mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 06:38:20 +00:00
SSL/TLS CertificateRequest message: Address review feedback
Minor stylistic changes; see https://github.com/zeek/zeek/pull/2855 for details
This commit is contained in:
parent
b56b856da9
commit
b8d658ac77
4 changed files with 13 additions and 11 deletions
|
@ -76,7 +76,6 @@ function set_keys%(c: connection, keys: string%): bool
|
|||
## .. zeek:see:: ssl_certificate_request
|
||||
function parse_distinguished_name%(dn: string%): string
|
||||
%{
|
||||
std::string out = "";
|
||||
const unsigned char* in = dn->Bytes();
|
||||
|
||||
X509_NAME* dn_x509 = d2i_X509_NAME(nullptr, &in, dn->Len());
|
||||
|
@ -92,8 +91,8 @@ function parse_distinguished_name%(dn: string%): string
|
|||
|
||||
X509_NAME_print_ex(bio, dn_x509, 0, XN_FLAG_RFC2253);
|
||||
int len = BIO_gets(bio, buf, sizeof(buf));
|
||||
out.assign(buf, len);
|
||||
auto out = zeek::make_intrusive<zeek::StringVal>(len, buf);
|
||||
BIO_free(bio);
|
||||
X509_NAME_free(dn_x509);
|
||||
return zeek::make_intrusive<zeek::StringVal>(out);
|
||||
return out;
|
||||
%}
|
||||
|
|
|
@ -631,7 +631,7 @@ refine connection Handshake_Conn += {
|
|||
if ( ! ssl_certificate_request )
|
||||
return true;
|
||||
|
||||
auto ctlist = zeek::make_intrusive<zeek::VectorVal>(zeek::id::find_type<zeek::VectorType>("index_vec"));
|
||||
auto ctlist = zeek::make_intrusive<zeek::VectorVal>(zeek::id::index_vec);
|
||||
auto ctypes = ${req.certificate_types};
|
||||
|
||||
if ( ctypes )
|
||||
|
@ -656,11 +656,14 @@ refine connection Handshake_Conn += {
|
|||
}
|
||||
|
||||
|
||||
auto calist = zeek::make_intrusive<zeek::VectorVal>(zeek::id::find_type<zeek::VectorType>("string_vec"));
|
||||
auto calist = zeek::make_intrusive<zeek::VectorVal>(zeek::id::string_vec);
|
||||
auto certificate_authorities = ${req.certificate_authorities.certificate_authorities};
|
||||
if ( certificate_authorities )
|
||||
for ( unsigned int i = 0; i < certificate_authorities->size(); ++i )
|
||||
calist->Assign(i, zeek::make_intrusive<zeek::StringVal>((*certificate_authorities)[i]->certificate_authority().length(), (const char*) (*certificate_authorities)[i]->certificate_authority().data()));
|
||||
{
|
||||
auto ca = (*certificate_authorities)[i]->certificate_authority();
|
||||
calist->Assign(i, zeek::make_intrusive<zeek::StringVal>(ca.length(), (const char*) ca.data()));
|
||||
}
|
||||
|
||||
zeek::BifEvent::enqueue_ssl_certificate_request(zeek_analyzer(), zeek_analyzer()->Conn(), ${rec.is_orig} ^ flipped_, ctlist, slist, calist);
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue