Example usage for org.objectweb.asm Opcodes interface-usage

List of usage examples for org.objectweb.asm Opcodes interface-usage

Introduction

In this page you can find the example usage for org.objectweb.asm Opcodes interface-usage.

Usage

From source file jtaint.FileAdapter.java

/** Instrument the java.io.File class to prevent directory traversal attacks.
 * Specifically, let the pathname of a File object be p, and its untainted
 * prefix be u. We require that 
 * File(p).getCanonicalPath().startsWith(File(u).getCanonicalPath()).
 * Or in other words, an untrusted suffix must not 'escape' from the untainted
 * prefix of a file path. 

From source file jtaint.FilterAdapter.java

final class FilterAdapter extends ClassAdapter implements Opcodes {
    private String className;
    private Set xssMethods;

    public FilterAdapter(ClassVisitor cv, FilterContextAdapter ftc) {
        super(cv);

From source file jtaint.FilterContextAdapter.java

final class FilterContextAdapter extends ClassAdapter implements Opcodes {
    private boolean instrumented;

    public FilterContextAdapter(ClassVisitor cv) {
        super(cv);
    }

From source file jtaint.GenericContextAdapter.java

class GenericContextAdapter extends ClassAdapter implements Opcodes {
    private String className;
    private boolean skip;
    private final Map methods;
    private Map instrumentedMethods;

From source file jtaint.InstrumentationLockBuilder.java

public abstract class InstrumentationLockBuilder implements Opcodes {
    protected final MethodVisitor mv;
    protected final int version;
    protected final String className, methodName, methodDesc;

    public InstrumentationLockBuilder(MethodVisitor mv, int version, String className, String methodName,

From source file jtaint.MethodDecl.java

public class MethodDecl implements Opcodes {
    private final int acc;
    private final String name;
    private final String desc;

    public MethodDecl(int acc, String name, String desc) {

From source file jtaint.ProcessBuilderAdapter.java

/** Instrument java.lang.ProcessBuilder to prevent command injection attacks.
 * Forbid the pathname of the program to be tainted. Tainted arguments, however,
 * are allowed. Validation checks are inserted into the command methods and
 * the constructors.
 */

From source file jtaint.RemappingMiscClassAdapter.java

public class RemappingMiscClassAdapter extends RemappingClassAdapter implements Opcodes {
    private static final Map logMap;
    private static final Map xssMap;

    static {
        HashMap h = new HashMap();

From source file jtaint.RemappingStringClassAdapter.java

public class RemappingStringClassAdapter extends RemappingClassAdapter implements Opcodes {
    private static final Map stringMap;
    private static File baseDir;
    private String className;

    static {

From source file jtaint.RuntimeAdapter.java

/** Instrument java.lang.Runtime to prevent command injection attacks.
 * Forbid the pathname of the program to be tainted. Tainted arguments, however,
 * are allowed. Validation checks are inserted into the exec methods.
 */

public class RuntimeAdapter extends StubAdapter implements Opcodes {