Skip to content

Commit c73e6f1

Browse files
committed
C++: Accept more test changes.
1 parent 9aafbfc commit c73e6f1

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,24 @@
11
edges
22
| tests.c:16:26:16:29 | argv indirection | tests.c:28:22:28:28 | access to array indirection |
33
| tests.c:16:26:16:29 | argv indirection | tests.c:29:28:29:34 | access to array indirection |
4+
| tests.c:16:26:16:29 | argv indirection | tests.c:31:15:31:23 | buffer100 indirection |
5+
| tests.c:16:26:16:29 | argv indirection | tests.c:33:21:33:29 | buffer100 indirection |
46
| tests.c:16:26:16:29 | argv indirection | tests.c:34:10:34:16 | access to array indirection |
57
nodes
68
| tests.c:16:26:16:29 | argv indirection | semmle.label | argv indirection |
79
| tests.c:28:22:28:28 | access to array indirection | semmle.label | access to array indirection |
810
| tests.c:29:28:29:34 | access to array indirection | semmle.label | access to array indirection |
11+
| tests.c:31:15:31:23 | buffer100 indirection | semmle.label | buffer100 indirection |
912
| tests.c:31:15:31:23 | scanf output argument | semmle.label | scanf output argument |
13+
| tests.c:33:21:33:29 | buffer100 indirection | semmle.label | buffer100 indirection |
1014
| tests.c:33:21:33:29 | scanf output argument | semmle.label | scanf output argument |
1115
| tests.c:34:10:34:16 | access to array indirection | semmle.label | access to array indirection |
1216
subpaths
1317
#select
1418
| tests.c:28:3:28:9 | call to sprintf | tests.c:16:26:16:29 | argv indirection | tests.c:28:22:28:28 | access to array indirection | This 'call to sprintf' with input from $@ may overflow the destination. | tests.c:16:26:16:29 | argv indirection | a command-line argument |
1519
| tests.c:29:3:29:9 | call to sprintf | tests.c:16:26:16:29 | argv indirection | tests.c:29:28:29:34 | access to array indirection | This 'call to sprintf' with input from $@ may overflow the destination. | tests.c:16:26:16:29 | argv indirection | a command-line argument |
20+
| tests.c:31:15:31:23 | buffer100 | tests.c:16:26:16:29 | argv indirection | tests.c:31:15:31:23 | buffer100 indirection | This 'scanf string argument' with input from $@ may overflow the destination. | tests.c:16:26:16:29 | argv indirection | a command-line argument |
1621
| tests.c:31:15:31:23 | buffer100 | tests.c:31:15:31:23 | scanf output argument | tests.c:31:15:31:23 | scanf output argument | This 'scanf string argument' with input from $@ may overflow the destination. | tests.c:31:15:31:23 | scanf output argument | value read by scanf |
22+
| tests.c:33:21:33:29 | buffer100 | tests.c:16:26:16:29 | argv indirection | tests.c:33:21:33:29 | buffer100 indirection | This 'scanf string argument' with input from $@ may overflow the destination. | tests.c:16:26:16:29 | argv indirection | a command-line argument |
1723
| tests.c:33:21:33:29 | buffer100 | tests.c:33:21:33:29 | scanf output argument | tests.c:33:21:33:29 | scanf output argument | This 'scanf string argument' with input from $@ may overflow the destination. | tests.c:33:21:33:29 | scanf output argument | value read by scanf |
1824
| tests.c:34:25:34:33 | buffer100 | tests.c:16:26:16:29 | argv indirection | tests.c:34:10:34:16 | access to array indirection | This 'sscanf string argument' with input from $@ may overflow the destination. | tests.c:16:26:16:29 | argv indirection | a command-line argument |

0 commit comments

Comments
 (0)