Skip to content

Commit 5f3c8fe

Browse files
committed
Privacy markers and fixed imports
1 parent 3100e98 commit 5f3c8fe

36 files changed

+72
-59
lines changed

java/ql/lib/semmle/code/java/security/ArithmeticTaintedLocalQuery.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/** Provides taint-tracking configurations to reason about arithmetic using local-user-controlled data. */
22

33
import java
4-
import semmle.code.java.dataflow.FlowSources
5-
import semmle.code.java.security.ArithmeticCommon
4+
private import semmle.code.java.dataflow.FlowSources
5+
private import semmle.code.java.security.ArithmeticCommon
66

77
/**
88
* A taint-tracking configuration to reason about arithmetic overflow using local-user-controlled data.

java/ql/lib/semmle/code/java/security/ArithmeticUncontrolledQuery.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
/** Provides taint-tracking configuration to reason about arithmetic with uncontrolled values. */
22

33
import java
4-
import semmle.code.java.dataflow.TaintTracking
4+
private import semmle.code.java.dataflow.TaintTracking
55
private import semmle.code.java.security.RandomQuery
66
private import semmle.code.java.security.SecurityTests
77
private import semmle.code.java.security.ArithmeticCommon

java/ql/lib/semmle/code/java/security/ArithmeticWithExtremeValuesQuery.qll

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/** Provides predicates and classes for reasoning about arithmetic with extreme values. */
22

33
import java
4-
import semmle.code.java.dataflow.DataFlow
5-
import ArithmeticCommon
4+
private import semmle.code.java.dataflow.DataFlow
5+
private import semmle.code.java.security.ArithmeticCommon
66

77
/**
88
* A field representing an extreme value.
@@ -14,12 +14,12 @@ abstract class ExtremeValueField extends Field {
1414
}
1515

1616
/** A field representing the minimum value of a primitive type. */
17-
class MinValueField extends ExtremeValueField {
17+
private class MinValueField extends ExtremeValueField {
1818
MinValueField() { this.getName() = "MIN_VALUE" }
1919
}
2020

2121
/** A field representing the maximum value of a primitive type. */
22-
class MaxValueField extends ExtremeValueField {
22+
private class MaxValueField extends ExtremeValueField {
2323
MaxValueField() { this.getName() = "MAX_VALUE" }
2424
}
2525

java/ql/lib/semmle/code/java/security/BrokenCryptoAlgorithmQuery.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/** Provides to taint-tracking configuration to reason about the use of broken or risky cryptographic algorithms. */
22

33
import java
4-
import semmle.code.java.security.Encryption
5-
import semmle.code.java.dataflow.TaintTracking
4+
private import semmle.code.java.security.Encryption
5+
private import semmle.code.java.dataflow.TaintTracking
66

77
private class ShortStringLiteral extends StringLiteral {
88
ShortStringLiteral() { this.getValue().length() < 100 }

java/ql/lib/semmle/code/java/security/ExecTaintedLocalQuery.qll

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ private import semmle.code.java.security.ExternalProcess
66
private import semmle.code.java.security.CommandArguments
77

88
/** A taint-tracking configuration to reason about use of externally controlled strings to make command line commands. */
9-
module LocalUserInputToArgumentToExecFlowConfig implements DataFlow::ConfigSig {
9+
module ExecTaintedLocalConfig implements DataFlow::ConfigSig {
1010
predicate isSource(DataFlow::Node src) { src instanceof LocalUserInput }
1111

1212
predicate isSink(DataFlow::Node sink) { sink.asExpr() instanceof ArgumentToExec }
@@ -23,5 +23,4 @@ module LocalUserInputToArgumentToExecFlowConfig implements DataFlow::ConfigSig {
2323
/**
2424
* Taint-tracking flow for use of externally controlled strings to make command line commands.
2525
*/
26-
module LocalUserInputToArgumentToExecFlow =
27-
TaintTracking::Global<LocalUserInputToArgumentToExecFlowConfig>;
26+
module ExecTaintedLocalFlow = TaintTracking::Global<ExecTaintedLocalConfig>;

java/ql/lib/semmle/code/java/security/ExternallyControlledFormatStringLocalQuery.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/** Provides a taint-tracking configuration to reason about externally-controlled format strings from local sources. */
22

33
import java
4-
import semmle.code.java.dataflow.FlowSources
5-
import semmle.code.java.StringFormat
4+
private import semmle.code.java.dataflow.FlowSources
5+
private import semmle.code.java.StringFormat
66

77
/** A taint-tracking configuration to reason about externally-controlled format strings from local sources. */
88
module ExternallyControlledFormatStringLocalConfig implements DataFlow::ConfigSig {

java/ql/lib/semmle/code/java/security/ImproperValidationOfArrayConstructionCodeSpecifiedQuery.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/** Provides a dataflow configuration to reason about improper validation of code-specified size used for array construction. */
22

33
import java
4-
import semmle.code.java.security.internal.ArraySizing
5-
import semmle.code.java.dataflow.TaintTracking
4+
private import semmle.code.java.security.internal.ArraySizing
5+
private import semmle.code.java.dataflow.TaintTracking
66

77
/**
88
* A dataflow configuration to reason about improper validation of code-specified size used for array construction.

java/ql/lib/semmle/code/java/security/ImproperValidationOfArrayConstructionLocalQuery.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/** Provides a taint-tracking configuration to reason about improper validation of local user-provided size used for array construction. */
22

33
import java
4-
import semmle.code.java.security.internal.ArraySizing
5-
import semmle.code.java.dataflow.FlowSources
4+
private import semmle.code.java.security.internal.ArraySizing
5+
private import semmle.code.java.dataflow.FlowSources
66

77
/**
88
* A taint-tracking configuration to reason about improper validation of local user-provided size used for array construction.

java/ql/lib/semmle/code/java/security/ImproperValidationOfArrayConstructionQuery.qll

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
/** Provides a taint-tracking configuration to reason about improper validation of user-provided size used for array construction. */
22

33
import java
4-
import semmle.code.java.security.internal.ArraySizing
5-
import semmle.code.java.dataflow.FlowSources
4+
private import semmle.code.java.security.internal.ArraySizing
5+
private import semmle.code.java.dataflow.FlowSources
66

77
/**
88
* A taint-tracking configuration to reason about improper validation of user-provided size used for array construction.
99
*/
10-
private module ImproperValidationOfArrayConstructionConfig implements DataFlow::ConfigSig {
10+
module ImproperValidationOfArrayConstructionConfig implements DataFlow::ConfigSig {
1111
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
1212

1313
predicate isSink(DataFlow::Node sink) {

java/ql/lib/semmle/code/java/security/ImproperValidationOfArrayIndexCodeSpecifiedQuery.qll

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
/** Provides a dataflow configuration to reason about improper validation of code-specified array index. */
22

33
import java
4-
import semmle.code.java.security.internal.ArraySizing
5-
import semmle.code.java.security.internal.BoundingChecks
6-
import semmle.code.java.dataflow.TaintTracking
4+
private import semmle.code.java.security.internal.ArraySizing
5+
private import semmle.code.java.security.internal.BoundingChecks
6+
private import semmle.code.java.dataflow.DataFlow
77

88
/**
99
* A dataflow configuration to reason about improper validation of code-specified array index.

0 commit comments

Comments
 (0)