Lines Matching defs:strcpy
330 // strcpy()
338 #define strcpy(a,b) __strcpy_chk(a,b,(size_t)-1)
342 #define strcpy BUILTIN(strcpy)
343 char *strcpy(char *restrict s1, const char *restrict s2);
349 strcpy(NULL, x); // expected-warning{{Null pointer passed as 1st argument to string copy function}}
353 strcpy(x, NULL); // expected-warning{{Null pointer passed as 2nd argument to string copy function}}
357 strcpy(x, (char*)&strcpy_fn); // expected-warning{{Argument to string copy function is the address of the function 'strcpy_fn', which is not a null-terminated string}}
361 strcpy(x, (const char*)&strcpy_fn); // expected-warning{{Argument to string copy function is the address of the function 'strcpy_fn', which is not a null-terminated string}}
365 strcpy((char*)&strcpy_fn, x); // expected-warning{{Argument to string copy function is the address of the function 'strcpy_fn', which is not a null-terminated string}}
374 clang_analyzer_eval(strcpy(x, y) == x); // expected-warning{{TRUE}}
384 strcpy(x, y); // expected-warning{{String copy function overflows the destination buffer}}
391 strcpy(x, y); // no-warning
399 strcpy(**type_punned_ptr, &c); // no-crash
1578 strcpy(privkey, "random");
1720 strcpy(x, "12\0"); // expected-warning{{String copy function overflows the destination buffer}}
1725 strcpy(x, "12\0");
1733 strcpy(p, "src"); // expected-warning {{String copy function overflows the destination buffer}}
1745 strcpy(data, source); // expected-warning {{String copy function overflows the destination buffer}}