From 0b702c20d32c4fab113f5c3da7e503f7fd1a9ec5 Mon Sep 17 00:00:00 2001 From: Luca Deri Date: Wed, 22 Apr 2020 18:52:36 +0200 Subject: Warning fix --- src/lib/protocols/tls.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) (limited to 'src/lib/protocols') diff --git a/src/lib/protocols/tls.c b/src/lib/protocols/tls.c index a6d7883ce..d35b6031a 100644 --- a/src/lib/protocols/tls.c +++ b/src/lib/protocols/tls.c @@ -318,7 +318,7 @@ static void processCertificateElements(struct ndpi_detection_module_struct *ndpi /* The check "len > sizeof(dNSName) - 1" will be always false. If we add it, the compiler is smart enough to detect it and throws a warning */ - if((len == 0 /* Looks something went wrong */)) + if(len == 0 /* Looks something went wrong */) break; strncpy(dNSName, (const char*)&packet->payload[i], len); @@ -1111,17 +1111,17 @@ int processClientServerHello(struct ndpi_detection_module_struct *ndpi_struct, #ifdef DEBUG_TLS printf("Client SSL [TLS version len: %u]\n", version_len); #endif - + if(version_len == (extension_len-1)) { u_int8_t j; s_offset++; - + // careful not to overflow and loop forever with u_int8_t for(j=0; j+1payload[s_offset+j])); u_int8_t unknown_tls_version; - + #ifdef DEBUG_TLS printf("Client SSL [TLS version: %s/0x%04X]\n", ndpi_ssl_version2str(tls_version, &unknown_tls_version), tls_version); @@ -1143,7 +1143,7 @@ int processClientServerHello(struct ndpi_detection_module_struct *ndpi_struct, } } - + extension_offset += extension_len; #ifdef DEBUG_TLS -- cgit v1.2.3