mirror of
https://github.com/github/codeql.git
synced 2026-04-20 14:34:04 +02:00
Swift: Address QL-for-QL alerts.
This commit is contained in:
@@ -42,9 +42,8 @@ class WeakPasswordHashingAdditionalFlowStep extends Unit {
|
||||
* for the weak sensitive data hashing query is a sink for weak password
|
||||
* hashing as well.
|
||||
*/
|
||||
private class InheritedWeakPasswordHashingSink extends WeakPasswordHashingSink {
|
||||
InheritedWeakPasswordHashingSink() { this instanceof WeakSensitiveDataHashingSink }
|
||||
|
||||
private class InheritedWeakPasswordHashingSink extends WeakPasswordHashingSink instanceof WeakSensitiveDataHashingSink
|
||||
{
|
||||
override string getAlgorithm() { result = this.(WeakSensitiveDataHashingSink).getAlgorithm() }
|
||||
}
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
|
||||
import swift
|
||||
import codeql.swift.security.SensitiveExprs
|
||||
import codeql.swift.dataflow.DataFlow
|
||||
import codeql.swift.dataflow.TaintTracking
|
||||
import codeql.swift.security.WeakPasswordHashingExtensions
|
||||
|
||||
|
||||
@@ -26,7 +26,7 @@
|
||||
<strong>Brute force</strong>. If you know a hash value <code>h(x)</code>,
|
||||
you should not be able to find an input <code>y</code> that computes to that hash value
|
||||
using brute force attacks without significant computational effort.
|
||||
<li>
|
||||
</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
|
||||
Reference in New Issue
Block a user