Opening and closing braces for if
, for
, and while
statements should always be used even if the statement's body contains only a single statement.
If an if
, while
, or for
statement is used in a macro, the macro definition should not conclude with a semicolon. (See PRE11-C. Do not conclude macro definitions with a semicolon.)
Braces improve the uniformity and readability of code. More important, when inserting an additional statement into a body containing only a single statement, it is easy to forget to add braces because the indentation gives strong (but misleading) guidance to the structure.
Braces also help ensure that macros with multiple statements are properly expanded. Such a macro should be wrapped in a do-while
loop. (See PRE10-C. Wrap multistatement macros in a do-while loop.) However, when the do-while
loop is not present, braces can still ensure that the macro expands as intended.
Noncompliant Code Example
This noncompliant code example uses an if
statement without braces to authenticate a user:
int login; if (invalid_login()) login = 0; else login = 1;
A developer might add a debugging statement to determine when the login is valid but forget to add opening and closing braces:
int login; if (invalid_login()) login = 0; else printf("Login is valid\n"); /* Debugging line added here */ login = 1; /* This line always gets executed /* regardless of a valid login! */
Because of the indentation of the code, it is difficult to tell that the code will not function as intended by the programmer, potentially leading to a security breach.
Compliant Solution
In the compliant solution, opening and closing braces are used even when the body is a single statement:
int login; if (invalid_login()) { login = 0; } else { login = 1; }
Noncompliant Code Example
This noncompliant code example has an if
statement nested in another if
statement without braces around the if
and else
bodies:
int privileges; if (invalid_login()) if (allow_guests()) privileges = GUEST; else privileges = ADMINISTRATOR;
The indentation could lead the programmer to believe that a user is given administrator privileges only when the user's login is valid. However, the else
statement actually attaches to the inner if
statement:
int privileges; if (invalid_login()) if (allow_guests()) privileges = GUEST; else privileges = ADMINISTRATOR;
This is a security loophole: users with invalid logins can still obtain administrator privileges.
Compliant Solution
In the compliant solution, adding braces removes the ambiguity and ensures that privileges are correctly assigned:
int privileges; if (invalid_login()) { if (allow_guests()) { privileges = GUEST; } } else { privileges = ADMINISTRATOR; }
Risk Assessment
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
EXP19-C | Medium | Probable | Medium | P8 | L2 |
Automated Detection
Tool | Version | Checker | Description |
Astrée | 24.04 | compound-ifelse compound-loop | Fully checked |
Klocwork | 2024.3 | MISRA.IF.NO_COMPOUND MISRA.STMT.NO_COMPOUND | |
LDRA tool suite | 9.7.1 | 11 S, 12 S, 428 S | Fully Implemented |
Parasoft C/C++test | 2023.1 | MISRA2004-14_8 | Fully implemented |
PRQA QA-C | Unable to render {include} The included page could not be found. | 2212 | |
PVS-Studio | 7.33 | V563, V628, V640, V705 | |
RuleChecker | 24.04 | compound-ifelse compound-loop | Fully checked |
SonarQube C/C++ Plugin | 3.11 | S121 |
Related Vulnerabilities
CVE-2014-1266 was due, in large part, to failing to follow this recommendation. There is a spurious "goto fail" statement on line 631 of sslKeyExchange.c. This "goto" gets executed unconditionally, even though it is indented as if it were part of the preceding "if" statement. As a result, the call to sslRawVerify (which performs the actual signature verification) is rendered dead code. [ImperialViolet 2014]. If the body of the "if" statement had been enclosed in braces, then this defect likely would not have happened.
Related Guidelines
MISRA C:2012 | Rule 15.6 (required) |