OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:analyzer
(Results
76 - 100
of
334
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/clang/test/Driver/
analyze.c
1
// Verify that the
analyzer
gets the same flags as normal compilation
/external/clang/www/analyzer/
dev_cxx.html
5
<title>
Analyzer
Development: C++ Support</title>
22
those features in the static
analyzer
. Language features need to be
23
specifically modeled in the static
analyzer
so their semantics can be
26
are interested in contributing to the development of the
analyzer
to
installation.html
5
<title>Obtaining the Static
Analyzer
</title>
16
<h1>Obtaining the Static
Analyzer
</h1>
18
<p>This page describes how to download and install the
analyzer
. Once
19
the
analyzer
is installed, follow the <a
25
<p>Semi-regular pre-built binaries of the
analyzer
are available on Mac
30
the
analyzer
, we recommend that you check back here occasionally for new
40
If you wish to help contribute regular builds of the
analyzer
on other
51
directory in any special place. Uninstalling the
analyzer
is as simple
55
be supporting files for the
analyzer
that you can simply ignore. Most
60
<li><b>scan-build</b>: <tt>scan-build</tt> is the high-level command line utility for running the
analyzer
</li
[
all
...]
index.html
5
<title>Clang Static
Analyzer
</title>
20
<h1>Clang Static
Analyzer
</h1>
22
<p>The Clang Static
Analyzer
is source code analysis tool that find bugs in C
30
<p>The
analyzer
is 100% open source and is part of the <a
32
analyzer
is implemented as a C++ library that can be used by other tools and
129
href="/installation#OtherPlatforms">building the
analyzer
</a> from
144
<center><b>Viewing static
analyzer
results in Xcode 3.2</b></center>
146
<center><b>Viewing static
analyzer
results in a web browser</b></center>
160
the semantics of code. The goal of the Clang Static
Analyzer
is to provide a
167
<p>As its name implies, the Clang Static
Analyzer
is built on top of <
[
all
...]
filing_bugs.html
41
bugs</a> in LLVM's Bugzilla database against the Clang <b>Static
Analyzer
</b>
46
<p>If you are using the
analyzer
to analyze code associated with an Apple NDA
53
the
analyzer
has access to that bug database.</p>
57
<p>Please file bugs in Radar against the <b>clang - static
analyzer
</b> component.</p>
menu.html.incl
7
<li><a href="/index.html">About the
Analyzer
</a></li>
18
<li><a href="/installation.html">Obtaining the
Analyzer
</a></li>
release_notes.html
25
<li>The
analyzer
is now far more aggressive with checking conformance with Core Foundation conventions. Any function that returns a CF type must now obey the Core Foundation naming conventions, or use the <a href="/annotations.html#attr_cf_returns_retained">cf_returns_retained</a> or <a href="/annotations.html#attr_cf_returns_not_retained">cf_returns_not_retained</a> annotations.</li>
26
<li>Fixed a serious regression where the
analyzer
would not analyze Objective-C methods in class extensions.</li>
27
<li>Misc. bug fixes to improve
analyzer
precision.
38
<li>Lots of bug fixes and improvements to
analyzer
precision (fewer false positives, possibly more bugs found).
50
as a replacement to the
analyzer
bundled with Xcode, first use the <tt>set-xcode-
analyzer
</tt> script to <a href="/xcode.html">change Xcode to use
51
your version of the
analyzer
</a>. You will then need to modify one configuration file in Xcode to enable C++ analysis support. This can
90
<li>Reduces memory usage of
analyzer
by 10%</li>
/external/wpa_supplicant_8/hostapd/logwatch/
README
3
analyzer
script for parsing hostapd system log entries for logwatch.
/external/clang/test/Analysis/
NoReturn.m
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -
analyzer
-store=basic -
analyzer
-constraints=basic -verify %s
2
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -
analyzer
-store=basic -
analyzer
-constraints=range -verify %s
3
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -
analyzer
-store=region -
analyzer
-constraints=basic -verify %s
4
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -analyzer-store=region -analyzer-constraints=range -verify %
[
all
...]
array-struct.c
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental.CastToStruct -
analyzer
-store=basic -
analyzer
-constraints=basic -verify %s
2
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental.CastToStruct -
analyzer
-store=basic -
analyzer
-constraints=range -verify %s
3
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental.CastToStruct -
analyzer
-store=region -
analyzer
-constraints=basic -verify %s
4
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental.CastToStruct -analyzer-store=region -analyzer-constraints=range -ve (…)
[
all
...]
reference.cpp
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -
analyzer
-store=region -
analyzer
-constraints=range -verify %s
null-deref-ps.c
1
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -
analyzer
-checker=core,deadcode,core.experimental -std=gnu99 -verify %s -
analyzer
-constraints=basic -
analyzer
-store=basic -Wreturn-type
2
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -
analyzer
-checker=core,deadcode,core.experimental -std=gnu99 -verify %s -
analyzer
-constraints=range -
analyzer
-store=basic -Wreturn-type
3
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -
analyzer
-checker=core,deadcode,core.experimental -std=gnu99 -
analyzer
-store=region -
analyzer
-constraints=range -
analyzer
-no-purge-dead -verify %s -Wreturn-type
[
all
...]
misc-ps-eager-assume.m
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -
analyzer
-store=region -
analyzer
-constraints=range -verify -fblocks %s -
analyzer
-eagerly-assume
47
// In this test case, 'needsAnArray' is a signed char. The
analyzer
tracks
49
// promoted to 'int'. Currently the
analyzer
doesn't reason well about
86
// not maintained via sign extension. The
analyzer
doesn't properly handle
88
// case relies on -
analyzer
-eagerly-assume because of the expression
104
// Static
analyzer
skips this so either
111
//
Analyzer
skips this so Flag1 and Flag2 have th
[
all
...]
NSString.m
1
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -
analyzer
-checker=core,osx.cocoa.NilArg,osx.AtomicCAS,core.experimental -
analyzer
-store=region -
analyzer
-constraints=basic -verify %s
2
// RUN: %clang_cc1 -triple i386-apple-darwin10 -analyze -
analyzer
-checker=core,osx.cocoa.NilArg,osx.AtomicCAS,core.experimental -
analyzer
-store=region -
analyzer
-constraints=range -verify %s
3
// RUN: %clang_cc1 -DTEST_64 -triple x86_64-apple-darwin10 -analyze -
analyzer
-checker=core,osx.cocoa.NilArg,osx.AtomicCAS,core.experimental -
analyzer
-store=region -
analyzer
-constraints=basic -verify %s
4
// RUN: %clang_cc1 -DTEST_64 -triple x86_64-apple-darwin10 -analyze -
analyzer
-checker=core,osx.cocoa.NilArg,osx.AtomicCAS,core.experimental -analyzer-store=region -analyzer-con (…)
[
all
...]
cxx-crashes.cpp
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core -verify %s
no-outofbounds.c
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental,unix.experimental,security.experimental.ArrayBound -
analyzer
-store=basic -verify %s
2
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental,unix.experimental,security.experimental.ArrayBound -
analyzer
-store=region -verify %s
refcnt_naming.m
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -
analyzer
-store=basic -verify %s
2
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core,core.experimental -
analyzer
-store=region -verify %s
stack-addr-ps.c
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core -
analyzer
-store=basic -fblocks -verify %s
2
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core -
analyzer
-store=region -fblocks -verify %s
unix-fns.c
1
// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -
analyzer
-checker=unix.API,osx.API %s -
analyzer
-store=region -fblocks -verify
2
// RUN: %clang_cc1 -triple x86_64-apple-darwin10 -analyze -
analyzer
-checker=unix.API,osx.API %s -
analyzer
-store=basic -fblocks -verify
nullptr.cpp
1
// RUN: %clang_cc1 -std=c++0x -analyze -
analyzer
-checker=core -
analyzer
-store region -verify %s
rdar-6540084.m
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core.experimental -
analyzer
-checker=deadcode.DeadStores -verify %s
rdar-6541136-region.c
1
// RUN: %clang_cc1 -verify -analyze -
analyzer
-checker=core,security.experimental.ArrayBound -
analyzer
-store=region %s
stackaddrleak.c
1
// RUN: %clang_cc1 -analyze -
analyzer
-checker=core -
analyzer
-store region -verify %s
/external/srec/srec/Semproc/include/
SR_LexicalAnalyzer.h
34
* The Lexical
Analyzer
59
* @param self pointer to Lexical
Analyzer
66
* @param self pointer to Lexical
Analyzer
72
* @param self pointer to Lexical
Analyzer
/external/bluetooth/hcidump/
README
7
Bluetooth packet
analyzer
13
In order to compile Bluetooth
analyzer
you need following software packages:
Completed in 96 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>