + static std::string noConstructor(const Tokenizer *tokenizer, const Token *Location, const std::string &classname) + { + return msg1(tokenizer, Location) + "The class '" + classname + "' has no constructor"; + } + static bool noConstructor(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string uninitVar(const Tokenizer *tokenizer, const Token *Location, const std::string &classname, const std::string &varname) + { + return msg1(tokenizer, Location) + "Uninitialized member variable '" + classname + "::" + varname + "'"; + } + static bool uninitVar() + { + return true; + } + + static std::string unusedPrivateFunction(const Tokenizer *tokenizer, const Token *Location, const std::string &classname, const std::string &funcname) + { + return msg1(tokenizer, Location) + "Unused private function '" + classname + "::" + funcname + "'"; + } + static bool unusedPrivateFunction(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string memsetClass(const Tokenizer *tokenizer, const Token *Location, const std::string &memfunc) + { + return msg1(tokenizer, Location) + "Using '" + memfunc + "' on class"; + } + static bool memsetClass() + { + return true; + } + + static std::string memsetStruct(const Tokenizer *tokenizer, const Token *Location, const std::string &memfunc, const std::string &classname) + { + return msg1(tokenizer, Location) + "Using '" + memfunc + "' on struct that contains a 'std::" + classname + "'"; + } + static bool memsetStruct() + { + return true; + } + + static std::string operatorEq(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "'operator=' should return something"; + } + static bool operatorEq(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string virtualDestructor(const Tokenizer *tokenizer, const Token *Location, const std::string &Base, const std::string &Derived) + { + return msg1(tokenizer, Location) + "Class " + Base + " which is inherited by class " + Derived + " does not have a virtual destructor"; + } + static bool virtualDestructor() + { + return true; + } + + static std::string unusedFunction(const std::string &filename, const std::string &funcname) + { + return "[" + filename + "]: The function '" + funcname + "' is never used"; + } + static bool unusedFunction(const Settings &s) + { + return s._showAll & s._checkCodingStyle; + } + + static std::string mismatchAllocDealloc(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Mismatching allocation and deallocation: " + varname + ""; + } + static bool mismatchAllocDealloc() + { + return true; + } + + static std::string memleak(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Memory leak: " + varname + ""; + } + static bool memleak() + { + return true; + } + + static std::string resourceLeak(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Resource leak: " + varname + ""; + } + static bool resourceLeak() + { + return true; + } + + static std::string deallocDealloc(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Deallocating a deallocated pointer: " + varname + ""; + } + static bool deallocDealloc() + { + return true; + } + + static std::string cstyleCast(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "C-style pointer casting"; + } + static bool cstyleCast(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string redundantIfDelete0(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Redundant condition. It is safe to deallocate a NULL pointer"; + } + static bool redundantIfDelete0(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string redundantIfRemove(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Redundant condition. The remove function in the STL will not do anything if element doesn't exist"; + } + static bool redundantIfRemove(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string dangerousUsageStrtol(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Invalid radix in call to strtol or strtoul. Must be 0 or 2-36"; + } + static bool dangerousUsageStrtol() + { + return true; + } + + static std::string ifNoAction(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Found redundant if condition - 'if (condition);'"; + } + static bool ifNoAction(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string sprintfOverlappingData(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Overlapping data buffer " + varname + ""; + } + static bool sprintfOverlappingData() + { + return true; + } + + static std::string udivError(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Unsigned division. The result will be wrong."; + } + static bool udivError() + { + return true; + } + + static std::string udivWarning(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Warning: Division with signed and unsigned operators"; + } + static bool udivWarning(const Settings &s) + { + return s._showAll & s._checkCodingStyle; + } + + static std::string unusedStructMember(const Tokenizer *tokenizer, const Token *Location, const std::string &structname, const std::string &varname) + { + return msg1(tokenizer, Location) + "struct or union member '" + structname + "::" + varname + "' is never used"; + } + static bool unusedStructMember(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string unreachableCode(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Unreachable code below a 'return'"; + } + static bool unreachableCode() + { + return true; + } + + static std::string passedByValue(const Tokenizer *tokenizer, const Token *Location, const std::string &parname) + { + return msg1(tokenizer, Location) + "Function parameter '" + parname + "' is passed by value. It could be passed by reference instead."; + } + static bool passedByValue() + { + return true; + } + + static std::string unusedVariable(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Unused variable '" + varname + "'"; + } + static bool unusedVariable(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string unreadVariable(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Variable '" + varname + "' is assigned a value that is never used"; + } + static bool unreadVariable(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string unassignedVariable(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "Variable '" + varname + "' is not assigned a value"; + } + static bool unassignedVariable(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string constStatement(const Tokenizer *tokenizer, const Token *Location, const std::string &type) + { + return msg1(tokenizer, Location) + "Redundant code: Found a statement that begins with " + type + " constant"; + } + static bool constStatement(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string charArrayIndex(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Warning - using char variable as array index"; + } + static bool charArrayIndex(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string charBitOp(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Warning - using char variable in bit operation"; + } + static bool charBitOp(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string variableScope(const Tokenizer *tokenizer, const Token *Location, const std::string &varname) + { + return msg1(tokenizer, Location) + "The scope of the variable " + varname + " can be limited"; + } + static bool variableScope() + { + return false; + } + + static std::string ifAssignment(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Assignment in if-condition"; + } + static bool ifAssignment(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string conditionAlwaysTrueFalse(const Tokenizer *tokenizer, const Token *Location, const std::string &truefalse) + { + return msg1(tokenizer, Location) + "Condition is always " + truefalse + ""; + } + static bool conditionAlwaysTrueFalse(const Settings &s) + { + return s._checkCodingStyle; + } + + static std::string strPlusChar(const Tokenizer *tokenizer, const Token *Location) + { + return msg1(tokenizer, Location) + "Unusual pointer arithmetic"; + } + static bool strPlusChar() + { + return true; + } + +}; +#endif