#include "zeek/analyzer/protocol/ssl/SSL.h" #include "zeek/analyzer/protocol/tcp/TCP_Reassembler.h" #include "zeek/Reporter.h" #include "zeek/util.h" #include "analyzer/protocol/ssl/events.bif.h" #include "analyzer/protocol/ssl/ssl_pac.h" #include "analyzer/protocol/ssl/tls-handshake_pac.h" namespace zeek::analyzer::ssl { SSL_Analyzer::SSL_Analyzer(Connection* c) : analyzer::tcp::TCP_ApplicationAnalyzer("SSL", c) { interp = new binpac::SSL::SSL_Conn(this); handshake_interp = new binpac::TLSHandshake::Handshake_Conn(this); had_gap = false; } SSL_Analyzer::~SSL_Analyzer() { delete interp; delete handshake_interp; } void SSL_Analyzer::Done() { analyzer::tcp::TCP_ApplicationAnalyzer::Done(); interp->FlowEOF(true); interp->FlowEOF(false); handshake_interp->FlowEOF(true); handshake_interp->FlowEOF(false); } void SSL_Analyzer::EndpointEOF(bool is_orig) { analyzer::tcp::TCP_ApplicationAnalyzer::EndpointEOF(is_orig); interp->FlowEOF(is_orig); handshake_interp->FlowEOF(is_orig); } void SSL_Analyzer::StartEncryption() { interp->startEncryption(true); interp->startEncryption(false); interp->setEstablished(); } uint16_t SSL_Analyzer::GetNegotiatedVersion() const { return handshake_interp->chosen_version(); } void SSL_Analyzer::DeliverStream(int len, const u_char* data, bool orig) { analyzer::tcp::TCP_ApplicationAnalyzer::DeliverStream(len, data, orig); assert(TCP()); if ( TCP()->IsPartial() ) return; if ( had_gap ) // If only one side had a content gap, we could still try to // deliver data to the other side if the script layer can handle this. return; try { interp->NewData(orig, data, data + len); } catch ( const binpac::Exception& e ) { ProtocolViolation(util::fmt("Binpac exception: %s", e.c_msg())); } } void SSL_Analyzer::SendHandshake(uint16_t raw_tls_version, const u_char* begin, const u_char* end, bool orig) { handshake_interp->set_record_version(raw_tls_version); try { handshake_interp->NewData(orig, begin, end); } catch ( const binpac::Exception& e ) { ProtocolViolation(util::fmt("Binpac exception: %s", e.c_msg())); } } void SSL_Analyzer::Undelivered(uint64_t seq, int len, bool orig) { analyzer::tcp::TCP_ApplicationAnalyzer::Undelivered(seq, len, orig); had_gap = true; interp->NewGap(orig, len); } } // namespace zeek::analyzer::ssl