Skip to content
This repository was archived by the owner on Jan 5, 2023. It is now read-only.

Commit 5c8534f

Browse files
committed
EXCUSED -> OK
1 parent d0c7618 commit 5c8534f

File tree

1 file changed

+27
-27
lines changed

1 file changed

+27
-27
lines changed

ql/test/experimental/CWE-327/UnsafeTLS.go

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -114,13 +114,13 @@ func minMaxTlsVersion() {
114114
}
115115
if insecureFlag {
116116
config := &tls.Config{
117-
MinVersion: 0, // EXCUSED (guarded by a flag suggesting deliberate insecurity)
117+
MinVersion: 0, // OK (guarded by a flag suggesting deliberate insecurity)
118118
}
119119
_ = config
120120
}
121121
if oldVersionFlag {
122122
config := &tls.Config{
123-
MinVersion: 0, // EXCUSED (guarded by a flag suggesting deliberate legacy support)
123+
MinVersion: 0, // OK (guarded by a flag suggesting deliberate legacy support)
124124
}
125125
_ = config
126126
}
@@ -130,7 +130,7 @@ func minMaxTlsVersion() {
130130
if unknown {
131131
version = tls.VersionTLS13
132132
} else {
133-
version = tls.VersionSSL30 // EXCUSED (flows together with a modern version, suggesting configurable security)
133+
version = tls.VersionSSL30 // OK (flows together with a modern version, suggesting configurable security)
134134
}
135135
config := &tls.Config{
136136
MinVersion: version,
@@ -143,7 +143,7 @@ func minMaxTlsVersion() {
143143
if unknown {
144144
config.MinVersion = tls.VersionTLS13
145145
} else {
146-
config.MinVersion = tls.VersionSSL30 // EXCUSED (flows together with a modern version, suggesting configurable security)
146+
config.MinVersion = tls.VersionSSL30 // OK (flows together with a modern version, suggesting configurable security)
147147
}
148148
_ = config
149149
}
@@ -153,47 +153,47 @@ func minMaxTlsVersion() {
153153
if unknown {
154154
config.MinVersion = tls.VersionTLS13
155155
} else {
156-
config.MinVersion = tls.VersionSSL30 // EXCUSED (flows together with a modern version, suggesting configurable security)
156+
config.MinVersion = tls.VersionSSL30 // OK (flows together with a modern version, suggesting configurable security)
157157
}
158158
_ = config
159159
}
160160
///
161161
{
162162
insecureConfig := &tls.Config{
163-
MinVersion: 0, // EXCUSED (var name suggests deliberate insecurity)
163+
MinVersion: 0, // OK (var name suggests deliberate insecurity)
164164
}
165165
_ = insecureConfig
166166
}
167167
///
168168
{
169169
legacyConfig := &tls.Config{
170-
MinVersion: 0, // EXCUSED (var name suggests deliberate legacy support)
170+
MinVersion: 0, // OK (var name suggests deliberate legacy support)
171171
}
172172
_ = legacyConfig
173173
}
174174
///
175175
{
176176
var insecureConfig tls.Config
177-
insecureConfig.MinVersion = 0 // EXCUSED (var name suggests deliberate insecurity)
177+
insecureConfig.MinVersion = 0 // OK (var name suggests deliberate insecurity)
178178
_ = insecureConfig
179179
}
180180
///
181181
{
182182
var legacyConfig tls.Config
183-
legacyConfig.MinVersion = 0 // EXCUSED (var name suggests deliberate legacy support)
183+
legacyConfig.MinVersion = 0 // OK (var name suggests deliberate legacy support)
184184
_ = legacyConfig
185185
}
186186
///
187187
{
188188
switch unknown {
189189
case oldVersionFlag:
190190
config := &tls.Config{
191-
MinVersion: 0, // EXCUSED (switch-case name suggests legacy support)
191+
MinVersion: 0, // OK (switch-case name suggests legacy support)
192192
}
193193
_ = config
194194
case insecureFlag:
195195
config := &tls.Config{
196-
MinVersion: 0, // EXCUSED (switch-case name suggests insecurity)
196+
MinVersion: 0, // OK (switch-case name suggests insecurity)
197197
}
198198
_ = config
199199
default:
@@ -206,12 +206,12 @@ func minMaxTlsVersion() {
206206
switch os.Args[0] {
207207
case "oldVersionFlag":
208208
config := &tls.Config{
209-
MinVersion: 0, // EXCUSED (switch-case name suggests legacy support)
209+
MinVersion: 0, // OK (switch-case name suggests legacy support)
210210
}
211211
_ = config
212212
case "insecureFlag":
213213
config := &tls.Config{
214-
MinVersion: 0, // EXCUSED (switch-case name suggests insecurity)
214+
MinVersion: 0, // OK (switch-case name suggests insecurity)
215215
}
216216
_ = config
217217
default:
@@ -224,7 +224,7 @@ func minMaxTlsVersion() {
224224
///
225225
if insecureFunc() {
226226
config := &tls.Config{
227-
MinVersion: 0, // EXCUSED (guarded by function call suggesting deliberate insecurity)
227+
MinVersion: 0, // OK (guarded by function call suggesting deliberate insecurity)
228228
}
229229
_ = config
230230
}
@@ -233,21 +233,21 @@ func minMaxTlsVersion() {
233233
isInsecurePtr := &isInsecure
234234
if *isInsecurePtr {
235235
config := &tls.Config{
236-
MinVersion: 0, // EXCUSED (guarded by pointer deref suggesting deliberate insecurity)
236+
MinVersion: 0, // OK (guarded by pointer deref suggesting deliberate insecurity)
237237
}
238238
_ = config
239239
}
240240
///
241241
if os.Getenv("DISABLE_TLS_VERIFICATION") == "true" {
242242
config := &tls.Config{
243-
MinVersion: 0, // EXCUSED (guarded by environment variable)
243+
MinVersion: 0, // OK (guarded by environment variable)
244244
}
245245
_ = config
246246
}
247247
///
248248
if isInsecure == true {
249249
config := &tls.Config{
250-
MinVersion: 0, // EXCUSED (guarded by comparison)
250+
MinVersion: 0, // OK (guarded by comparison)
251251
}
252252
_ = config
253253
}
@@ -368,46 +368,46 @@ func cipherSuites() {
368368
if insecureFlag {
369369
config := &tls.Config{
370370
CipherSuites: []uint16{
371-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (guarded by a flag suggesting deliberate insecurity)
371+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (guarded by a flag suggesting deliberate insecurity)
372372
},
373373
}
374374
_ = config
375375
}
376376
if oldVersionFlag {
377377
config := &tls.Config{
378378
CipherSuites: []uint16{
379-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (guarded by a flag suggesting deliberate legacy support)
379+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (guarded by a flag suggesting deliberate legacy support)
380380
},
381381
}
382382
_ = config
383383
}
384384
{
385385
insecureConfig := &tls.Config{
386386
CipherSuites: []uint16{
387-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (var name suggests deliberate insecurity)
387+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (var name suggests deliberate insecurity)
388388
},
389389
}
390390
_ = insecureConfig
391391
}
392392
{
393393
legacyConfig := &tls.Config{
394394
CipherSuites: []uint16{
395-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (var name suggests deliberate legacy support)
395+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (var name suggests deliberate legacy support)
396396
},
397397
}
398398
_ = legacyConfig
399399
}
400400
{
401401
var insecureConfig tls.Config
402402
insecureConfig.CipherSuites = []uint16{
403-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (var name suggests deliberate insecurity)
403+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (var name suggests deliberate insecurity)
404404
}
405405
_ = insecureConfig
406406
}
407407
{
408408
var legacyConfig tls.Config
409409
legacyConfig.CipherSuites = []uint16{
410-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (var name suggests deliberate legacy support)
410+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (var name suggests deliberate legacy support)
411411
}
412412
_ = legacyConfig
413413
}
@@ -416,14 +416,14 @@ func cipherSuites() {
416416
case oldVersionFlag:
417417
config := &tls.Config{
418418
CipherSuites: []uint16{
419-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (switch-case name suggests legacy support)
419+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (switch-case name suggests legacy support)
420420
},
421421
}
422422
_ = config
423423
case insecureFlag:
424424
config := &tls.Config{
425425
CipherSuites: []uint16{
426-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (switch-case name suggests insecurity)
426+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (switch-case name suggests insecurity)
427427
},
428428
}
429429
_ = config
@@ -440,14 +440,14 @@ func cipherSuites() {
440440
case "oldVersionFlag":
441441
config := &tls.Config{
442442
CipherSuites: []uint16{
443-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (switch-case name suggests legacy support)
443+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (switch-case name suggests legacy support)
444444
},
445445
}
446446
_ = config
447447
case "insecureFlag":
448448
config := &tls.Config{
449449
CipherSuites: []uint16{
450-
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // EXCUSED (switch-case name suggests insecurity)
450+
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, // OK (switch-case name suggests insecurity)
451451
},
452452
}
453453
_ = config

0 commit comments

Comments
 (0)