]> git.ipfire.org Git - thirdparty/suricata.git/commitdiff
app-layer-tls-handshake: code cleanup
authorMats Klepsland <mats.klepsland@gmail.com>
Fri, 1 Apr 2016 09:48:44 +0000 (11:48 +0200)
committerVictor Julien <victor@inliniac.net>
Mon, 11 Apr 2016 12:12:30 +0000 (14:12 +0200)
src/app-layer-tls-handshake.c

index 1161f61aa3b03037444840e26adeb76d98cfa236..9f034016cb46424602d251b7c003eb4ba229b60a 100644 (file)
 #include "decode.h"
 
 #include "app-layer-parser.h"
-#include "decode-events.h"
-
 #include "app-layer-ssl.h"
-
 #include "app-layer-tls-handshake.h"
+#include "decode-events.h"
 
 #include "util-decode-der.h"
 #include "util-decode-der-get.h"
-
 #include "util-crypt.h"
 
 #define SSLV3_RECORD_LEN 5
 
-static void TLSCertificateErrCodeToWarning(SSLState *ssl_state, uint32_t errcode)
+static void TLSCertificateErrCodeToWarning(SSLState *ssl_state,
+                                           uint32_t errcode)
 {
     if (errcode == 0)
         return;
@@ -83,7 +81,8 @@ static void TLSCertificateErrCodeToWarning(SSLState *ssl_state, uint32_t errcode
     };
 }
 
-int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input, uint32_t input_len)
+int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input,
+                                        uint32_t input_len)
 {
     uint32_t certificates_length, cur_cert_length;
     int i;
@@ -126,20 +125,25 @@ int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input, uin
         }
 
         if (input - start_data + cur_cert_length > input_len) {
-            AppLayerDecoderEventsSetEvent(ssl_state->f, TLS_DECODER_EVENT_INVALID_CERTIFICATE);
+            AppLayerDecoderEventsSetEvent(ssl_state->f,
+                    TLS_DECODER_EVENT_INVALID_CERTIFICATE);
             return -1;
         }
+
         cert = DecodeDer(input, cur_cert_length, &errcode);
         if (cert == NULL) {
             TLSCertificateErrCodeToWarning(ssl_state, errcode);
         }
+
         if (cert != NULL) {
             rc = Asn1DerGetSubjectDN(cert, buffer, sizeof(buffer), &errcode);
+
             if (rc != 0) {
                 TLSCertificateErrCodeToWarning(ssl_state, errcode);
             } else {
                 SSLCertsChain *ncert;
                 //SCLogInfo("TLS Cert %d: %s\n", i, buffer);
+
                 if (i == 0) {
                     if (ssl_state->server_connp.cert0_subject == NULL)
                         ssl_state->server_connp.cert0_subject = SCStrdup(buffer);
@@ -148,16 +152,19 @@ int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input, uin
                         return -1;
                     }
                 }
+
                 ncert = (SSLCertsChain *)SCMalloc(sizeof(SSLCertsChain));
                 if (ncert == NULL) {
                     DerFree(cert);
                     return -1;
                 }
+
                 memset(ncert, 0, sizeof(*ncert));
                 ncert->cert_data = input;
                 ncert->cert_len = cur_cert_length;
                 TAILQ_INSERT_TAIL(&ssl_state->server_connp.certs, ncert, next);
             }
+
             rc = Asn1DerGetIssuerDN(cert, buffer, sizeof(buffer), &errcode);
             if (rc != 0) {
                 TLSCertificateErrCodeToWarning(ssl_state, errcode);
@@ -172,6 +179,7 @@ int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input, uin
                     }
                 }
             }
+
             DerFree(cert);
 
             if (i == 0 && ssl_state->server_connp.cert0_fingerprint == NULL) {
@@ -188,7 +196,8 @@ int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input, uin
                     // TODO maybe an event here?
                 } else {
                     for (j = 0; j < hash_len; j++, p += 3) {
-                        snprintf(p, 4, j == hash_len - 1 ? "%02x" : "%02x:", hash[j]);
+                        snprintf(p, 4, j == hash_len - 1 ? "%02x" : "%02x:",
+                                hash[j]);
                     }
                     SCFree(hash);
                     ssl_state->server_connp.cert0_fingerprint = SCStrdup(out);
@@ -200,7 +209,6 @@ int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input, uin
                 ssl_state->server_connp.cert_input = input;
                 ssl_state->server_connp.cert_input_len = cur_cert_length;
             }
-
         }
 
         i++;
@@ -210,6 +218,5 @@ int DecodeTLSHandshakeServerCertificate(SSLState *ssl_state, uint8_t *input, uin
     }
 
     return parsed;
-
 }