From 37850959659bdd6f9fed3ed93f3626e2a0db9644 Mon Sep 17 00:00:00 2001 From: Manoj Garai Date: Thu, 19 Jun 2025 11:36:47 +0100 Subject: [PATCH 1/3] Update version of github action --- .github/workflows/codeql-analysis.yml | 11 ++++++---- .../java/net/sf/portecle/crypto/X509Ext.java | 22 +++++++++---------- 2 files changed, 18 insertions(+), 15 deletions(-) diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml index f16f958..3adda2e 100644 --- a/.github/workflows/codeql-analysis.yml +++ b/.github/workflows/codeql-analysis.yml @@ -18,7 +18,7 @@ on: # The branches below must be a subset of the branches above branches: [ main ] schedule: - - cron: '26 13 * * 0' + - cron: '10 10 * * 1' jobs: analyze: @@ -38,11 +38,11 @@ jobs: steps: - name: Checkout repository - uses: actions/checkout@v2 + uses: actions/checkout@v4 # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@v1 + uses: github/codeql-action/init@v3 with: languages: ${{ matrix.language }} # If you wish to specify custom queries, you can do so here or in a config file. @@ -50,6 +50,9 @@ jobs: # Prefix the list here with "+" to use these queries and those in the config file. # queries: ./path/to/local/query, your-org/your-repo/queries@main + # Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs + queries: security-extended,security-and-quality + # Autobuild attempts to build any compiled languages (C/C++, C#, or Java). # If this step fails, then you should remove it and run the build manually (see below) #- name: Autobuild @@ -67,4 +70,4 @@ jobs: mvn compile - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v1 + uses: github/codeql-action/analyze@v3 diff --git a/src/main/java/net/sf/portecle/crypto/X509Ext.java b/src/main/java/net/sf/portecle/crypto/X509Ext.java index 926320f..658a175 100644 --- a/src/main/java/net/sf/portecle/crypto/X509Ext.java +++ b/src/main/java/net/sf/portecle/crypto/X509Ext.java @@ -876,7 +876,7 @@ private String getPolicyConstraintsStringValue(byte[] bValue) for (int i = 0, len = policyConstraints.size(); i < len; i++) { DERTaggedObject policyConstraint = (DERTaggedObject) policyConstraints.getObjectAt(i); - ASN1Integer skipCerts = new ASN1Integer(((DEROctetString) policyConstraint.getObject()).getOctets()); + ASN1Integer skipCerts = new ASN1Integer(((DEROctetString) policyConstraint.getBaseObject()).getOctets()); int iSkipCerts = skipCerts.getValue().intValue(); switch (policyConstraint.getTagNo()) @@ -1203,18 +1203,18 @@ private String getLogotypeStringValue(byte[] bValue) sb.append(RB.getString("CommunityLogos")); // TODO sb.append("
"); - sb.append(stringify(derTag.getObject())); + sb.append(stringify(derTag.getBaseObject())); break; case 1: sb.append("