Anna Zaks | e00575f | 2012-01-31 19:33:39 +0000 | [diff] [blame] | 1 | // RUN: %clang_cc1 -analyze -analyzer-checker=experimental.unix.cstring.BadSizeArg -analyzer-store=region -Wno-strlcpy-strlcat-size -Wno-sizeof-array-argument -Wno-sizeof-pointer-memaccess -verify %s |
| 2 | |
| 3 | typedef __SIZE_TYPE__ size_t; |
| 4 | char *strncat(char *, const char *, size_t); |
| 5 | size_t strlen (const char *s); |
| 6 | |
| 7 | void testStrncat(const char *src) { |
| 8 | char dest[10]; |
| 9 | strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest) - 1); // expected-warning {{Potential buffer overflow. Replace with 'sizeof(dest) - strlen(dest) - 1' or use a safer 'strlcat' API}} |
| 10 | strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest)); // expected-warning {{Potential buffer overflow. Replace with}} |
| 11 | strncat(dest, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", sizeof(dest) - strlen(dest)); // expected-warning {{Potential buffer overflow. Replace with}} |
| 12 | strncat(dest, src, sizeof(src)); // expected-warning {{Potential buffer overflow. Replace with}} |
| 13 | } |