//===--- SignedCharMisuseCheck.h - clang-tidy -------------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// #ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SIGNEDCHARMISUSECHECK_H #define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SIGNEDCHARMISUSECHECK_H #include "../ClangTidyCheck.h" namespace clang { namespace tidy { namespace bugprone { /// Finds ``signed char`` -> integer conversions which might indicate a programming /// error. The basic problem with the ``signed char``, that it might store the /// non-ASCII characters as negative values. The human programmer probably /// expects that after an integer conversion the converted value matches with the /// character code (a value from [0..255]), however, the actual value is in /// [-128..127] interval. This also applies to the plain ``char`` type on /// those implementations which represent ``char`` similar to ``signed char``. /// /// For the user-facing documentation see: /// http://clang.llvm.org/extra/clang-tidy/checks/bugprone-signed-char-misuse.html class SignedCharMisuseCheck : public ClangTidyCheck { public: SignedCharMisuseCheck(StringRef Name, ClangTidyContext *Context); void storeOptions(ClangTidyOptions::OptionMap &Opts) override; void registerMatchers(ast_matchers::MatchFinder *Finder) override; void check(const ast_matchers::MatchFinder::MatchResult &Result) override; private: const std::string CharTypdefsToIgnoreList; }; } // namespace bugprone } // namespace tidy } // namespace clang #endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_BUGPRONE_SIGNEDCHARMISUSECHECK_H