diff --git a/misp_modules/modules/expansion/circl_passivedns.py b/misp_modules/modules/expansion/circl_passivedns.py index 9c095c5..75ff6c6 100755 --- a/misp_modules/modules/expansion/circl_passivedns.py +++ b/misp_modules/modules/expansion/circl_passivedns.py @@ -21,7 +21,7 @@ class PassiveDNSParser(): if hasattr(self, 'result'): return self.result event = json.loads(self.misp_event.to_json()) - results = {key:event[key] for key in ('Attribute', 'Object')} + results = {key: event[key] for key in ('Attribute', 'Object')} return {'results': results} def parse(self, value): diff --git a/misp_modules/modules/expansion/circl_passivessl.py b/misp_modules/modules/expansion/circl_passivessl.py index 2e6a939..d547fc6 100755 --- a/misp_modules/modules/expansion/circl_passivessl.py +++ b/misp_modules/modules/expansion/circl_passivessl.py @@ -37,8 +37,6 @@ class PassiveSSLParser(): except Exception: self.result = {'error': 'There is an authentication error, please make sure you supply correct credentials.'} return - cert_hash = 'x509-fingerprint-sha1' - cert_type = 'pem' for ip_address, certificates in results.items(): ip_uuid = self._handle_ip_attribute(ip_address) for certificate in certificates['certificates']: @@ -46,7 +44,7 @@ class PassiveSSLParser(): def _handle_certificate(self, certificate, ip_uuid): x509 = MISPObject('x509') - x509.add_attribute(self.cert_hash, type=self.cert_hash, value = certificate) + x509.add_attribute(self.cert_hash, type=self.cert_hash, value=certificate) cert_details = self.pssl.fetch_cert(certificate) info = cert_details['info'] for feature, mapping in self.mapping.items():