aboutsummaryrefslogtreecommitdiffstats
path: root/framework/src/suricata/src/detect-lua.c
diff options
context:
space:
mode:
Diffstat (limited to 'framework/src/suricata/src/detect-lua.c')
-rw-r--r--framework/src/suricata/src/detect-lua.c2072
1 files changed, 2072 insertions, 0 deletions
diff --git a/framework/src/suricata/src/detect-lua.c b/framework/src/suricata/src/detect-lua.c
new file mode 100644
index 00000000..d1f2cd00
--- /dev/null
+++ b/framework/src/suricata/src/detect-lua.c
@@ -0,0 +1,2072 @@
+/* Copyright (C) 2007-2014 Open Information Security Foundation
+ *
+ * You can copy, redistribute or modify this Program under the terms of
+ * the GNU General Public License version 2 as published by the Free
+ * Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * version 2 along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ * 02110-1301, USA.
+ */
+
+/**
+ * \file
+ *
+ * \author Victor Julien <victor@inliniac.net>
+ *
+ */
+
+#include "suricata-common.h"
+#include "conf.h"
+
+#include "threads.h"
+#include "debug.h"
+#include "decode.h"
+
+#include "detect.h"
+#include "detect-parse.h"
+
+#include "detect-engine.h"
+#include "detect-engine-mpm.h"
+#include "detect-engine-state.h"
+
+#include "flow.h"
+#include "flow-var.h"
+#include "flow-util.h"
+
+#include "util-debug.h"
+#include "util-spm-bm.h"
+#include "util-print.h"
+
+#include "util-unittest.h"
+#include "util-unittest-helper.h"
+
+#include "app-layer.h"
+#include "app-layer-parser.h"
+
+#include "stream-tcp.h"
+
+#include "detect-lua.h"
+#include "detect-lua-extensions.h"
+
+#include "queue.h"
+#include "util-cpu.h"
+#include "util-var-name.h"
+
+#ifndef HAVE_LUA
+
+static int DetectLuaSetupNoSupport (DetectEngineCtx *a, Signature *b, char *c)
+{
+ SCLogError(SC_ERR_NO_LUA_SUPPORT, "no Lua support built in, needed for lua/luajit keyword");
+ return -1;
+}
+
+/**
+ * \brief Registration function for keyword: luajit
+ */
+void DetectLuaRegister(void)
+{
+ sigmatch_table[DETECT_LUA].name = "lua";
+ sigmatch_table[DETECT_LUA].alias = "luajit";
+ sigmatch_table[DETECT_LUA].Setup = DetectLuaSetupNoSupport;
+ sigmatch_table[DETECT_LUA].Free = NULL;
+ sigmatch_table[DETECT_LUA].RegisterTests = NULL;
+ sigmatch_table[DETECT_LUA].flags = SIGMATCH_NOT_BUILT;
+
+ SCLogDebug("registering lua rule option");
+ return;
+}
+
+#else /* HAVE_LUA */
+
+#ifdef HAVE_LUAJIT
+#include "util-pool.h"
+
+/** \brief lua_State pool
+ *
+ * Lua requires states to be alloc'd in memory <2GB. For this reason we
+ * prealloc the states early during engine startup so we have a better chance
+ * of getting the states. We protect the pool with a lock as the detect
+ * threads access it during their init and cleanup.
+ *
+ * Pool size is automagically determined based on number of keyword occurences,
+ * cpus/cores and rule reloads being enabled or not.
+ *
+ * Alternatively, the "detect-engine.luajit-states" var can be set.
+ */
+static Pool *luajit_states = NULL;
+static pthread_mutex_t luajit_states_lock = SCMUTEX_INITIALIZER;
+
+#endif /* HAVE_LUAJIT */
+
+#include "util-lua.h"
+
+static int DetectLuaMatch (ThreadVars *, DetectEngineThreadCtx *,
+ Packet *, Signature *, const SigMatchCtx *);
+static int DetectLuaAppMatch (ThreadVars *t, DetectEngineThreadCtx *det_ctx,
+ Flow *f, uint8_t flags, void *state, Signature *s, SigMatch *m);
+static int DetectLuaAppTxMatch (ThreadVars *t, DetectEngineThreadCtx *det_ctx,
+ Flow *f, uint8_t flags,
+ void *state, void *txv, const Signature *s,
+ const SigMatchCtx *ctx);
+static int DetectLuaSetup (DetectEngineCtx *, Signature *, char *);
+static void DetectLuaRegisterTests(void);
+static void DetectLuaFree(void *);
+
+/**
+ * \brief Registration function for keyword: luajit
+ */
+void DetectLuaRegister(void)
+{
+ sigmatch_table[DETECT_LUA].name = "lua";
+ sigmatch_table[DETECT_LUA].alias = "luajit";
+ sigmatch_table[DETECT_LUA].desc = "match via a luajit script";
+ sigmatch_table[DETECT_LUA].url = "https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Lua_scripting";
+ sigmatch_table[DETECT_LUA].Match = DetectLuaMatch;
+ sigmatch_table[DETECT_LUA].AppLayerMatch = DetectLuaAppMatch;
+ sigmatch_table[DETECT_LUA].AppLayerTxMatch = DetectLuaAppTxMatch;
+ sigmatch_table[DETECT_LUA].Setup = DetectLuaSetup;
+ sigmatch_table[DETECT_LUA].Free = DetectLuaFree;
+ sigmatch_table[DETECT_LUA].RegisterTests = DetectLuaRegisterTests;
+
+ SCLogDebug("registering luajit rule option");
+ return;
+}
+
+#define DATATYPE_PACKET (1<<0)
+#define DATATYPE_PAYLOAD (1<<1)
+#define DATATYPE_STREAM (1<<2)
+
+#define DATATYPE_HTTP_URI (1<<3)
+#define DATATYPE_HTTP_URI_RAW (1<<4)
+
+#define DATATYPE_HTTP_REQUEST_HEADERS (1<<5)
+#define DATATYPE_HTTP_REQUEST_HEADERS_RAW (1<<6)
+#define DATATYPE_HTTP_REQUEST_COOKIE (1<<7)
+#define DATATYPE_HTTP_REQUEST_UA (1<<8)
+
+#define DATATYPE_HTTP_REQUEST_LINE (1<<9)
+#define DATATYPE_HTTP_REQUEST_BODY (1<<10)
+
+#define DATATYPE_HTTP_RESPONSE_COOKIE (1<<11)
+#define DATATYPE_HTTP_RESPONSE_BODY (1<<12)
+
+#define DATATYPE_HTTP_RESPONSE_HEADERS (1<<13)
+#define DATATYPE_HTTP_RESPONSE_HEADERS_RAW (1<<14)
+
+#define DATATYPE_DNS_RRNAME (1<<15)
+#define DATATYPE_DNS_REQUEST (1<<16)
+#define DATATYPE_DNS_RESPONSE (1<<17)
+
+#define DATATYPE_TLS (1<<18)
+
+#ifdef HAVE_LUAJIT
+static void *LuaStatePoolAlloc(void)
+{
+ return luaL_newstate();
+}
+
+static void LuaStatePoolFree(void *d)
+{
+ lua_State *s = (lua_State *)d;
+ if (s != NULL)
+ lua_close(s);
+}
+
+/** \brief Populate lua states pool
+ *
+ * \param num keyword instances
+ * \param reloads bool indicating we have rule reloads enabled
+ */
+int DetectLuajitSetupStatesPool(int num, int reloads)
+{
+ int retval = 0;
+ pthread_mutex_lock(&luajit_states_lock);
+
+ if (luajit_states == NULL) {
+ int cnt = 0;
+ char *conf_val = NULL;
+
+ if ((ConfGet("detect-engine.luajit-states", &conf_val)) == 1) {
+ cnt = (int)atoi(conf_val);
+ } else {
+ int cpus = UtilCpuGetNumProcessorsOnline();
+ if (cpus == 0) {
+ cpus = 10;
+ }
+ cnt = num * cpus;
+ cnt *= 3; /* assume 3 threads per core */
+
+ /* alloc a bunch extra so reload can add new rules/instances */
+ if (reloads)
+ cnt *= 5;
+ }
+
+ luajit_states = PoolInit(0, cnt, 0, LuaStatePoolAlloc, NULL, NULL, NULL, LuaStatePoolFree);
+ if (luajit_states == NULL) {
+ SCLogError(SC_ERR_LUA_ERROR, "luastate pool init failed, lua/luajit keywords won't work");
+ retval = -1;
+ }
+ }
+
+ pthread_mutex_unlock(&luajit_states_lock);
+ return retval;
+}
+#endif /* HAVE_LUAJIT */
+
+static lua_State *DetectLuaGetState(void)
+{
+
+ lua_State *s = NULL;
+#ifdef HAVE_LUAJIT
+ pthread_mutex_lock(&luajit_states_lock);
+ if (luajit_states != NULL)
+ s = (lua_State *)PoolGet(luajit_states);
+ pthread_mutex_unlock(&luajit_states_lock);
+#else
+ s = luaL_newstate();
+#endif
+ return s;
+}
+
+static void DetectLuaReturnState(lua_State *s)
+{
+ if (s != NULL) {
+#ifdef HAVE_LUAJIT
+ pthread_mutex_lock(&luajit_states_lock);
+ PoolReturn(luajit_states, (void *)s);
+ pthread_mutex_unlock(&luajit_states_lock);
+#else
+ lua_close(s);
+#endif
+ }
+}
+
+/** \brief dump stack from lua state to screen */
+void LuaDumpStack(lua_State *state)
+{
+ int size = lua_gettop(state);
+ int i;
+
+ for (i = 1; i <= size; i++) {
+ int type = lua_type(state, i);
+ printf("Stack size=%d, level=%d, type=%d, ", size, i, type);
+
+ switch (type) {
+ case LUA_TFUNCTION:
+ printf("function %s", lua_tostring(state, i) ? "true" : "false");
+ break;
+ case LUA_TBOOLEAN:
+ printf("bool %s", lua_toboolean(state, i) ? "true" : "false");
+ break;
+ case LUA_TNUMBER:
+ printf("number %g", lua_tonumber(state, i));
+ break;
+ case LUA_TSTRING:
+ printf("string `%s'", lua_tostring(state, i));
+ break;
+ case LUA_TTABLE:
+ printf("table `%s'", lua_tostring(state, i));
+ break;
+ default:
+ printf("other %s", lua_typename(state, type));
+ break;
+
+ }
+ printf("\n");
+ }
+}
+
+int DetectLuaMatchBuffer(DetectEngineThreadCtx *det_ctx, Signature *s, SigMatch *sm,
+ uint8_t *buffer, uint32_t buffer_len, uint32_t offset,
+ Flow *f, int flow_lock)
+{
+ SCEnter();
+ int ret = 0;
+
+ if (buffer == NULL || buffer_len == 0)
+ SCReturnInt(0);
+
+ DetectLuaData *luajit = (DetectLuaData *)sm->ctx;
+ if (luajit == NULL)
+ SCReturnInt(0);
+
+ DetectLuaThreadData *tluajit = (DetectLuaThreadData *)DetectThreadCtxGetKeywordThreadCtx(det_ctx, luajit->thread_ctx_id);
+ if (tluajit == NULL)
+ SCReturnInt(0);
+
+ /* setup extension data for use in lua c functions */
+ LuaExtensionsMatchSetup(tluajit->luastate, luajit, det_ctx,
+ f, flow_lock, /* no packet in the ctx */NULL, 0);
+
+ /* prepare data to pass to script */
+ lua_getglobal(tluajit->luastate, "match");
+ lua_newtable(tluajit->luastate); /* stack at -1 */
+
+ lua_pushliteral (tluajit->luastate, "offset"); /* stack at -2 */
+ lua_pushnumber (tluajit->luastate, (int)(offset + 1));
+ lua_settable(tluajit->luastate, -3);
+
+ lua_pushstring (tluajit->luastate, luajit->buffername); /* stack at -2 */
+ LuaPushStringBuffer(tluajit->luastate, (const uint8_t *)buffer, (size_t)buffer_len);
+ lua_settable(tluajit->luastate, -3);
+
+ int retval = lua_pcall(tluajit->luastate, 1, 1, 0);
+ if (retval != 0) {
+ SCLogInfo("failed to run script: %s", lua_tostring(tluajit->luastate, -1));
+ }
+
+ /* process returns from script */
+ if (lua_gettop(tluajit->luastate) > 0) {
+ /* script returns a number (return 1 or return 0) */
+ if (lua_type(tluajit->luastate, 1) == LUA_TNUMBER) {
+ double script_ret = lua_tonumber(tluajit->luastate, 1);
+ SCLogDebug("script_ret %f", script_ret);
+ lua_pop(tluajit->luastate, 1);
+
+ if (script_ret == 1.0)
+ ret = 1;
+
+ /* script returns a table */
+ } else if (lua_type(tluajit->luastate, 1) == LUA_TTABLE) {
+ lua_pushnil(tluajit->luastate);
+ const char *k, *v;
+ while (lua_next(tluajit->luastate, -2)) {
+ v = lua_tostring(tluajit->luastate, -1);
+ lua_pop(tluajit->luastate, 1);
+ k = lua_tostring(tluajit->luastate, -1);
+
+ if (!k || !v)
+ continue;
+
+ SCLogDebug("k='%s', v='%s'", k, v);
+
+ if (strcmp(k, "retval") == 0) {
+ if (atoi(v) == 1)
+ ret = 1;
+ } else {
+ /* set flow var? */
+ }
+ }
+
+ /* pop the table */
+ lua_pop(tluajit->luastate, 1);
+ }
+ } else {
+ SCLogDebug("no stack");
+ }
+
+ /* clear the stack */
+ while (lua_gettop(tluajit->luastate) > 0) {
+ lua_pop(tluajit->luastate, 1);
+ }
+
+ if (luajit->negated) {
+ if (ret == 1)
+ ret = 0;
+ else
+ ret = 1;
+ }
+
+ SCReturnInt(ret);
+
+}
+
+/**
+ * \brief match the specified luajit
+ *
+ * \param t thread local vars
+ * \param det_ctx pattern matcher thread local data
+ * \param p packet
+ * \param s signature being inspected
+ * \param m sigmatch that we will cast into DetectLuaData
+ *
+ * \retval 0 no match
+ * \retval 1 match
+ */
+static int DetectLuaMatch (ThreadVars *tv, DetectEngineThreadCtx *det_ctx,
+ Packet *p, Signature *s, const SigMatchCtx *ctx)
+{
+ SCEnter();
+ int ret = 0;
+ DetectLuaData *luajit = (DetectLuaData *)ctx;
+ if (luajit == NULL)
+ SCReturnInt(0);
+
+ DetectLuaThreadData *tluajit = (DetectLuaThreadData *)DetectThreadCtxGetKeywordThreadCtx(det_ctx, luajit->thread_ctx_id);
+ if (tluajit == NULL)
+ SCReturnInt(0);
+
+ /* setup extension data for use in lua c functions */
+ uint8_t flags = 0;
+ if (p->flowflags & FLOW_PKT_TOSERVER)
+ flags = STREAM_TOSERVER;
+ else if (p->flowflags & FLOW_PKT_TOCLIENT)
+ flags = STREAM_TOCLIENT;
+
+ LuaExtensionsMatchSetup(tluajit->luastate, luajit, det_ctx,
+ p->flow, /* flow not locked */LUA_FLOW_NOT_LOCKED_BY_PARENT, p, flags);
+
+ if ((tluajit->flags & DATATYPE_PAYLOAD) && p->payload_len == 0)
+ SCReturnInt(0);
+ if ((tluajit->flags & DATATYPE_PACKET) && GET_PKT_LEN(p) == 0)
+ SCReturnInt(0);
+ if (tluajit->alproto != ALPROTO_UNKNOWN) {
+ if (p->flow == NULL)
+ SCReturnInt(0);
+
+ FLOWLOCK_RDLOCK(p->flow);
+ int alproto = p->flow->alproto;
+ FLOWLOCK_UNLOCK(p->flow);
+
+ if (tluajit->alproto != alproto)
+ SCReturnInt(0);
+ }
+
+ lua_getglobal(tluajit->luastate, "match");
+ lua_newtable(tluajit->luastate); /* stack at -1 */
+
+ if ((tluajit->flags & DATATYPE_PAYLOAD) && p->payload_len) {
+ lua_pushliteral(tluajit->luastate, "payload"); /* stack at -2 */
+ LuaPushStringBuffer (tluajit->luastate, (const uint8_t *)p->payload, (size_t)p->payload_len); /* stack at -3 */
+ lua_settable(tluajit->luastate, -3);
+ }
+ if ((tluajit->flags & DATATYPE_PACKET) && GET_PKT_LEN(p)) {
+ lua_pushliteral(tluajit->luastate, "packet"); /* stack at -2 */
+ LuaPushStringBuffer (tluajit->luastate, (const uint8_t *)GET_PKT_DATA(p), (size_t)GET_PKT_LEN(p)); /* stack at -3 */
+ lua_settable(tluajit->luastate, -3);
+ }
+ if (tluajit->alproto == ALPROTO_HTTP) {
+ FLOWLOCK_RDLOCK(p->flow);
+ HtpState *htp_state = p->flow->alstate;
+ if (htp_state != NULL && htp_state->connp != NULL) {
+ htp_tx_t *tx = NULL;
+ uint64_t idx = AppLayerParserGetTransactionInspectId(p->flow->alparser,
+ STREAM_TOSERVER);
+ uint64_t total_txs= AppLayerParserGetTxCnt(IPPROTO_TCP, ALPROTO_HTTP, htp_state);
+ for ( ; idx < total_txs; idx++) {
+ tx = AppLayerParserGetTx(IPPROTO_TCP, ALPROTO_HTTP, htp_state, idx);
+ if (tx == NULL)
+ continue;
+
+ if ((tluajit->flags & DATATYPE_HTTP_REQUEST_LINE) && tx->request_line != NULL &&
+ bstr_len(tx->request_line) > 0) {
+ lua_pushliteral(tluajit->luastate, "http.request_line"); /* stack at -2 */
+ LuaPushStringBuffer(tluajit->luastate,
+ (const uint8_t *)bstr_ptr(tx->request_line),
+ bstr_len(tx->request_line));
+ lua_settable(tluajit->luastate, -3);
+ }
+ }
+ }
+ FLOWLOCK_UNLOCK(p->flow);
+ }
+
+ int retval = lua_pcall(tluajit->luastate, 1, 1, 0);
+ if (retval != 0) {
+ SCLogInfo("failed to run script: %s", lua_tostring(tluajit->luastate, -1));
+ }
+
+ /* process returns from script */
+ if (lua_gettop(tluajit->luastate) > 0) {
+
+ /* script returns a number (return 1 or return 0) */
+ if (lua_type(tluajit->luastate, 1) == LUA_TNUMBER) {
+ double script_ret = lua_tonumber(tluajit->luastate, 1);
+ SCLogDebug("script_ret %f", script_ret);
+ lua_pop(tluajit->luastate, 1);
+
+ if (script_ret == 1.0)
+ ret = 1;
+
+ /* script returns a table */
+ } else if (lua_type(tluajit->luastate, 1) == LUA_TTABLE) {
+ lua_pushnil(tluajit->luastate);
+ const char *k, *v;
+ while (lua_next(tluajit->luastate, -2)) {
+ v = lua_tostring(tluajit->luastate, -1);
+ lua_pop(tluajit->luastate, 1);
+ k = lua_tostring(tluajit->luastate, -1);
+
+ if (!k || !v)
+ continue;
+
+ SCLogDebug("k='%s', v='%s'", k, v);
+
+ if (strcmp(k, "retval") == 0) {
+ if (atoi(v) == 1)
+ ret = 1;
+ } else {
+ /* set flow var? */
+ }
+ }
+
+ /* pop the table */
+ lua_pop(tluajit->luastate, 1);
+ }
+ }
+ while (lua_gettop(tluajit->luastate) > 0) {
+ lua_pop(tluajit->luastate, 1);
+ }
+
+ if (luajit->negated) {
+ if (ret == 1)
+ ret = 0;
+ else
+ ret = 1;
+ }
+
+ SCReturnInt(ret);
+}
+
+static int DetectLuaAppMatchCommon (ThreadVars *t, DetectEngineThreadCtx *det_ctx,
+ Flow *f, uint8_t flags, void *state,
+ const Signature *s, const SigMatchCtx *ctx)
+{
+ SCEnter();
+ int ret = 0;
+ DetectLuaData *luajit = (DetectLuaData *)ctx;
+ if (luajit == NULL)
+ SCReturnInt(0);
+
+ DetectLuaThreadData *tluajit = (DetectLuaThreadData *)DetectThreadCtxGetKeywordThreadCtx(det_ctx, luajit->thread_ctx_id);
+ if (tluajit == NULL)
+ SCReturnInt(0);
+
+ /* setup extension data for use in lua c functions */
+ LuaExtensionsMatchSetup(tluajit->luastate, luajit, det_ctx,
+ f, /* flow is locked */LUA_FLOW_LOCKED_BY_PARENT,
+ NULL, flags);
+
+ if (tluajit->alproto != ALPROTO_UNKNOWN) {
+ int alproto = f->alproto;
+ if (tluajit->alproto != alproto)
+ SCReturnInt(0);
+ }
+
+ lua_getglobal(tluajit->luastate, "match");
+ lua_newtable(tluajit->luastate); /* stack at -1 */
+
+ if (tluajit->alproto == ALPROTO_HTTP) {
+ HtpState *htp_state = state;
+ if (htp_state != NULL && htp_state->connp != NULL) {
+ htp_tx_t *tx = NULL;
+ tx = AppLayerParserGetTx(IPPROTO_TCP, ALPROTO_HTTP, htp_state, det_ctx->tx_id);
+ if (tx != NULL) {
+ if ((tluajit->flags & DATATYPE_HTTP_REQUEST_LINE) && tx->request_line != NULL &&
+ bstr_len(tx->request_line) > 0) {
+ lua_pushliteral(tluajit->luastate, "http.request_line"); /* stack at -2 */
+ LuaPushStringBuffer(tluajit->luastate,
+ (const uint8_t *)bstr_ptr(tx->request_line),
+ bstr_len(tx->request_line));
+ lua_settable(tluajit->luastate, -3);
+ }
+ }
+ }
+ }
+
+ int retval = lua_pcall(tluajit->luastate, 1, 1, 0);
+ if (retval != 0) {
+ SCLogInfo("failed to run script: %s", lua_tostring(tluajit->luastate, -1));
+ }
+
+ /* process returns from script */
+ if (lua_gettop(tluajit->luastate) > 0) {
+
+ /* script returns a number (return 1 or return 0) */
+ if (lua_type(tluajit->luastate, 1) == LUA_TNUMBER) {
+ double script_ret = lua_tonumber(tluajit->luastate, 1);
+ SCLogDebug("script_ret %f", script_ret);
+ lua_pop(tluajit->luastate, 1);
+
+ if (script_ret == 1.0)
+ ret = 1;
+
+ /* script returns a table */
+ } else if (lua_type(tluajit->luastate, 1) == LUA_TTABLE) {
+ lua_pushnil(tluajit->luastate);
+ const char *k, *v;
+ while (lua_next(tluajit->luastate, -2)) {
+ v = lua_tostring(tluajit->luastate, -1);
+ lua_pop(tluajit->luastate, 1);
+ k = lua_tostring(tluajit->luastate, -1);
+
+ if (!k || !v)
+ continue;
+
+ SCLogDebug("k='%s', v='%s'", k, v);
+
+ if (strcmp(k, "retval") == 0) {
+ if (atoi(v) == 1)
+ ret = 1;
+ } else {
+ /* set flow var? */
+ }
+ }
+
+ /* pop the table */
+ lua_pop(tluajit->luastate, 1);
+ }
+ }
+ while (lua_gettop(tluajit->luastate) > 0) {
+ lua_pop(tluajit->luastate, 1);
+ }
+
+ if (luajit->negated) {
+ if (ret == 1)
+ ret = 0;
+ else
+ ret = 1;
+ }
+
+ SCReturnInt(ret);
+}
+
+/**
+ * \brief match the specified lua script in AMATCH
+ *
+ * \param t thread local vars
+ * \param det_ctx pattern matcher thread local data
+ * \param s signature being inspected
+ * \param m sigmatch that we will cast into DetectLuaData
+ *
+ * \retval 0 no match
+ * \retval 1 match
+ */
+static int DetectLuaAppMatch (ThreadVars *t, DetectEngineThreadCtx *det_ctx,
+ Flow *f, uint8_t flags, void *state, Signature *s, SigMatch *m)
+{
+ return DetectLuaAppMatchCommon(t, det_ctx, f, flags, state, s, m->ctx);
+}
+
+/**
+ * \brief match the specified lua script in a list with a tx
+ *
+ * \param t thread local vars
+ * \param det_ctx pattern matcher thread local data
+ * \param s signature being inspected
+ * \param m sigmatch that we will cast into DetectLuaData
+ *
+ * \retval 0 no match
+ * \retval 1 match
+ */
+static int DetectLuaAppTxMatch (ThreadVars *t, DetectEngineThreadCtx *det_ctx,
+ Flow *f, uint8_t flags,
+ void *state, void *txv, const Signature *s,
+ const SigMatchCtx *ctx)
+{
+ return DetectLuaAppMatchCommon(t, det_ctx, f, flags, state, s, ctx);
+}
+
+#ifdef UNITTESTS
+/* if this ptr is set the luajit setup functions will use this buffer as the
+ * lua script instead of calling luaL_loadfile on the filename supplied. */
+static const char *ut_script = NULL;
+#endif
+
+static void *DetectLuaThreadInit(void *data)
+{
+ int status;
+ DetectLuaData *luajit = (DetectLuaData *)data;
+ BUG_ON(luajit == NULL);
+
+ DetectLuaThreadData *t = SCMalloc(sizeof(DetectLuaThreadData));
+ if (unlikely(t == NULL)) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't alloc ctx memory");
+ return NULL;
+ }
+ memset(t, 0x00, sizeof(DetectLuaThreadData));
+
+ t->alproto = luajit->alproto;
+ t->flags = luajit->flags;
+
+ t->luastate = DetectLuaGetState();
+ if (t->luastate == NULL) {
+ SCLogError(SC_ERR_LUA_ERROR, "luastate pool depleted");
+ goto error;
+ }
+
+ luaL_openlibs(t->luastate);
+
+ LuaRegisterExtensions(t->luastate);
+
+ lua_pushinteger(t->luastate, (lua_Integer)(luajit->sid));
+ lua_setglobal(t->luastate, "SCRuleSid");
+ lua_pushinteger(t->luastate, (lua_Integer)(luajit->rev));
+ lua_setglobal(t->luastate, "SCRuleRev");
+ lua_pushinteger(t->luastate, (lua_Integer)(luajit->gid));
+ lua_setglobal(t->luastate, "SCRuleGid");
+
+ /* hackish, needed to allow unittests to pass buffers as scripts instead of files */
+#ifdef UNITTESTS
+ if (ut_script != NULL) {
+ status = luaL_loadbuffer(t->luastate, ut_script, strlen(ut_script), "unittest");
+ if (status) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't load file: %s", lua_tostring(t->luastate, -1));
+ goto error;
+ }
+ } else {
+#endif
+ status = luaL_loadfile(t->luastate, luajit->filename);
+ if (status) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't load file: %s", lua_tostring(t->luastate, -1));
+ goto error;
+ }
+#ifdef UNITTESTS
+ }
+#endif
+
+ /* prime the script (or something) */
+ if (lua_pcall(t->luastate, 0, 0, 0) != 0) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't prime file: %s", lua_tostring(t->luastate, -1));
+ goto error;
+ }
+
+ return (void *)t;
+
+error:
+ if (t->luastate != NULL)
+ DetectLuaReturnState(t->luastate);
+ SCFree(t);
+ return NULL;
+}
+
+static void DetectLuaThreadFree(void *ctx)
+{
+ if (ctx != NULL) {
+ DetectLuaThreadData *t = (DetectLuaThreadData *)ctx;
+ if (t->luastate != NULL)
+ DetectLuaReturnState(t->luastate);
+ SCFree(t);
+ }
+}
+
+/**
+ * \brief Parse the luajit keyword
+ *
+ * \param str Pointer to the user provided option
+ *
+ * \retval luajit pointer to DetectLuaData on success
+ * \retval NULL on failure
+ */
+static DetectLuaData *DetectLuaParse (const DetectEngineCtx *de_ctx, char *str)
+{
+ DetectLuaData *luajit = NULL;
+
+ /* We have a correct luajit option */
+ luajit = SCMalloc(sizeof(DetectLuaData));
+ if (unlikely(luajit == NULL))
+ goto error;
+
+ memset(luajit, 0x00, sizeof(DetectLuaData));
+
+ if (strlen(str) && str[0] == '!') {
+ luajit->negated = 1;
+ str++;
+ }
+
+ /* get full filename */
+ luajit->filename = DetectLoadCompleteSigPath(de_ctx, str);
+ if (luajit->filename == NULL) {
+ goto error;
+ }
+
+ return luajit;
+
+error:
+ if (luajit != NULL)
+ DetectLuaFree(luajit);
+ return NULL;
+}
+
+static int DetectLuaSetupPrime(DetectEngineCtx *de_ctx, DetectLuaData *ld)
+{
+ int status;
+
+ lua_State *luastate = luaL_newstate();
+ if (luastate == NULL)
+ return -1;
+ luaL_openlibs(luastate);
+
+ /* hackish, needed to allow unittests to pass buffers as scripts instead of files */
+#ifdef UNITTESTS
+ if (ut_script != NULL) {
+ status = luaL_loadbuffer(luastate, ut_script, strlen(ut_script), "unittest");
+ if (status) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't load file: %s", lua_tostring(luastate, -1));
+ goto error;
+ }
+ } else {
+#endif
+ status = luaL_loadfile(luastate, ld->filename);
+ if (status) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't load file: %s", lua_tostring(luastate, -1));
+ goto error;
+ }
+#ifdef UNITTESTS
+ }
+#endif
+
+ /* prime the script (or something) */
+ if (lua_pcall(luastate, 0, 0, 0) != 0) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't prime file: %s", lua_tostring(luastate, -1));
+ goto error;
+ }
+
+ lua_getglobal(luastate, "init");
+ if (lua_type(luastate, -1) != LUA_TFUNCTION) {
+ SCLogError(SC_ERR_LUA_ERROR, "no init function in script");
+ goto error;
+ }
+
+ lua_newtable(luastate); /* stack at -1 */
+ if (lua_gettop(luastate) == 0 || lua_type(luastate, 2) != LUA_TTABLE) {
+ SCLogError(SC_ERR_LUA_ERROR, "no table setup");
+ goto error;
+ }
+
+ lua_pushliteral(luastate, "script_api_ver"); /* stack at -2 */
+ lua_pushnumber (luastate, 1); /* stack at -3 */
+ lua_settable(luastate, -3);
+
+ if (lua_pcall(luastate, 1, 1, 0) != 0) {
+ SCLogError(SC_ERR_LUA_ERROR, "couldn't run script 'init' function: %s", lua_tostring(luastate, -1));
+ goto error;
+ }
+
+ /* process returns from script */
+ if (lua_gettop(luastate) == 0) {
+ SCLogError(SC_ERR_LUA_ERROR, "init function in script should return table, nothing returned");
+ goto error;
+ }
+ if (lua_type(luastate, 1) != LUA_TTABLE) {
+ SCLogError(SC_ERR_LUA_ERROR, "init function in script should return table, returned is not table");
+ goto error;
+ }
+
+ lua_pushnil(luastate);
+ const char *k, *v;
+ while (lua_next(luastate, -2)) {
+ k = lua_tostring(luastate, -2);
+ if (k == NULL)
+ continue;
+
+ /* handle flowvar separately as it has a table as value */
+ if (strcmp(k, "flowvar") == 0) {
+ if (lua_istable(luastate, -1)) {
+ lua_pushnil(luastate);
+ while (lua_next(luastate, -2) != 0) {
+ /* value at -1, key is at -2 which we ignore */
+ const char *value = lua_tostring(luastate, -1);
+ SCLogDebug("value %s", value);
+ /* removes 'value'; keeps 'key' for next iteration */
+ lua_pop(luastate, 1);
+
+ if (ld->flowvars == DETECT_LUAJIT_MAX_FLOWVARS) {
+ SCLogError(SC_ERR_LUA_ERROR, "too many flowvars registered");
+ goto error;
+ }
+
+ uint16_t idx = VariableNameGetIdx(de_ctx, (char *)value, VAR_TYPE_FLOW_VAR);
+ ld->flowvar[ld->flowvars++] = idx;
+ SCLogDebug("script uses flowvar %u with script id %u", idx, ld->flowvars - 1);
+ }
+ }
+ lua_pop(luastate, 1);
+ continue;
+ } else if (strcmp(k, "flowint") == 0) {
+ if (lua_istable(luastate, -1)) {
+ lua_pushnil(luastate);
+ while (lua_next(luastate, -2) != 0) {
+ /* value at -1, key is at -2 which we ignore */
+ const char *value = lua_tostring(luastate, -1);
+ SCLogDebug("value %s", value);
+ /* removes 'value'; keeps 'key' for next iteration */
+ lua_pop(luastate, 1);
+
+ if (ld->flowints == DETECT_LUAJIT_MAX_FLOWINTS) {
+ SCLogError(SC_ERR_LUA_ERROR, "too many flowints registered");
+ goto error;
+ }
+
+ uint16_t idx = VariableNameGetIdx(de_ctx, (char *)value, VAR_TYPE_FLOW_INT);
+ ld->flowint[ld->flowints++] = idx;
+ SCLogDebug("script uses flowint %u with script id %u", idx, ld->flowints - 1);
+ }
+ }
+ lua_pop(luastate, 1);
+ continue;
+ }
+
+ v = lua_tostring(luastate, -1);
+ lua_pop(luastate, 1);
+ if (v == NULL)
+ continue;
+
+ SCLogDebug("k='%s', v='%s'", k, v);
+ if (strcmp(k, "packet") == 0 && strcmp(v, "true") == 0) {
+ ld->flags |= DATATYPE_PACKET;
+ } else if (strcmp(k, "payload") == 0 && strcmp(v, "true") == 0) {
+ ld->flags |= DATATYPE_PAYLOAD;
+ } else if (strcmp(k, "stream") == 0 && strcmp(v, "true") == 0) {
+ ld->flags |= DATATYPE_STREAM;
+
+ ld->buffername = SCStrdup("stream");
+ if (ld->buffername == NULL) {
+ SCLogError(SC_ERR_LUA_ERROR, "alloc error");
+ goto error;
+ }
+
+ } else if (strncmp(k, "http", 4) == 0 && strcmp(v, "true") == 0) {
+ if (ld->alproto != ALPROTO_UNKNOWN && ld->alproto != ALPROTO_HTTP) {
+ SCLogError(SC_ERR_LUA_ERROR, "can just inspect script against one app layer proto like HTTP at a time");
+ goto error;
+ }
+ if (ld->flags != 0) {
+ SCLogError(SC_ERR_LUA_ERROR, "when inspecting HTTP buffers only a single buffer can be inspected");
+ goto error;
+ }
+
+ /* http types */
+ ld->alproto = ALPROTO_HTTP;
+
+ if (strcmp(k, "http.uri") == 0)
+ ld->flags |= DATATYPE_HTTP_URI;
+
+ else if (strcmp(k, "http.uri.raw") == 0)
+ ld->flags |= DATATYPE_HTTP_URI_RAW;
+
+ else if (strcmp(k, "http.request_line") == 0)
+ ld->flags |= DATATYPE_HTTP_REQUEST_LINE;
+
+ else if (strcmp(k, "http.request_headers") == 0)
+ ld->flags |= DATATYPE_HTTP_REQUEST_HEADERS;
+
+ else if (strcmp(k, "http.request_headers.raw") == 0)
+ ld->flags |= DATATYPE_HTTP_REQUEST_HEADERS_RAW;
+
+ else if (strcmp(k, "http.request_cookie") == 0)
+ ld->flags |= DATATYPE_HTTP_REQUEST_COOKIE;
+
+ else if (strcmp(k, "http.request_user_agent") == 0)
+ ld->flags |= DATATYPE_HTTP_REQUEST_UA;
+
+ else if (strcmp(k, "http.request_body") == 0)
+ ld->flags |= DATATYPE_HTTP_REQUEST_BODY;
+
+ else if (strcmp(k, "http.response_body") == 0)
+ ld->flags |= DATATYPE_HTTP_RESPONSE_BODY;
+
+ else if (strcmp(k, "http.response_cookie") == 0)
+ ld->flags |= DATATYPE_HTTP_RESPONSE_COOKIE;
+
+ else if (strcmp(k, "http.response_headers") == 0)
+ ld->flags |= DATATYPE_HTTP_RESPONSE_HEADERS;
+
+ else if (strcmp(k, "http.response_headers.raw") == 0)
+ ld->flags |= DATATYPE_HTTP_RESPONSE_HEADERS_RAW;
+
+ else {
+ SCLogError(SC_ERR_LUA_ERROR, "unsupported http data type %s", k);
+ goto error;
+ }
+
+ ld->buffername = SCStrdup(k);
+ if (ld->buffername == NULL) {
+ SCLogError(SC_ERR_LUA_ERROR, "alloc error");
+ goto error;
+ }
+ } else if (strncmp(k, "dns", 3) == 0 && strcmp(v, "true") == 0) {
+
+ ld->alproto = ALPROTO_DNS;
+
+ if (strcmp(k, "dns.rrname") == 0)
+ ld->flags |= DATATYPE_DNS_RRNAME;
+ else if (strcmp(k, "dns.request") == 0)
+ ld->flags |= DATATYPE_DNS_REQUEST;
+ else if (strcmp(k, "dns.response") == 0)
+ ld->flags |= DATATYPE_DNS_RESPONSE;
+
+ else {
+ SCLogError(SC_ERR_LUA_ERROR, "unsupported dns data type %s", k);
+ goto error;
+ }
+ ld->buffername = SCStrdup(k);
+ if (ld->buffername == NULL) {
+ SCLogError(SC_ERR_LUA_ERROR, "alloc error");
+ goto error;
+ }
+ } else if (strncmp(k, "tls", 3) == 0 && strcmp(v, "true") == 0) {
+
+ ld->alproto = ALPROTO_TLS;
+
+ ld->flags |= DATATYPE_TLS;
+
+ } else {
+ SCLogError(SC_ERR_LUA_ERROR, "unsupported data type %s", k);
+ goto error;
+ }
+ }
+
+ /* pop the table */
+ lua_pop(luastate, 1);
+ lua_close(luastate);
+ return 0;
+error:
+ lua_close(luastate);
+ return -1;
+}
+
+/**
+ * \brief this function is used to parse luajit options
+ * \brief into the current signature
+ *
+ * \param de_ctx pointer to the Detection Engine Context
+ * \param s pointer to the Current Signature
+ * \param str pointer to the user provided "luajit" option
+ *
+ * \retval 0 on Success
+ * \retval -1 on Failure
+ */
+static int DetectLuaSetup (DetectEngineCtx *de_ctx, Signature *s, char *str)
+{
+ DetectLuaData *luajit = NULL;
+ SigMatch *sm = NULL;
+
+ luajit = DetectLuaParse(de_ctx, str);
+ if (luajit == NULL)
+ goto error;
+
+ if (DetectLuaSetupPrime(de_ctx, luajit) == -1) {
+ goto error;
+ }
+
+ luajit->thread_ctx_id = DetectRegisterThreadCtxFuncs(de_ctx, "luajit",
+ DetectLuaThreadInit, (void *)luajit,
+ DetectLuaThreadFree, 0);
+ if (luajit->thread_ctx_id == -1)
+ goto error;
+
+ if (luajit->alproto != ALPROTO_UNKNOWN) {
+ if (s->alproto != ALPROTO_UNKNOWN && luajit->alproto != s->alproto) {
+ goto error;
+ }
+ s->alproto = luajit->alproto;
+ }
+
+ /* Okay so far so good, lets get this into a SigMatch
+ * and put it in the Signature. */
+ sm = SigMatchAlloc();
+ if (sm == NULL)
+ goto error;
+
+ sm->type = DETECT_LUA;
+ sm->ctx = (SigMatchCtx *)luajit;
+
+ if (luajit->alproto == ALPROTO_UNKNOWN) {
+ if (luajit->flags & DATATYPE_STREAM)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_PMATCH);
+ else
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_MATCH);
+ } else if (luajit->alproto == ALPROTO_HTTP) {
+ if (luajit->flags & DATATYPE_HTTP_RESPONSE_BODY)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_FILEDATA);
+ else if (luajit->flags & DATATYPE_HTTP_REQUEST_BODY)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HCBDMATCH);
+ else if (luajit->flags & DATATYPE_HTTP_URI)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_UMATCH);
+ else if (luajit->flags & DATATYPE_HTTP_URI_RAW)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HRUDMATCH);
+ else if (luajit->flags & DATATYPE_HTTP_REQUEST_COOKIE)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HCDMATCH);
+ else if (luajit->flags & DATATYPE_HTTP_REQUEST_UA)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HUADMATCH);
+ else if (luajit->flags & (DATATYPE_HTTP_REQUEST_HEADERS|DATATYPE_HTTP_RESPONSE_HEADERS))
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HHDMATCH);
+ else if (luajit->flags & (DATATYPE_HTTP_REQUEST_HEADERS_RAW|DATATYPE_HTTP_RESPONSE_HEADERS_RAW))
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HRHDMATCH);
+ else if (luajit->flags & DATATYPE_HTTP_RESPONSE_COOKIE)
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HCDMATCH);
+ else
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_HRLMATCH);
+ } else if (luajit->alproto == ALPROTO_DNS) {
+ if (luajit->flags & DATATYPE_DNS_RRNAME) {
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_DNSQUERYNAME_MATCH);
+ } else if (luajit->flags & DATATYPE_DNS_REQUEST) {
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_DNSREQUEST_MATCH);
+ } else if (luajit->flags & DATATYPE_DNS_RESPONSE) {
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_DNSRESPONSE_MATCH);
+ }
+ } else if (luajit->alproto == ALPROTO_TLS) {
+ SigMatchAppendSMToList(s, sm, DETECT_SM_LIST_AMATCH);
+ } else {
+ SCLogError(SC_ERR_LUA_ERROR, "luajit can't be used with protocol %s",
+ AppLayerGetProtoName(luajit->alproto));
+ goto error;
+ }
+
+ de_ctx->detect_luajit_instances++;
+ return 0;
+
+error:
+ if (luajit != NULL)
+ DetectLuaFree(luajit);
+ if (sm != NULL)
+ SCFree(sm);
+ return -1;
+}
+
+/** \brief post-sig parse function to set the sid,rev,gid into the
+ * ctx, as this isn't available yet during parsing.
+ */
+void DetectLuaPostSetup(Signature *s)
+{
+ int i;
+ SigMatch *sm;
+
+ for (i = 0; i < DETECT_SM_LIST_MAX; i++) {
+ for (sm = s->sm_lists[i]; sm != NULL; sm = sm->next) {
+ if (sm->type != DETECT_LUA)
+ continue;
+
+ DetectLuaData *ld = (DetectLuaData *)sm->ctx;
+ ld->sid = s->id;
+ ld->rev = s->rev;
+ ld->gid = s->gid;
+ }
+ }
+}
+
+/**
+ * \brief this function will free memory associated with DetectLuaData
+ *
+ * \param luajit pointer to DetectLuaData
+ */
+static void DetectLuaFree(void *ptr)
+{
+ if (ptr != NULL) {
+ DetectLuaData *luajit = (DetectLuaData *)ptr;
+
+ if (luajit->buffername)
+ SCFree(luajit->buffername);
+ if (luajit->filename)
+ SCFree(luajit->filename);
+
+ SCFree(luajit);
+ }
+}
+
+#ifdef UNITTESTS
+/** \test http buffer */
+static int LuaMatchTest01(void)
+{
+ const char script[] =
+ "function init (args)\n"
+ " local needs = {}\n"
+ " needs[\"http.request_headers\"] = tostring(true)\n"
+ " needs[\"flowvar\"] = {\"cnt\"}\n"
+ " return needs\n"
+ "end\n"
+ "\n"
+ "function match(args)\n"
+ " a = ScFlowvarGet(0)\n"
+ " if a then\n"
+ " a = tostring(tonumber(a)+1)\n"
+ " print (a)\n"
+ " ScFlowvarSet(0, a, #a)\n"
+ " else\n"
+ " a = tostring(1)\n"
+ " print (a)\n"
+ " ScFlowvarSet(0, a, #a)\n"
+ " end\n"
+ " \n"
+ " print (\"pre check: \" .. (a))\n"
+ " if tonumber(a) == 2 then\n"
+ " print \"match\"\n"
+ " return 1\n"
+ " end\n"
+ " return 0\n"
+ "end\n"
+ "return 0\n";
+ char sig[] = "alert http any any -> any any (flow:to_server; luajit:unittest; sid:1;)";
+ int result = 0;
+ uint8_t httpbuf1[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.emergingthreats.net\r\n\r\n";
+ uint8_t httpbuf2[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.openinfosecfoundation.org\r\n\r\n";
+ uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
+ uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
+ TcpSession ssn;
+ Packet *p1 = NULL;
+ Packet *p2 = NULL;
+ Flow f;
+ Signature *s = NULL;
+ ThreadVars th_v;
+ DetectEngineThreadCtx *det_ctx;
+
+ AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
+
+ ut_script = script;
+
+ memset(&th_v, 0, sizeof(th_v));
+ memset(&f, 0, sizeof(f));
+ memset(&ssn, 0, sizeof(ssn));
+
+ p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+ p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+
+ FLOW_INITIALIZE(&f);
+ f.protoctx = (void *)&ssn;
+ f.proto = IPPROTO_TCP;
+ f.flags |= FLOW_IPV4;
+ f.alproto = ALPROTO_HTTP;
+
+ p1->flow = &f;
+ p1->flowflags |= FLOW_PKT_TOSERVER;
+ p1->flowflags |= FLOW_PKT_ESTABLISHED;
+ p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+ p2->flow = &f;
+ p2->flowflags |= FLOW_PKT_TOSERVER;
+ p2->flowflags |= FLOW_PKT_ESTABLISHED;
+ p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ StreamTcpInitConfig(TRUE);
+
+ DetectEngineCtx *de_ctx = DetectEngineCtxInit();
+ if (de_ctx == NULL) {
+ goto end;
+ }
+ de_ctx->flags |= DE_QUIET;
+
+ s = DetectEngineAppendSig(de_ctx, sig);
+ if (s == NULL) {
+ printf("sig parse failed: ");
+ goto end;
+ }
+
+ SigGroupBuild(de_ctx);
+ DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
+
+ SCMutexLock(&f.m);
+ int r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf1, httplen1);
+ if (r != 0) {
+ printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ HtpState *http_state = f.alstate;
+ if (http_state == NULL) {
+ printf("no http state: ");
+ goto end;
+ }
+
+ /* do detect for p1 */
+ SCLogDebug("inspecting p1");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
+
+ if ((PacketAlertCheck(p1, 1))) {
+ printf("sid 1 didn't match on p1 but should have: ");
+ goto end;
+ }
+
+ SCMutexLock(&f.m);
+ r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf2, httplen2);
+ if (r != 0) {
+ printf("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ /* do detect for p2 */
+ SCLogDebug("inspecting p2");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
+
+ if (!(PacketAlertCheck(p2, 1))) {
+ printf("sid 1 didn't match on p2 but should have: ");
+ goto end;
+ }
+
+ FlowVar *fv = FlowVarGet(&f, 1);
+ if (fv == NULL) {
+ printf("no flowvar: ");
+ goto end;
+ }
+
+ if (fv->data.fv_str.value_len != 1) {
+ printf("%u != %u: ", fv->data.fv_str.value_len, 1);
+ goto end;
+ }
+
+ if (memcmp(fv->data.fv_str.value, "2", 1) != 0) {
+ PrintRawDataFp(stdout, fv->data.fv_str.value, fv->data.fv_str.value_len);
+
+ printf("buffer mismatch: ");
+ goto end;
+ }
+
+ result = 1;
+end:
+ if (alp_tctx != NULL)
+ AppLayerParserThreadCtxFree(alp_tctx);
+ if (de_ctx != NULL)
+ DetectEngineCtxFree(de_ctx);
+
+ StreamTcpFreeConfig(TRUE);
+ FLOW_DESTROY(&f);
+ UTHFreePackets(&p1, 1);
+ UTHFreePackets(&p2, 1);
+ return result;
+}
+
+/** \test payload buffer */
+static int LuaMatchTest02(void)
+{
+ const char script[] =
+ "function init (args)\n"
+ " local needs = {}\n"
+ " needs[\"payload\"] = tostring(true)\n"
+ " needs[\"flowvar\"] = {\"cnt\"}\n"
+ " return needs\n"
+ "end\n"
+ "\n"
+ "function match(args)\n"
+ " a = ScFlowvarGet(0)\n"
+ " if a then\n"
+ " a = tostring(tonumber(a)+1)\n"
+ " print (a)\n"
+ " ScFlowvarSet(0, a, #a)\n"
+ " else\n"
+ " a = tostring(1)\n"
+ " print (a)\n"
+ " ScFlowvarSet(0, a, #a)\n"
+ " end\n"
+ " \n"
+ " print (\"pre check: \" .. (a))\n"
+ " if tonumber(a) == 2 then\n"
+ " print \"match\"\n"
+ " return 1\n"
+ " end\n"
+ " return 0\n"
+ "end\n"
+ "return 0\n";
+ char sig[] = "alert tcp any any -> any any (flow:to_server; luajit:unittest; sid:1;)";
+ int result = 0;
+ uint8_t httpbuf1[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.emergingthreats.net\r\n\r\n";
+ uint8_t httpbuf2[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.openinfosecfoundation.org\r\n\r\n";
+ uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
+ uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
+ TcpSession ssn;
+ Packet *p1 = NULL;
+ Packet *p2 = NULL;
+ Flow f;
+ Signature *s = NULL;
+ ThreadVars th_v;
+ DetectEngineThreadCtx *det_ctx;
+
+ ut_script = script;
+
+ memset(&th_v, 0, sizeof(th_v));
+ memset(&f, 0, sizeof(f));
+ memset(&ssn, 0, sizeof(ssn));
+
+ p1 = UTHBuildPacket(httpbuf1, httplen1, IPPROTO_TCP);
+ p2 = UTHBuildPacket(httpbuf2, httplen2, IPPROTO_TCP);
+
+ FLOW_INITIALIZE(&f);
+ f.protoctx = (void *)&ssn;
+ f.proto = IPPROTO_TCP;
+ f.flags |= FLOW_IPV4;
+ f.alproto = ALPROTO_HTTP;
+
+ p1->flow = &f;
+ p1->flowflags |= FLOW_PKT_TOSERVER;
+ p1->flowflags |= FLOW_PKT_ESTABLISHED;
+ p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+ p2->flow = &f;
+ p2->flowflags |= FLOW_PKT_TOSERVER;
+ p2->flowflags |= FLOW_PKT_ESTABLISHED;
+ p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ StreamTcpInitConfig(TRUE);
+
+ DetectEngineCtx *de_ctx = DetectEngineCtxInit();
+ if (de_ctx == NULL) {
+ goto end;
+ }
+ de_ctx->flags |= DE_QUIET;
+
+ s = DetectEngineAppendSig(de_ctx, sig);
+ if (s == NULL) {
+ printf("sig parse failed: ");
+ goto end;
+ }
+
+ SigGroupBuild(de_ctx);
+ DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
+
+ /* do detect for p1 */
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
+
+ if ((PacketAlertCheck(p1, 1))) {
+ printf("sid 1 didn't match on p1 but should have: ");
+ goto end;
+ }
+
+ /* do detect for p2 */
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
+
+ if (!(PacketAlertCheck(p2, 1))) {
+ printf("sid 1 didn't match on p2 but should have: ");
+ goto end;
+ }
+
+ FlowVar *fv = FlowVarGet(&f, 1);
+ if (fv == NULL) {
+ printf("no flowvar: ");
+ goto end;
+ }
+
+ if (fv->data.fv_str.value_len != 1) {
+ printf("%u != %u: ", fv->data.fv_str.value_len, 1);
+ goto end;
+ }
+
+ if (memcmp(fv->data.fv_str.value, "2", 1) != 0) {
+ PrintRawDataFp(stdout, fv->data.fv_str.value, fv->data.fv_str.value_len);
+
+ printf("buffer mismatch: ");
+ goto end;
+ }
+
+ result = 1;
+end:
+ if (de_ctx != NULL)
+ DetectEngineCtxFree(de_ctx);
+
+ StreamTcpFreeConfig(TRUE);
+ FLOW_DESTROY(&f);
+ UTHFreePackets(&p1, 1);
+ UTHFreePackets(&p2, 1);
+ return result;
+}
+
+/** \test packet buffer */
+static int LuaMatchTest03(void)
+{
+ const char script[] =
+ "function init (args)\n"
+ " local needs = {}\n"
+ " needs[\"packet\"] = tostring(true)\n"
+ " needs[\"flowvar\"] = {\"cnt\"}\n"
+ " return needs\n"
+ "end\n"
+ "\n"
+ "function match(args)\n"
+ " a = ScFlowvarGet(0)\n"
+ " if a then\n"
+ " a = tostring(tonumber(a)+1)\n"
+ " print (a)\n"
+ " ScFlowvarSet(0, a, #a)\n"
+ " else\n"
+ " a = tostring(1)\n"
+ " print (a)\n"
+ " ScFlowvarSet(0, a, #a)\n"
+ " end\n"
+ " \n"
+ " print (\"pre check: \" .. (a))\n"
+ " if tonumber(a) == 2 then\n"
+ " print \"match\"\n"
+ " return 1\n"
+ " end\n"
+ " return 0\n"
+ "end\n"
+ "return 0\n";
+ char sig[] = "alert tcp any any -> any any (flow:to_server; luajit:unittest; sid:1;)";
+ int result = 0;
+ uint8_t httpbuf1[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.emergingthreats.net\r\n\r\n";
+ uint8_t httpbuf2[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.openinfosecfoundation.org\r\n\r\n";
+ uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
+ uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
+ TcpSession ssn;
+ Packet *p1 = NULL;
+ Packet *p2 = NULL;
+ Flow f;
+ Signature *s = NULL;
+ ThreadVars th_v;
+ DetectEngineThreadCtx *det_ctx;
+
+ ut_script = script;
+
+ memset(&th_v, 0, sizeof(th_v));
+ memset(&f, 0, sizeof(f));
+ memset(&ssn, 0, sizeof(ssn));
+
+ p1 = UTHBuildPacket(httpbuf1, httplen1, IPPROTO_TCP);
+ p2 = UTHBuildPacket(httpbuf2, httplen2, IPPROTO_TCP);
+
+ FLOW_INITIALIZE(&f);
+ f.protoctx = (void *)&ssn;
+ f.proto = IPPROTO_TCP;
+ f.flags |= FLOW_IPV4;
+ f.alproto = ALPROTO_HTTP;
+
+ p1->flow = &f;
+ p1->flowflags |= FLOW_PKT_TOSERVER;
+ p1->flowflags |= FLOW_PKT_ESTABLISHED;
+ p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+ p2->flow = &f;
+ p2->flowflags |= FLOW_PKT_TOSERVER;
+ p2->flowflags |= FLOW_PKT_ESTABLISHED;
+ p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ StreamTcpInitConfig(TRUE);
+
+ DetectEngineCtx *de_ctx = DetectEngineCtxInit();
+ if (de_ctx == NULL) {
+ goto end;
+ }
+ de_ctx->flags |= DE_QUIET;
+
+ s = DetectEngineAppendSig(de_ctx, sig);
+ if (s == NULL) {
+ printf("sig parse failed: ");
+ goto end;
+ }
+
+ SigGroupBuild(de_ctx);
+ DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
+
+ /* do detect for p1 */
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
+
+ if ((PacketAlertCheck(p1, 1))) {
+ printf("sid 1 didn't match on p1 but should have: ");
+ goto end;
+ }
+
+ /* do detect for p2 */
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
+
+ if (!(PacketAlertCheck(p2, 1))) {
+ printf("sid 1 didn't match on p2 but should have: ");
+ goto end;
+ }
+
+ FlowVar *fv = FlowVarGet(&f, 1);
+ if (fv == NULL) {
+ printf("no flowvar: ");
+ goto end;
+ }
+
+ if (fv->data.fv_str.value_len != 1) {
+ printf("%u != %u: ", fv->data.fv_str.value_len, 1);
+ goto end;
+ }
+
+ if (memcmp(fv->data.fv_str.value, "2", 1) != 0) {
+ PrintRawDataFp(stdout, fv->data.fv_str.value, fv->data.fv_str.value_len);
+
+ printf("buffer mismatch: ");
+ goto end;
+ }
+
+ result = 1;
+end:
+ if (de_ctx != NULL)
+ DetectEngineCtxFree(de_ctx);
+
+ StreamTcpFreeConfig(TRUE);
+ FLOW_DESTROY(&f);
+ UTHFreePackets(&p1, 1);
+ UTHFreePackets(&p2, 1);
+ return result;
+}
+
+/** \test http buffer, flowints */
+static int LuaMatchTest04(void)
+{
+ const char script[] =
+ "function init (args)\n"
+ " local needs = {}\n"
+ " needs[\"http.request_headers\"] = tostring(true)\n"
+ " needs[\"flowint\"] = {\"cnt\"}\n"
+ " return needs\n"
+ "end\n"
+ "\n"
+ "function match(args)\n"
+ " print \"inspecting\""
+ " a = ScFlowintGet(0)\n"
+ " if a then\n"
+ " ScFlowintSet(0, a + 1)\n"
+ " else\n"
+ " ScFlowintSet(0, 1)\n"
+ " end\n"
+ " \n"
+ " a = ScFlowintGet(0)\n"
+ " if a == 2 then\n"
+ " print \"match\"\n"
+ " return 1\n"
+ " end\n"
+ " return 0\n"
+ "end\n"
+ "return 0\n";
+ char sig[] = "alert http any any -> any any (flow:to_server; luajit:unittest; sid:1;)";
+ int result = 0;
+ uint8_t httpbuf1[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.emergingthreats.net\r\n\r\n";
+ uint8_t httpbuf2[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.openinfosecfoundation.org\r\n\r\n";
+ uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
+ uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
+ TcpSession ssn;
+ Packet *p1 = NULL;
+ Packet *p2 = NULL;
+ Flow f;
+ Signature *s = NULL;
+ ThreadVars th_v;
+ DetectEngineThreadCtx *det_ctx;
+
+ AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
+
+ ut_script = script;
+
+ memset(&th_v, 0, sizeof(th_v));
+ memset(&f, 0, sizeof(f));
+ memset(&ssn, 0, sizeof(ssn));
+
+ p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+ p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+
+ FLOW_INITIALIZE(&f);
+ f.protoctx = (void *)&ssn;
+ f.proto = IPPROTO_TCP;
+ f.flags |= FLOW_IPV4;
+ f.alproto = ALPROTO_HTTP;
+
+ p1->flow = &f;
+ p1->flowflags |= FLOW_PKT_TOSERVER;
+ p1->flowflags |= FLOW_PKT_ESTABLISHED;
+ p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ p2->flow = &f;
+ p2->flowflags |= FLOW_PKT_TOSERVER;
+ p2->flowflags |= FLOW_PKT_ESTABLISHED;
+ p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ StreamTcpInitConfig(TRUE);
+
+ DetectEngineCtx *de_ctx = DetectEngineCtxInit();
+ if (de_ctx == NULL) {
+ goto end;
+ }
+ de_ctx->flags |= DE_QUIET;
+
+ s = DetectEngineAppendSig(de_ctx, sig);
+ if (s == NULL) {
+ printf("sig parse failed: ");
+ goto end;
+ }
+
+ SigGroupBuild(de_ctx);
+ DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
+
+ SCMutexLock(&f.m);
+ int r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf1, httplen1);
+ if (r != 0) {
+ printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ HtpState *http_state = f.alstate;
+ if (http_state == NULL) {
+ printf("no http state: ");
+ goto end;
+ }
+
+ /* do detect for p1 */
+ SCLogInfo("p1");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
+
+ if (PacketAlertCheck(p1, 1)) {
+ printf("sid 1 matched on p1 but should not have: ");
+ goto end;
+ }
+
+ SCMutexLock(&f.m);
+ r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf2, httplen2);
+ if (r != 0) {
+ printf("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ /* do detect for p2 */
+ SCLogInfo("p2");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
+
+ if (!(PacketAlertCheck(p2, 1))) {
+ printf("sid 1 didn't match on p2 but should have: ");
+ goto end;
+ }
+
+ FlowVar *fv = FlowVarGet(&f, 1);
+ if (fv == NULL) {
+ printf("no flowvar: ");
+ goto end;
+ }
+
+ if (fv->data.fv_int.value != 2) {
+ printf("%u != %u: ", fv->data.fv_int.value, 2);
+ goto end;
+ }
+
+ result = 1;
+end:
+ if (alp_tctx != NULL)
+ AppLayerParserThreadCtxFree(alp_tctx);
+ if (de_ctx != NULL)
+ DetectEngineCtxFree(de_ctx);
+
+ StreamTcpFreeConfig(TRUE);
+ FLOW_DESTROY(&f);
+ UTHFreePackets(&p1, 1);
+ UTHFreePackets(&p2, 1);
+ return result;
+}
+
+/** \test http buffer, flowints */
+static int LuaMatchTest05(void)
+{
+ const char script[] =
+ "function init (args)\n"
+ " local needs = {}\n"
+ " needs[\"http.request_headers\"] = tostring(true)\n"
+ " needs[\"flowint\"] = {\"cnt\"}\n"
+ " return needs\n"
+ "end\n"
+ "\n"
+ "function match(args)\n"
+ " print \"inspecting\""
+ " a = ScFlowintIncr(0)\n"
+ " if a == 2 then\n"
+ " print \"match\"\n"
+ " return 1\n"
+ " end\n"
+ " return 0\n"
+ "end\n"
+ "return 0\n";
+ char sig[] = "alert http any any -> any any (flow:to_server; luajit:unittest; sid:1;)";
+ int result = 0;
+ uint8_t httpbuf1[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.emergingthreats.net\r\n\r\n";
+ uint8_t httpbuf2[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.openinfosecfoundation.org\r\n\r\n";
+ uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
+ uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
+ TcpSession ssn;
+ Packet *p1 = NULL;
+ Packet *p2 = NULL;
+ Flow f;
+ Signature *s = NULL;
+ ThreadVars th_v;
+ DetectEngineThreadCtx *det_ctx;
+
+ AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
+
+ ut_script = script;
+
+ memset(&th_v, 0, sizeof(th_v));
+ memset(&f, 0, sizeof(f));
+ memset(&ssn, 0, sizeof(ssn));
+
+ p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+ p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+
+ FLOW_INITIALIZE(&f);
+ f.protoctx = (void *)&ssn;
+ f.proto = IPPROTO_TCP;
+ f.flags |= FLOW_IPV4;
+ f.alproto = ALPROTO_HTTP;
+
+ p1->flow = &f;
+ p1->flowflags |= FLOW_PKT_TOSERVER;
+ p1->flowflags |= FLOW_PKT_ESTABLISHED;
+ p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ p2->flow = &f;
+ p2->flowflags |= FLOW_PKT_TOSERVER;
+ p2->flowflags |= FLOW_PKT_ESTABLISHED;
+ p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ StreamTcpInitConfig(TRUE);
+
+ DetectEngineCtx *de_ctx = DetectEngineCtxInit();
+ if (de_ctx == NULL) {
+ goto end;
+ }
+ de_ctx->flags |= DE_QUIET;
+
+ s = DetectEngineAppendSig(de_ctx, sig);
+ if (s == NULL) {
+ printf("sig parse failed: ");
+ goto end;
+ }
+
+ SigGroupBuild(de_ctx);
+ DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
+
+ SCMutexLock(&f.m);
+ int r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf1, httplen1);
+ if (r != 0) {
+ printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ HtpState *http_state = f.alstate;
+ if (http_state == NULL) {
+ printf("no http state: ");
+ goto end;
+ }
+
+ /* do detect for p1 */
+ SCLogInfo("p1");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
+
+ if (PacketAlertCheck(p1, 1)) {
+ printf("sid 1 matched on p1 but should not have: ");
+ goto end;
+ }
+
+ SCMutexLock(&f.m);
+ r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf2, httplen2);
+ if (r != 0) {
+ printf("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ /* do detect for p2 */
+ SCLogInfo("p2");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
+
+ if (!(PacketAlertCheck(p2, 1))) {
+ printf("sid 1 didn't match on p2 but should have: ");
+ goto end;
+ }
+
+ FlowVar *fv = FlowVarGet(&f, 1);
+ if (fv == NULL) {
+ printf("no flowvar: ");
+ goto end;
+ }
+
+ if (fv->data.fv_int.value != 2) {
+ printf("%u != %u: ", fv->data.fv_int.value, 2);
+ goto end;
+ }
+
+ result = 1;
+end:
+ if (alp_tctx != NULL)
+ AppLayerParserThreadCtxFree(alp_tctx);
+ if (de_ctx != NULL)
+ DetectEngineCtxFree(de_ctx);
+
+ StreamTcpFreeConfig(TRUE);
+ FLOW_DESTROY(&f);
+ UTHFreePackets(&p1, 1);
+ UTHFreePackets(&p2, 1);
+ return result;
+}
+
+/** \test http buffer, flowints */
+static int LuaMatchTest06(void)
+{
+ const char script[] =
+ "function init (args)\n"
+ " local needs = {}\n"
+ " needs[\"http.request_headers\"] = tostring(true)\n"
+ " needs[\"flowint\"] = {\"cnt\"}\n"
+ " return needs\n"
+ "end\n"
+ "\n"
+ "function match(args)\n"
+ " print \"inspecting\""
+ " a = ScFlowintGet(0)\n"
+ " if a == nil then\n"
+ " print \"new var set to 2\""
+ " ScFlowintSet(0, 2)\n"
+ " end\n"
+ " a = ScFlowintDecr(0)\n"
+ " if a == 0 then\n"
+ " print \"match\"\n"
+ " return 1\n"
+ " end\n"
+ " return 0\n"
+ "end\n"
+ "return 0\n";
+ char sig[] = "alert http any any -> any any (flow:to_server; luajit:unittest; sid:1;)";
+ int result = 0;
+ uint8_t httpbuf1[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.emergingthreats.net\r\n\r\n";
+ uint8_t httpbuf2[] =
+ "POST / HTTP/1.1\r\n"
+ "Host: www.openinfosecfoundation.org\r\n\r\n";
+ uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
+ uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
+ TcpSession ssn;
+ Packet *p1 = NULL;
+ Packet *p2 = NULL;
+ Flow f;
+ Signature *s = NULL;
+ ThreadVars th_v;
+ DetectEngineThreadCtx *det_ctx;
+
+ AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
+
+ ut_script = script;
+
+ memset(&th_v, 0, sizeof(th_v));
+ memset(&f, 0, sizeof(f));
+ memset(&ssn, 0, sizeof(ssn));
+
+ p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+ p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
+
+ FLOW_INITIALIZE(&f);
+ f.protoctx = (void *)&ssn;
+ f.proto = IPPROTO_TCP;
+ f.flags |= FLOW_IPV4;
+ f.alproto = ALPROTO_HTTP;
+
+ p1->flow = &f;
+ p1->flowflags |= FLOW_PKT_TOSERVER;
+ p1->flowflags |= FLOW_PKT_ESTABLISHED;
+ p1->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ p2->flow = &f;
+ p2->flowflags |= FLOW_PKT_TOSERVER;
+ p2->flowflags |= FLOW_PKT_ESTABLISHED;
+ p2->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
+
+ StreamTcpInitConfig(TRUE);
+
+ DetectEngineCtx *de_ctx = DetectEngineCtxInit();
+ if (de_ctx == NULL) {
+ goto end;
+ }
+ de_ctx->flags |= DE_QUIET;
+
+ s = DetectEngineAppendSig(de_ctx, sig);
+ if (s == NULL) {
+ printf("sig parse failed: ");
+ goto end;
+ }
+
+ SigGroupBuild(de_ctx);
+ DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
+
+ SCMutexLock(&f.m);
+ int r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf1, httplen1);
+ if (r != 0) {
+ printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ HtpState *http_state = f.alstate;
+ if (http_state == NULL) {
+ printf("no http state: ");
+ goto end;
+ }
+
+ /* do detect for p1 */
+ SCLogInfo("p1");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
+
+ if (PacketAlertCheck(p1, 1)) {
+ printf("sid 1 matched on p1 but should not have: ");
+ goto end;
+ }
+
+ SCMutexLock(&f.m);
+ r = AppLayerParserParse(alp_tctx, &f, ALPROTO_HTTP, STREAM_TOSERVER, httpbuf2, httplen2);
+ if (r != 0) {
+ printf("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
+ SCMutexUnlock(&f.m);
+ goto end;
+ }
+ SCMutexUnlock(&f.m);
+ /* do detect for p2 */
+ SCLogInfo("p2");
+ SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
+
+ if (!(PacketAlertCheck(p2, 1))) {
+ printf("sid 1 didn't match on p2 but should have: ");
+ goto end;
+ }
+
+ FlowVar *fv = FlowVarGet(&f, 1);
+ if (fv == NULL) {
+ printf("no flowvar: ");
+ goto end;
+ }
+
+ if (fv->data.fv_int.value != 0) {
+ printf("%u != %u: ", fv->data.fv_int.value, 0);
+ goto end;
+ }
+
+ result = 1;
+end:
+ if (alp_tctx != NULL)
+ AppLayerParserThreadCtxFree(alp_tctx);
+ if (de_ctx != NULL)
+ DetectEngineCtxFree(de_ctx);
+
+ StreamTcpFreeConfig(TRUE);
+ FLOW_DESTROY(&f);
+ UTHFreePackets(&p1, 1);
+ UTHFreePackets(&p2, 1);
+ return result;
+}
+
+#endif
+
+void DetectLuaRegisterTests(void)
+{
+#ifdef UNITTESTS
+ UtRegisterTest("LuaMatchTest01", LuaMatchTest01, 1);
+ UtRegisterTest("LuaMatchTest02", LuaMatchTest02, 1);
+ UtRegisterTest("LuaMatchTest03", LuaMatchTest03, 1);
+ UtRegisterTest("LuaMatchTest04", LuaMatchTest04, 1);
+ UtRegisterTest("LuaMatchTest05", LuaMatchTest05, 1);
+ UtRegisterTest("LuaMatchTest06", LuaMatchTest06, 1);
+#endif
+}
+
+#endif /* HAVE_LUAJIT */