aboutsummaryrefslogtreecommitdiffstats
path: root/framework/src/suricata/src/detect-parse.c
diff options
context:
space:
mode:
Diffstat (limited to 'framework/src/suricata/src/detect-parse.c')
-rw-r--r--framework/src/suricata/src/detect-parse.c3439
1 files changed, 0 insertions, 3439 deletions
diff --git a/framework/src/suricata/src/detect-parse.c b/framework/src/suricata/src/detect-parse.c
deleted file mode 100644
index f91e7591..00000000
--- a/framework/src/suricata/src/detect-parse.c
+++ /dev/null
@@ -1,3439 +0,0 @@
-/* Copyright (C) 2007-2014 Open Information Security Foundation
- *
- * You can copy, redistribute or modify this Program under the terms of
- * the GNU General Public License version 2 as published by the Free
- * Software Foundation.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * version 2 along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
- * 02110-1301, USA.
- */
-
-/**
- * \file
- *
- * \author Victor Julien <victor@inliniac.net>
- *
- * signature parser
- */
-
-#include "suricata-common.h"
-#include "debug.h"
-
-#include "detect.h"
-#include "detect-engine.h"
-#include "detect-engine-address.h"
-#include "detect-engine-port.h"
-#include "detect-engine-mpm.h"
-#include "detect-engine-state.h"
-
-#include "detect-content.h"
-#include "detect-pcre.h"
-#include "detect-uricontent.h"
-#include "detect-reference.h"
-#include "detect-ipproto.h"
-#include "detect-flow.h"
-#include "detect-app-layer-protocol.h"
-#include "detect-engine-apt-event.h"
-#include "detect-lua.h"
-#include "detect-app-layer-event.h"
-
-#include "pkt-var.h"
-#include "host.h"
-#include "util-profiling.h"
-#include "decode.h"
-
-#include "flow.h"
-
-#include "util-rule-vars.h"
-#include "conf.h"
-#include "conf-yaml-loader.h"
-
-#include "app-layer.h"
-#include "app-layer-protos.h"
-#include "app-layer-parser.h"
-
-#include "util-classification-config.h"
-#include "util-unittest.h"
-#include "util-unittest-helper.h"
-#include "util-debug.h"
-#include "string.h"
-#include "detect-parse.h"
-#include "detect-engine-iponly.h"
-#include "app-layer-detect-proto.h"
-#include "app-layer.h"
-
-extern int sc_set_caps;
-
-static pcre *config_pcre = NULL;
-static pcre *option_pcre = NULL;
-static pcre_extra *config_pcre_extra = NULL;
-static pcre_extra *option_pcre_extra = NULL;
-
-static uint32_t dbg_srcportany_cnt = 0;
-static uint32_t dbg_dstportany_cnt = 0;
-
-/**
- * \brief We use this as data to the hash table DetectEngineCtx->dup_sig_hash_table.
- */
-typedef struct SigDuplWrapper_ {
- /* the signature we want to wrap */
- Signature *s;
- /* the signature right before the above signatue in the det_ctx->sig_list */
- Signature *s_prev;
-} SigDuplWrapper;
-
-#define CONFIG_PARTS 8
-
-#define CONFIG_ACTION 0
-#define CONFIG_PROTO 1
-#define CONFIG_SRC 2
-#define CONFIG_SP 3
-#define CONFIG_DIREC 4
-#define CONFIG_DST 5
-#define CONFIG_DP 6
-#define CONFIG_OPTS 7
-
-/* if enclosed in [], spaces are allowed */
-#define CONFIG_PCRE_SRCDST "(" \
- "[\\[\\]A-z0-9\\.\\:_\\$\\!\\-,\\/]+" \
- "|" \
- "\\[[\\[\\]A-z0-9\\.\\:_\\$\\!\\-,\\/\\s]+\\]"\
- ")"
-
-/* if enclosed in [], spaces are allowed */
-#define CONFIG_PCRE_PORT "(" \
- "[\\:A-z0-9_\\$\\!,]+"\
- "|"\
- "\\[[\\:A-z0-9_\\$\\!,\\s]+\\]"\
- ")"
-
-/* format: action space(s) protocol spaces(s) src space(s) sp spaces(s) dir spaces(s) dst spaces(s) dp spaces(s) options */
-#define CONFIG_PCRE "^([A-z]+)\\s+([A-z0-9\\-]+)\\s+" \
- CONFIG_PCRE_SRCDST \
- "\\s+"\
- CONFIG_PCRE_PORT \
- "\\s+(-\\>|\\<\\>|\\<\\-)\\s+" \
- CONFIG_PCRE_SRCDST \
- "\\s+" \
- CONFIG_PCRE_PORT \
- "(?:\\s+\\((.*)?(?:\\s*)\\))?(?:(?:\\s*)\\n)?\\s*$"
-#define OPTION_PARTS 3
-#define OPTION_PCRE "^\\s*([A-z_0-9-\\.]+)(?:\\s*\\:\\s*(.*)(?<!\\\\))?\\s*;\\s*(?:\\s*(.*))?\\s*$"
-
-/** helper structure for sig parsing */
-typedef struct SignatureParser_ {
- char action[DETECT_MAX_RULE_SIZE];
- char protocol[DETECT_MAX_RULE_SIZE];
- char direction[DETECT_MAX_RULE_SIZE];
- char src[DETECT_MAX_RULE_SIZE];
- char dst[DETECT_MAX_RULE_SIZE];
- char sp[DETECT_MAX_RULE_SIZE];
- char dp[DETECT_MAX_RULE_SIZE];
- char opts[DETECT_MAX_RULE_SIZE];
-} SignatureParser;
-
-int DetectEngineContentModifierBufferSetup(DetectEngineCtx *de_ctx, Signature *s, char *arg,
- uint8_t sm_type, uint8_t sm_list,
- AppProto alproto, void (*CustomCallback)(Signature *s))
-{
- SigMatch *sm = NULL;
- int ret = -1;
-
- if (arg != NULL && strcmp(arg, "") != 0) {
- SCLogError(SC_ERR_INVALID_ARGUMENT, "%s shouldn't be supplied "
- "with an argument", sigmatch_table[sm_type].name);
- goto end;
- }
-
- if (s->list != DETECT_SM_LIST_NOTSET) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "\"%s\" keyword seen "
- "with a sticky buffer still set. Reset sticky buffer "
- "with pkt_data before using the modifier.",
- sigmatch_table[sm_type].name);
- goto end;
- }
- /* for now let's hardcode it as http */
- if (s->alproto != ALPROTO_UNKNOWN && s->alproto != alproto) {
- SCLogError(SC_ERR_CONFLICTING_RULE_KEYWORDS, "rule contains conflicting "
- "alprotos set");
- goto end;
- }
-
- sm = SigMatchGetLastSMFromLists(s, 2,
- DETECT_CONTENT, s->sm_lists_tail[DETECT_SM_LIST_PMATCH]);
- if (sm == NULL) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "\"%s\" keyword "
- "found inside the rule without a content context. "
- "Please use a \"content\" keyword before using the "
- "\"%s\" keyword", sigmatch_table[sm_type].name,
- sigmatch_table[sm_type].name);
- goto end;
- }
- DetectContentData *cd = (DetectContentData *)sm->ctx;
- if (cd->flags & DETECT_CONTENT_RAWBYTES) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "%s rule can not "
- "be used with the rawbytes rule keyword",
- sigmatch_table[sm_type].name);
- goto end;
- }
- if (cd->flags & (DETECT_CONTENT_WITHIN | DETECT_CONTENT_DISTANCE)) {
- SigMatch *pm = SigMatchGetLastSMFromLists(s, 4,
- DETECT_CONTENT, sm->prev,
- DETECT_PCRE, sm->prev);
- if (pm != NULL) {
- if (pm->type == DETECT_CONTENT) {
- DetectContentData *tmp_cd = (DetectContentData *)pm->ctx;
- tmp_cd->flags &= ~DETECT_CONTENT_RELATIVE_NEXT;
- } else {
- DetectPcreData *tmp_pd = (DetectPcreData *)pm->ctx;
- tmp_pd->flags &= ~DETECT_PCRE_RELATIVE_NEXT;
- }
- }
-
- pm = SigMatchGetLastSMFromLists(s, 4,
- DETECT_CONTENT, s->sm_lists_tail[sm_list],
- DETECT_PCRE, s->sm_lists_tail[sm_list]);
- if (pm != NULL) {
- if (pm->type == DETECT_CONTENT) {
- DetectContentData *tmp_cd = (DetectContentData *)pm->ctx;
- tmp_cd->flags |= DETECT_CONTENT_RELATIVE_NEXT;
- } else {
- DetectPcreData *tmp_pd = (DetectPcreData *)pm->ctx;
- tmp_pd->flags |= DETECT_PCRE_RELATIVE_NEXT;
- }
- }
- }
- if (CustomCallback != NULL)
- CustomCallback(s);
- s->alproto = alproto;
- s->flags |= SIG_FLAG_APPLAYER;
-
- /* transfer the sm from the pmatch list to hcbdmatch list */
- SigMatchTransferSigMatchAcrossLists(sm,
- &s->sm_lists[DETECT_SM_LIST_PMATCH],
- &s->sm_lists_tail[DETECT_SM_LIST_PMATCH],
- &s->sm_lists[sm_list],
- &s->sm_lists_tail[sm_list]);
-
- ret = 0;
- end:
- return ret;
-}
-
-uint32_t DbgGetSrcPortAnyCnt(void)
-{
- return dbg_srcportany_cnt;
-}
-
-uint32_t DbgGetDstPortAnyCnt(void)
-{
- return dbg_dstportany_cnt;
-}
-
-SigMatch *SigMatchAlloc(void)
-{
- SigMatch *sm = SCMalloc(sizeof(SigMatch));
- if (unlikely(sm == NULL))
- return NULL;
-
- memset(sm, 0, sizeof(SigMatch));
- sm->prev = NULL;
- sm->next = NULL;
- return sm;
-}
-
-/** \brief free a SigMatch
- * \param sm SigMatch to free.
- */
-void SigMatchFree(SigMatch *sm)
-{
- if (sm == NULL)
- return;
-
- /** free the ctx, for that we call the Free func */
- if (sm->ctx != NULL) {
- if (sigmatch_table[sm->type].Free != NULL) {
- sigmatch_table[sm->type].Free(sm->ctx);
- }
- }
- SCFree(sm);
-}
-
-/* Get the detection module by name */
-SigTableElmt *SigTableGet(char *name)
-{
- SigTableElmt *st = NULL;
- int i = 0;
-
- for (i = 0; i < DETECT_TBLSIZE; i++) {
- st = &sigmatch_table[i];
-
- if (st->name != NULL) {
- if (strcasecmp(name,st->name) == 0)
- return st;
- if (st->alias != NULL && strcasecmp(name,st->alias) == 0)
- return st;
- }
- }
-
- return NULL;
-}
-
-/**
- * \brief Append a SigMatch to the list type.
- *
- * \param s Signature.
- * \param new The sig match to append.
- * \param list The list to append to.
- */
-void SigMatchAppendSMToList(Signature *s, SigMatch *new, int list)
-{
- if (s->sm_lists[list] == NULL) {
- s->sm_lists[list] = new;
- s->sm_lists_tail[list] = new;
- new->next = NULL;
- new->prev = NULL;
- } else {
- SigMatch *cur = s->sm_lists_tail[list];
- cur->next = new;
- new->prev = cur;
- new->next = NULL;
- s->sm_lists_tail[list] = new;
- }
-
- new->idx = s->sm_cnt;
- s->sm_cnt++;
-}
-
-void SigMatchRemoveSMFromList(Signature *s, SigMatch *sm, int sm_list)
-{
- if (sm == s->sm_lists[sm_list]) {
- s->sm_lists[sm_list] = sm->next;
- }
- if (sm == s->sm_lists_tail[sm_list]) {
- s->sm_lists_tail[sm_list] = sm->prev;
- }
- if (sm->prev != NULL)
- sm->prev->next = sm->next;
- if (sm->next != NULL)
- sm->next->prev = sm->prev;
-
- return;
-}
-
-/**
- * \brief Returns a pointer to the last SigMatch instance of a particular type
- * in a Signature of the payload list.
- *
- * \param s Pointer to the tail of the sigmatch list
- * \param type SigMatch type which has to be searched for in the Signature.
- *
- * \retval match Pointer to the last SigMatch instance of type 'type'.
- */
-static inline SigMatch *SigMatchGetLastSM(SigMatch *sm, uint8_t type)
-{
- while (sm != NULL) {
- if (sm->type == type) {
- return sm;
- }
- sm = sm->prev;
- }
-
- return NULL;
-}
-
-/**
- * \brief Returns the sm with the largest index (added latest) from all the lists.
- *
- * \retval Pointer to Last sm.
- */
-SigMatch *SigMatchGetLastSMFromLists(Signature *s, int args, ...)
-{
- if (args == 0 || args % 2 != 0) {
- SCLogError(SC_ERR_INVALID_ARGUMENTS, "You need to send an even no of args "
- "(non zero as well) to this function, since we need a "
- "SigMatch list for every SigMatch type(send a map of sm_type "
- "and sm_list) sent");
- /* as this is a bug we should abort to ease debugging */
- BUG_ON(1);
- }
-
- SigMatch *sm_last = NULL;
- SigMatch *sm_new;
- int i;
-
- va_list ap;
- va_start(ap, args);
-
- for (i = 0; i < args; i += 2) {
- int sm_type = va_arg(ap, int);
- SigMatch *sm_list = va_arg(ap, SigMatch *);
- sm_new = SigMatchGetLastSM(sm_list, sm_type);
- if (sm_new == NULL)
- continue;
- if (sm_last == NULL || sm_new->idx > sm_last->idx)
- sm_last = sm_new;
- }
-
- va_end(ap);
-
- return sm_last;
-}
-
-void SigMatchTransferSigMatchAcrossLists(SigMatch *sm,
- SigMatch **src_sm_list, SigMatch **src_sm_list_tail,
- SigMatch **dst_sm_list, SigMatch **dst_sm_list_tail)
-{
- /* we won't do any checks for args */
-
- if (sm->prev != NULL)
- sm->prev->next = sm->next;
- if (sm->next != NULL)
- sm->next->prev = sm->prev;
-
- if (sm == *src_sm_list)
- *src_sm_list = sm->next;
- if (sm == *src_sm_list_tail)
- *src_sm_list_tail = sm->prev;
-
- if (*dst_sm_list == NULL) {
- *dst_sm_list = sm;
- *dst_sm_list_tail = sm;
- sm->next = NULL;
- sm->prev = NULL;
- } else {
- SigMatch *cur = *dst_sm_list_tail;
- cur->next = sm;
- sm->prev = cur;
- sm->next = NULL;
- *dst_sm_list_tail = sm;
- }
-
- return;
-}
-
-int SigMatchListSMBelongsTo(Signature *s, SigMatch *key_sm)
-{
- int list = 0;
-
- for (list = 0; list < DETECT_SM_LIST_MAX; list++) {
- SigMatch *sm = s->sm_lists[list];
- while (sm != NULL) {
- if (sm == key_sm)
- return list;
- sm = sm->next;
- }
- }
-
- SCLogError(SC_ERR_INVALID_SIGNATURE, "Unable to find the sm in any of the "
- "sm lists");
- return -1;
-}
-
-void SigParsePrepare(void)
-{
- char *regexstr = CONFIG_PCRE;
- const char *eb;
- int eo;
- int opts = 0;
-
- opts |= PCRE_UNGREEDY;
- config_pcre = pcre_compile(regexstr, opts, &eb, &eo, NULL);
- if(config_pcre == NULL)
- {
- SCLogError(SC_ERR_PCRE_COMPILE, "pcre compile of \"%s\" failed at offset %" PRId32 ": %s", regexstr, eo, eb);
- exit(1);
- }
-
- config_pcre_extra = pcre_study(config_pcre, 0, &eb);
- if(eb != NULL)
- {
- SCLogError(SC_ERR_PCRE_STUDY, "pcre study failed: %s", eb);
- exit(1);
- }
-
- regexstr = OPTION_PCRE;
- opts |= PCRE_UNGREEDY;
-
- option_pcre = pcre_compile(regexstr, opts, &eb, &eo, NULL);
- if(option_pcre == NULL)
- {
- SCLogError(SC_ERR_PCRE_COMPILE, "pcre compile of \"%s\" failed at offset %" PRId32 ": %s", regexstr, eo, eb);
- exit(1);
- }
-
- option_pcre_extra = pcre_study(option_pcre, 0, &eb);
- if(eb != NULL)
- {
- SCLogError(SC_ERR_PCRE_STUDY, "pcre study failed: %s", eb);
- exit(1);
- }
-}
-
-static int SigParseOptions(DetectEngineCtx *de_ctx, Signature *s, char *optstr, char *output, size_t output_size)
-{
-#define MAX_SUBSTRINGS 30
- int ov[MAX_SUBSTRINGS];
- int ret = 0;
- SigTableElmt *st = NULL;
- char optname[64];
- char optvalue[DETECT_MAX_RULE_SIZE] = "";
-
- ret = pcre_exec(option_pcre, option_pcre_extra, optstr, strlen(optstr), 0, 0, ov, MAX_SUBSTRINGS);
- /* if successful, we either have:
- * 2: keyword w/o value
- * 3: keyword w value, final opt OR keyword w/o value, more options coming
- * 4: keyword w value, more options coming
- */
- if (ret != 2 && ret != 3 && ret != 4) {
- SCLogError(SC_ERR_PCRE_MATCH, "pcre_exec failed: ret %" PRId32 ", optstr \"%s\"", ret, optstr);
- goto error;
- }
-
- /* extract the substrings */
- if (pcre_copy_substring(optstr, ov, MAX_SUBSTRINGS, 1, optname, sizeof(optname)) < 0) {
- goto error;
- }
-
- /* Call option parsing */
- st = SigTableGet(optname);
- if (st == NULL) {
- SCLogError(SC_ERR_RULE_KEYWORD_UNKNOWN, "unknown rule keyword '%s'.", optname);
- goto error;
- }
-
- if (ret == 3) {
- if (st->flags & SIGMATCH_NOOPT) {
- if (pcre_copy_substring(optstr, ov, MAX_SUBSTRINGS, 2, output, output_size) < 0) {
- goto error;
- }
- } else {
- if (pcre_copy_substring(optstr, ov, MAX_SUBSTRINGS, 2, optvalue, sizeof(optvalue)) < 0) {
- goto error;
- }
- }
- } else if (ret == 4) {
- if (pcre_copy_substring(optstr, ov, MAX_SUBSTRINGS, 2, optvalue, sizeof(optvalue)) < 0) {
- goto error;
- }
- if (pcre_copy_substring(optstr, ov, MAX_SUBSTRINGS, 3, output, output_size) < 0) {
- goto error;
- }
- }
-
- if (!(st->flags & (SIGMATCH_NOOPT|SIGMATCH_OPTIONAL_OPT))) {
- if (strlen(optvalue) == 0) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "invalid formatting or malformed option to %s keyword: \'%s\'",
- optname, optstr);
- goto error;
- }
- }
-
- /* setup may or may not add a new SigMatch to the list */
- if (st->Setup(de_ctx, s, strlen(optvalue) ? optvalue : NULL) < 0) {
- SCLogDebug("\"%s\" failed to setup", st->name);
- goto error;
- }
-
- if (ret == 4) {
- return 1;
- }
-
- return 0;
-
-error:
- return -1;
-}
-
-/** \brief Parse address string and update signature
- *
- * \retval 0 ok, -1 error
- */
-int SigParseAddress(const DetectEngineCtx *de_ctx,
- Signature *s, const char *addrstr, char flag)
-{
- SCLogDebug("Address Group \"%s\" to be parsed now", addrstr);
-
- /* pass on to the address(list) parser */
- if (flag == 0) {
- if (strcasecmp(addrstr, "any") == 0)
- s->flags |= SIG_FLAG_SRC_ANY;
-
- if (DetectAddressParse(de_ctx, &s->src, (char *)addrstr) < 0)
- goto error;
- } else {
- if (strcasecmp(addrstr, "any") == 0)
- s->flags |= SIG_FLAG_DST_ANY;
-
- if (DetectAddressParse(de_ctx, &s->dst, (char *)addrstr) < 0)
- goto error;
- }
-
- return 0;
-
-error:
- return -1;
-}
-
-/**
- * \brief Parses the protocol supplied by the Signature.
- *
- * http://www.iana.org/assignments/protocol-numbers
- *
- * \param s Pointer to the Signature instance to which the parsed
- * protocol has to be added.
- * \param protostr Pointer to the character string containing the protocol name.
- *
- * \retval 0 On successfully parsing the protocl sent as the argument.
- * \retval -1 On failure
- */
-int SigParseProto(Signature *s, const char *protostr)
-{
- SCEnter();
-
- int r = DetectProtoParse(&s->proto, (char *)protostr);
- if (r < 0) {
- s->alproto = AppLayerGetProtoByName((char *)protostr);
- /* indicate that the signature is app-layer */
- if (s->alproto != ALPROTO_UNKNOWN)
- s->flags |= SIG_FLAG_APPLAYER;
- else {
- SCLogError(SC_ERR_UNKNOWN_PROTOCOL, "protocol \"%s\" cannot be used "
- "in a signature. Either detection for this protocol "
- "supported yet OR detection has been disabled for "
- "protocol through the yaml option "
- "app-layer.protocols.%s.detection-enabled", protostr,
- protostr);
- SCReturnInt(-1);
- }
- }
-
- /* if any of these flags are set they are set in a mutually exclusive
- * manner */
- if (s->proto.flags & DETECT_PROTO_ONLY_PKT) {
- s->flags |= SIG_FLAG_REQUIRE_PACKET;
- } else if (s->proto.flags & DETECT_PROTO_ONLY_STREAM) {
- s->flags |= SIG_FLAG_REQUIRE_STREAM;
- }
-
- SCReturnInt(0);
-}
-
-/**
- * \brief Parses the port(source or destination) field, from a Signature.
- *
- * \param s Pointer to the signature which has to be updated with the
- * port information.
- * \param portstr Pointer to the character string containing the port info.
- * \param Flag which indicates if the portstr received is src or dst
- * port. For src port: flag = 0, dst port: flag = 1.
- *
- * \retval 0 On success.
- * \retval -1 On failure.
- */
-static int SigParsePort(const DetectEngineCtx *de_ctx,
- Signature *s, const char *portstr, char flag)
-{
- int r = 0;
-
- /* XXX VJ exclude handling this for none UDP/TCP proto's */
-
- SCLogDebug("Port group \"%s\" to be parsed", portstr);
-
- if (flag == 0) {
- if (strcasecmp(portstr, "any") == 0)
- s->flags |= SIG_FLAG_SP_ANY;
-
- r = DetectPortParse(de_ctx, &s->sp, (char *)portstr);
- } else if (flag == 1) {
- if (strcasecmp(portstr, "any") == 0)
- s->flags |= SIG_FLAG_DP_ANY;
-
- r = DetectPortParse(de_ctx, &s->dp, (char *)portstr);
- }
-
- if (r < 0)
- return -1;
-
- return 0;
-}
-
-/** \retval 1 valid
- * \retval 0 invalid
- */
-static int SigParseActionRejectValidate(const char *action)
-{
-#ifdef HAVE_LIBNET11
-#ifdef HAVE_LIBCAP_NG
- if (sc_set_caps == TRUE) {
- SCLogError(SC_ERR_LIBNET11_INCOMPATIBLE_WITH_LIBCAP_NG, "Libnet 1.1 is "
- "incompatible with POSIX based capabilities with privs dropping. "
- "For rejects to work, run as root/super user.");
- return 0;
- }
-#endif
-#else /* no libnet 1.1 */
- SCLogError(SC_ERR_LIBNET_REQUIRED_FOR_ACTION, "Libnet 1.1.x is "
- "required for action \"%s\" but is not compiled into Suricata",
- action);
- return 0;
-#endif
- return 1;
-}
-
-/**
- * \brief Parses the action that has been used by the Signature and allots it
- * to its Signature instance.
- *
- * \param s Pointer to the Signature instance to which the action belongs.
- * \param action Pointer to the action string used by the Signature.
- *
- * \retval 0 On successfully parsing the action string and adding it to the
- * Signature.
- * \retval -1 On failure.
- */
-int SigParseAction(Signature *s, const char *action)
-{
- if (strcasecmp(action, "alert") == 0) {
- s->action = ACTION_ALERT;
- return 0;
- } else if (strcasecmp(action, "drop") == 0) {
- s->action = ACTION_DROP;
- return 0;
- } else if (strcasecmp(action, "pass") == 0) {
- s->action = ACTION_PASS;
- return 0;
- } else if (strcasecmp(action, "reject") == 0) {
- if (!(SigParseActionRejectValidate(action)))
- return -1;
- s->action = ACTION_REJECT|ACTION_DROP;
- return 0;
- } else if (strcasecmp(action, "rejectsrc") == 0) {
- if (!(SigParseActionRejectValidate(action)))
- return -1;
- s->action = ACTION_REJECT|ACTION_DROP;
- return 0;
- } else if (strcasecmp(action, "rejectdst") == 0) {
- if (!(SigParseActionRejectValidate(action)))
- return -1;
- s->action = ACTION_REJECT_DST|ACTION_DROP;
- return 0;
- } else if (strcasecmp(action, "rejectboth") == 0) {
- if (!(SigParseActionRejectValidate(action)))
- return -1;
- s->action = ACTION_REJECT_BOTH|ACTION_DROP;
- return 0;
- } else {
- SCLogError(SC_ERR_INVALID_ACTION,"An invalid action \"%s\" was given",action);
- return -1;
- }
-}
-
-/**
- * \internal
- * \brief split a signature string into a few blocks for further parsing
- */
-static int SigParseBasics(const DetectEngineCtx *de_ctx,
- Signature *s, const char *sigstr, SignatureParser *parser, uint8_t addrs_direction)
-{
-#define MAX_SUBSTRINGS 30
- int ov[MAX_SUBSTRINGS];
- int ret = 0;
-
- ret = pcre_exec(config_pcre, config_pcre_extra, sigstr, strlen(sigstr), 0, 0, ov, MAX_SUBSTRINGS);
- if (ret != 8 && ret != 9) {
- SCLogDebug("pcre_exec failed: ret %" PRId32 ", sigstr \"%s\"", ret, sigstr);
- goto error;
- }
-
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 1, parser->action, sizeof(parser->action)) < 0)
- goto error;
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 2, parser->protocol, sizeof(parser->protocol)) < 0)
- goto error;
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 3, parser->src, sizeof(parser->src)) < 0)
- goto error;
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 4, parser->sp, sizeof(parser->sp)) < 0)
- goto error;
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 5, parser->direction, sizeof(parser->direction)) < 0)
- goto error;
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 6, parser->dst, sizeof(parser->dst)) < 0)
- goto error;
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 7, parser->dp, sizeof(parser->dp)) < 0)
- goto error;
- if (ret == 9) {
- if (pcre_copy_substring(sigstr, ov, MAX_SUBSTRINGS, 8, parser->opts, sizeof(parser->opts)) < 0)
- goto error;
- }
-
- /* Parse Action */
- if (SigParseAction(s, parser->action) < 0)
- goto error;
-
- if (SigParseProto(s, parser->protocol) < 0)
- goto error;
-
- if (strcmp(parser->direction, "<-") == 0) {
- SCLogError(SC_ERR_INVALID_DIRECTION, "\"<-\" is not a valid direction modifier, \"->\" and \"<>\" are supported.");
- goto error;
- }
- /* Check if it is bidirectional */
- if (strcmp(parser->direction, "<>") == 0)
- s->init_flags |= SIG_FLAG_INIT_BIDIREC;
-
- /* Parse Address & Ports */
- if (SigParseAddress(de_ctx, s, parser->src, SIG_DIREC_SRC ^ addrs_direction) < 0)
- goto error;
-
- if (SigParseAddress(de_ctx, s, parser->dst, SIG_DIREC_DST ^ addrs_direction) < 0)
- goto error;
-
- /* For IPOnly */
- if (IPOnlySigParseAddress(de_ctx, s, parser->src, SIG_DIREC_SRC ^ addrs_direction) < 0)
- goto error;
-
- if (IPOnlySigParseAddress(de_ctx, s, parser->dst, SIG_DIREC_DST ^ addrs_direction) < 0)
- goto error;
-
- /* By AWS - Traditionally we should be doing this only for tcp/udp/sctp,
- * but we do it for regardless of ip proto, since the dns/dnstcp/dnsudp
- * changes that we made sees to it that at this point of time we don't
- * set the ip proto for the sig. We do it a bit later. */
- if (SigParsePort(de_ctx, s, parser->sp, SIG_DIREC_SRC ^ addrs_direction) < 0)
- goto error;
- if (SigParsePort(de_ctx, s, parser->dp, SIG_DIREC_DST ^ addrs_direction) < 0)
- goto error;
-
- return 0;
-
-error:
- return -1;
-}
-
-/**
- * \brief parse a signature
- *
- * \param de_ctx detection engine ctx to add it to
- * \param s memory structure to store the signature in
- * \param sigstr the raw signature as a null terminated string
- * \param addrs_direction direction (for bi-directional sigs)
- *
- * \param -1 parse error
- * \param 0 ok
- */
-int SigParse(DetectEngineCtx *de_ctx, Signature *s, char *sigstr, uint8_t addrs_direction)
-{
- SCEnter();
-
- SignatureParser parser;
- memset(&parser, 0x00, sizeof(parser));
-
- s->sig_str = sigstr;
-
- int ret = SigParseBasics(de_ctx, s, sigstr, &parser, addrs_direction);
- if (ret < 0) {
- SCLogDebug("SigParseBasics failed");
- SCReturnInt(-1);
- }
-
- /* we can have no options, so make sure we have them */
- if (strlen(parser.opts) > 0) {
- size_t buffer_size = strlen(parser.opts) + 1;
- char input[buffer_size];
- char output[buffer_size];
- memset(input, 0x00, buffer_size);
- memcpy(input, parser.opts, strlen(parser.opts)+1);
-
- /* loop the option parsing. Each run processes one option
- * and returns the rest of the option string through the
- * output variable. */
- do {
- memset(output, 0x00, buffer_size);
- ret = SigParseOptions(de_ctx, s, input, output, buffer_size);
- if (ret == 1) {
- memcpy(input, output, buffer_size);
- }
-
- } while (ret == 1);
- }
-
- s->sig_str = NULL;
-
- DetectIPProtoRemoveAllSMs(s);
-
- SCReturnInt(ret);
-}
-
-Signature *SigAlloc (void)
-{
- Signature *sig = SCMalloc(sizeof(Signature));
- if (unlikely(sig == NULL))
- return NULL;
-
- memset(sig, 0, sizeof(Signature));
-
- /* assign it to -1, so that we can later check if the value has been
- * overwritten after the Signature has been parsed, and if it hasn't been
- * overwritten, we can then assign the default value of 3 */
- sig->prio = -1;
-
- sig->list = DETECT_SM_LIST_NOTSET;
- return sig;
-}
-
-/**
- * \internal
- * \brief Free Reference list
- *
- * \param s Pointer to the signature
- */
-static void SigRefFree (Signature *s)
-{
- SCEnter();
-
- DetectReference *ref = NULL;
- DetectReference *next_ref = NULL;
-
- if (s == NULL) {
- SCReturn;
- }
-
- SCLogDebug("s %p, s->references %p", s, s->references);
-
- for (ref = s->references; ref != NULL;) {
- next_ref = ref->next;
- DetectReferenceFree(ref);
- ref = next_ref;
- }
-
- s->references = NULL;
-
- SCReturn;
-}
-
-static void SigMatchFreeArrays(Signature *s)
-{
- if (s != NULL) {
- int type;
- for (type = 0; type < DETECT_SM_LIST_MAX; type++) {
- if (s->sm_arrays[type] != NULL)
- SCFree(s->sm_arrays[type]);
- }
- }
-}
-
-void SigFree(Signature *s)
-{
- if (s == NULL)
- return;
-
- if (s->CidrDst != NULL)
- IPOnlyCIDRListFree(s->CidrDst);
-
- if (s->CidrSrc != NULL)
- IPOnlyCIDRListFree(s->CidrSrc);
-
- int i;
- for (i = 0; i < DETECT_SM_LIST_MAX; i++) {
- SigMatch *sm = s->sm_lists[i], *nsm;
- while (sm != NULL) {
- nsm = sm->next;
- SigMatchFree(sm);
- sm = nsm;
- }
- }
- SigMatchFreeArrays(s);
-
- DetectAddressHeadCleanup(&s->src);
- DetectAddressHeadCleanup(&s->dst);
-
- if (s->sp != NULL) {
- DetectPortCleanupList(s->sp);
- }
- if (s->dp != NULL) {
- DetectPortCleanupList(s->dp);
- }
-
- if (s->msg != NULL)
- SCFree(s->msg);
-
- if (s->addr_src_match4 != NULL) {
- SCFree(s->addr_src_match4);
- }
- if (s->addr_dst_match4 != NULL) {
- SCFree(s->addr_dst_match4);
- }
- if (s->addr_src_match6 != NULL) {
- SCFree(s->addr_src_match6);
- }
- if (s->addr_dst_match6 != NULL) {
- SCFree(s->addr_dst_match6);
- }
-
- SigRefFree(s);
-
- SCFree(s);
-}
-
-/**
- * \internal
- * \brief build address match array for cache efficient matching
- *
- * \param s the signature
- */
-static void SigBuildAddressMatchArray(Signature *s)
-{
- /* source addresses */
- uint16_t cnt = 0;
- uint16_t idx = 0;
- DetectAddress *da = s->src.ipv4_head;
- for ( ; da != NULL; da = da->next) {
- cnt++;
- }
- if (cnt > 0) {
- s->addr_src_match4 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv4));
- if (s->addr_src_match4 == NULL) {
- exit(EXIT_FAILURE);
- }
-
- for (da = s->src.ipv4_head; da != NULL; da = da->next) {
- s->addr_src_match4[idx].ip = ntohl(da->ip.addr_data32[0]);
- s->addr_src_match4[idx].ip2 = ntohl(da->ip2.addr_data32[0]);
- idx++;
- }
- s->addr_src_match4_cnt = cnt;
- }
-
- /* destination addresses */
- cnt = 0;
- idx = 0;
- da = s->dst.ipv4_head;
- for ( ; da != NULL; da = da->next) {
- cnt++;
- }
- if (cnt > 0) {
- s->addr_dst_match4 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv4));
- if (s->addr_dst_match4 == NULL) {
- exit(EXIT_FAILURE);
- }
-
- for (da = s->dst.ipv4_head; da != NULL; da = da->next) {
- s->addr_dst_match4[idx].ip = ntohl(da->ip.addr_data32[0]);
- s->addr_dst_match4[idx].ip2 = ntohl(da->ip2.addr_data32[0]);
- idx++;
- }
- s->addr_dst_match4_cnt = cnt;
- }
-
- /* source addresses IPv6 */
- cnt = 0;
- idx = 0;
- da = s->src.ipv6_head;
- for ( ; da != NULL; da = da->next) {
- cnt++;
- }
- if (cnt > 0) {
- s->addr_src_match6 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv6));
- if (s->addr_src_match6 == NULL) {
- exit(EXIT_FAILURE);
- }
-
- for (da = s->src.ipv6_head; da != NULL; da = da->next) {
- s->addr_src_match6[idx].ip[0] = ntohl(da->ip.addr_data32[0]);
- s->addr_src_match6[idx].ip[1] = ntohl(da->ip.addr_data32[1]);
- s->addr_src_match6[idx].ip[2] = ntohl(da->ip.addr_data32[2]);
- s->addr_src_match6[idx].ip[3] = ntohl(da->ip.addr_data32[3]);
- s->addr_src_match6[idx].ip2[0] = ntohl(da->ip2.addr_data32[0]);
- s->addr_src_match6[idx].ip2[1] = ntohl(da->ip2.addr_data32[1]);
- s->addr_src_match6[idx].ip2[2] = ntohl(da->ip2.addr_data32[2]);
- s->addr_src_match6[idx].ip2[3] = ntohl(da->ip2.addr_data32[3]);
- idx++;
- }
- s->addr_src_match6_cnt = cnt;
- }
-
- /* destination addresses IPv6 */
- cnt = 0;
- idx = 0;
- da = s->dst.ipv6_head;
- for ( ; da != NULL; da = da->next) {
- cnt++;
- }
- if (cnt > 0) {
- s->addr_dst_match6 = SCMalloc(cnt * sizeof(DetectMatchAddressIPv6));
- if (s->addr_dst_match6 == NULL) {
- exit(EXIT_FAILURE);
- }
-
- for (da = s->dst.ipv6_head; da != NULL; da = da->next) {
- s->addr_dst_match6[idx].ip[0] = ntohl(da->ip.addr_data32[0]);
- s->addr_dst_match6[idx].ip[1] = ntohl(da->ip.addr_data32[1]);
- s->addr_dst_match6[idx].ip[2] = ntohl(da->ip.addr_data32[2]);
- s->addr_dst_match6[idx].ip[3] = ntohl(da->ip.addr_data32[3]);
- s->addr_dst_match6[idx].ip2[0] = ntohl(da->ip2.addr_data32[0]);
- s->addr_dst_match6[idx].ip2[1] = ntohl(da->ip2.addr_data32[1]);
- s->addr_dst_match6[idx].ip2[2] = ntohl(da->ip2.addr_data32[2]);
- s->addr_dst_match6[idx].ip2[3] = ntohl(da->ip2.addr_data32[3]);
- idx++;
- }
- s->addr_dst_match6_cnt = cnt;
- }
-}
-
-/**
- * \internal
- * \brief validate a just parsed signature for internal inconsistencies
- *
- * \param s just parsed signature
- *
- * \retval 0 invalid
- * \retval 1 valid
- */
-int SigValidate(DetectEngineCtx *de_ctx, Signature *s)
-{
- uint32_t u = 0;
- uint32_t sig_flags = 0;
- SigMatch *sm, *pm;
-
- SCEnter();
-
- if ((s->flags & SIG_FLAG_REQUIRE_PACKET) &&
- (s->flags & SIG_FLAG_REQUIRE_STREAM)) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "can't mix packet keywords with "
- "tcp-stream or flow:only_stream. Invalidating signature.");
- SCReturnInt(0);
- }
-
- for (sm = s->sm_lists[DETECT_SM_LIST_MATCH]; sm != NULL; sm = sm->next) {
- if (sm->type == DETECT_FLOW) {
- DetectFlowData *fd = (DetectFlowData *)sm->ctx;
- if (fd == NULL)
- continue;
-
- if (fd->flags & FLOW_PKT_TOCLIENT) {
- /* check for uricontent + from_server/to_client */
- if (s->sm_lists[DETECT_SM_LIST_UMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HRUDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HCBDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HMDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HUADMATCH] != NULL) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "can't use uricontent "
- "/http_uri , raw_uri, http_client_body, "
- "http_method, http_user_agent keywords "
- "with flow:to_client or flow:from_server");
- SCReturnInt(0);
- }
- } else if (fd->flags & FLOW_PKT_TOSERVER) {
- /* check for uricontent + from_server/to_client */
- if (/*s->sm_lists[DETECT_SM_LIST_FILEDATA] != NULL ||*/
- s->sm_lists[DETECT_SM_LIST_HSMDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HSCDMATCH] != NULL) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "can't use http_"
- "server_body, http_stat_msg, http_stat_code "
- "with flow:to_server or flow:from_client");
- SCReturnInt(0);
- }
- }
- }
- }
-
- if ((s->sm_lists[DETECT_SM_LIST_FILEDATA] != NULL && s->alproto == ALPROTO_SMTP) ||
- s->sm_lists[DETECT_SM_LIST_UMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HRUDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HCBDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HMDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HUADMATCH] != NULL) {
- sig_flags |= SIG_FLAG_TOSERVER;
- s->flags |= SIG_FLAG_TOSERVER;
- s->flags &= ~SIG_FLAG_TOCLIENT;
- }
- if ((s->sm_lists[DETECT_SM_LIST_FILEDATA] != NULL && s->alproto == ALPROTO_HTTP) ||
- s->sm_lists[DETECT_SM_LIST_HSMDMATCH] != NULL ||
- s->sm_lists[DETECT_SM_LIST_HSCDMATCH] != NULL) {
- sig_flags |= SIG_FLAG_TOCLIENT;
- s->flags |= SIG_FLAG_TOCLIENT;
- s->flags &= ~SIG_FLAG_TOSERVER;
- }
- if ((sig_flags & (SIG_FLAG_TOCLIENT | SIG_FLAG_TOSERVER)) == (SIG_FLAG_TOCLIENT | SIG_FLAG_TOSERVER)) {
- SCLogError(SC_ERR_INVALID_SIGNATURE,"You seem to have mixed keywords "
- "that require inspection in both directions. Atm we only "
- "support keywords in one direction within a rule.");
- SCReturnInt(0);
- }
-
- if (s->sm_lists[DETECT_SM_LIST_HRHDMATCH] != NULL) {
- if ((s->flags & (SIG_FLAG_TOCLIENT|SIG_FLAG_TOSERVER)) == (SIG_FLAG_TOCLIENT|SIG_FLAG_TOSERVER)) {
- SCLogError(SC_ERR_INVALID_SIGNATURE,"http_raw_header signature "
- "without a flow direction. Use flow:to_server for "
- "inspecting request headers or flow:to_client for "
- "inspecting response headers.");
- SCReturnInt(0);
- }
- }
-
- if (s->sm_lists[DETECT_SM_LIST_HHHDMATCH] != NULL) {
- for (sm = s->sm_lists[DETECT_SM_LIST_HHHDMATCH];
- sm != NULL; sm = sm->next) {
- if (sm->type == DETECT_CONTENT) {
- DetectContentData *cd = (DetectContentData *)sm->ctx;
- if (cd->flags & DETECT_CONTENT_NOCASE) {
- SCLogWarning(SC_ERR_INVALID_SIGNATURE, "http_host keyword "
- "specified along with \"nocase\". "
- "Since the hostname buffer we match against "
- "is actually lowercase. So having a "
- "nocase is redundant.");
- } else {
- for (u = 0; u < cd->content_len; u++) {
- if (isupper(cd->content[u]))
- break;
- }
- if (u != cd->content_len) {
- SCLogWarning(SC_ERR_INVALID_SIGNATURE, "A pattern with "
- "uppercase chars detected for http_host. "
- "Since the hostname buffer we match against "
- "is lowercase only, please specify a "
- "lowercase pattern.");
- SCReturnInt(0);
- }
- }
- }
- }
- }
-
- //if (s->alproto != ALPROTO_UNKNOWN) {
- // if (s->flags & SIG_FLAG_STATE_MATCH) {
- // if (s->alproto == ALPROTO_DNS) {
- // if (al_proto_table[ALPROTO_DNS_UDP].to_server == 0 ||
- // al_proto_table[ALPROTO_DNS_UDP].to_client == 0 ||
- // al_proto_table[ALPROTO_DNS_TCP].to_server == 0 ||
- // al_proto_table[ALPROTO_DNS_TCP].to_client == 0) {
- // SCLogInfo("Signature uses options that need the app layer "
- // "parser for dns, but the parser's disabled "
- // "for the protocol. Please check if you have "
- // "disabled it through the option "
- // "\"app-layer.protocols.dcerpc[udp|tcp].enabled\""
- // "or internally the parser has been disabled in "
- // "the code. Invalidating signature.");
- // SCReturnInt(0);
- // }
- // } else {
- // if (al_proto_table[s->alproto].to_server == 0 ||
- // al_proto_table[s->alproto].to_client == 0) {
- // const char *proto_name = AppProtoToString(s->alproto);
- // SCLogInfo("Signature uses options that need the app layer "
- // "parser for \"%s\", but the parser's disabled "
- // "for the protocol. Please check if you have "
- // "disabled it through the option "
- // "\"app-layer.protocols.%s.enabled\" or internally "
- // "there the parser has been disabled in the code. "
- // "Invalidating signature.", proto_name, proto_name);
- // SCReturnInt(0);
- // }
- // }
- // }
- //
- //
- //
- //
- //
- //}
-
- if (s->flags & SIG_FLAG_REQUIRE_PACKET) {
- pm = SigMatchGetLastSMFromLists(s, 24,
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_UMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HRUDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HCBDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_FILEDATA],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HHDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HRHDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HMDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HSMDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HSCDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HCDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HUADMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HHHDMATCH],
- DETECT_REPLACE, s->sm_lists_tail[DETECT_SM_LIST_HRHHDMATCH]);
- if (pm != NULL) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "Signature has"
- " replace keyword linked with a modified content"
- " keyword (http_*, dce_*). It only supports content on"
- " raw payload");
- SCReturnInt(0);
- }
-
- if (s->sm_lists_tail[DETECT_SM_LIST_UMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HRUDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HCBDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_FILEDATA] ||
- s->sm_lists_tail[DETECT_SM_LIST_HHDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HRHDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HMDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HSMDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HSCDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HCDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HUADMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HHHDMATCH] ||
- s->sm_lists_tail[DETECT_SM_LIST_HRHHDMATCH])
- {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "Signature combines packet "
- "specific matches (like dsize, flags, ttl) with stream / "
- "state matching by matching on app layer proto (like using "
- "http_* keywords).");
- SCReturnInt(0);
- }
- }
-
- for (sm = s->sm_lists[DETECT_SM_LIST_AMATCH]; sm != NULL; sm = sm->next) {
- if (sm->type != DETECT_AL_APP_LAYER_PROTOCOL)
- continue;
- if (((DetectAppLayerProtocolData *)sm->ctx)->negated)
- break;
- }
- if (sm != NULL && s->alproto != ALPROTO_UNKNOWN) {
- SCLogError(SC_ERR_CONFLICTING_RULE_KEYWORDS, "We can't have "
- "the rule match on a fixed alproto and at the same time"
- "have an app-layer-protocol keyword set.");
- SCReturnInt(0);
- }
-
- /* TCP: pkt vs stream vs depth/offset */
- if (s->proto.proto[IPPROTO_TCP / 8] & (1 << (IPPROTO_TCP % 8))) {
- if (!(s->flags & (SIG_FLAG_REQUIRE_PACKET | SIG_FLAG_REQUIRE_STREAM))) {
- s->flags |= SIG_FLAG_REQUIRE_STREAM;
- sm = s->sm_lists[DETECT_SM_LIST_PMATCH];
- while (sm != NULL) {
- if (sm->type == DETECT_CONTENT &&
- (((DetectContentData *)(sm->ctx))->flags &
- (DETECT_CONTENT_DEPTH | DETECT_CONTENT_OFFSET))) {
- s->flags |= SIG_FLAG_REQUIRE_PACKET;
- break;
- }
- sm = sm->next;
- }
- }
- }
-
- if (s->sm_lists[DETECT_SM_LIST_BASE64_DATA] != NULL) {
- int list;
- uint16_t idx = s->sm_lists[DETECT_SM_LIST_BASE64_DATA]->idx;
- for (list = 0; list < DETECT_SM_LIST_MAX; list++) {
- if (list != DETECT_SM_LIST_BASE64_DATA &&
- s->sm_lists[list] != NULL) {
- if (s->sm_lists[list]->idx > idx) {
- SCLogError(SC_ERR_INVALID_SIGNATURE, "Rule buffer "
- "cannot be reset after base64_data.");
- SCReturnInt(0);
- }
- }
- }
- }
-
-#ifdef HAVE_LUA
- DetectLuaPostSetup(s);
-#endif
-
-#ifdef DEBUG
- int i;
- for (i = 0; i < DETECT_SM_LIST_MAX; i++) {
- if (s->sm_lists[i] != NULL) {
- for (sm = s->sm_lists[i]; sm != NULL; sm = sm->next) {
- BUG_ON(sm == sm->prev);
- BUG_ON(sm == sm->next);
- }
- }
- }
-#endif
-
- SCReturnInt(1);
-}
-
-/**
- * \internal
- * \brief Helper function for SigInit().
- */
-static Signature *SigInitHelper(DetectEngineCtx *de_ctx, char *sigstr,
- uint8_t dir)
-{
- Signature *sig = SigAlloc();
- if (sig == NULL)
- goto error;
-
- /* default gid to 1 */
- sig->gid = 1;
-
- if (SigParse(de_ctx, sig, sigstr, dir) < 0)
- goto error;
-
- /* signature priority hasn't been overwritten. Using default priority */
- if (sig->prio == -1)
- sig->prio = 3;
-
- sig->num = de_ctx->signum;
- de_ctx->signum++;
-
- if (sig->alproto != ALPROTO_UNKNOWN) {
- int override_needed = 0;
- if (sig->proto.flags & DETECT_PROTO_ANY) {
- sig->proto.flags &= ~DETECT_PROTO_ANY;
- memset(sig->proto.proto, 0x00, sizeof(sig->proto.proto));
- override_needed = 1;
- } else {
- override_needed = 1;
- size_t s = 0;
- for (s = 0; s < sizeof(sig->proto.proto); s++) {
- if (sig->proto.proto[s] != 0x00) {
- override_needed = 0;
- break;
- }
- }
- }
-
- /* at this point if we had alert ip and the ip proto was not
- * overridden, we use the ip proto that has been configured
- * against the app proto in use. */
- if (override_needed)
- AppLayerProtoDetectSupportedIpprotos(sig->alproto, sig->proto.proto);
- }
-
- if (DetectAppLayerEventPrepare(sig) < 0)
- goto error;
-
- /* set the packet and app layer flags, but only if the
- * app layer flag wasn't already set in which case we
- * only consider the app layer */
- if (!(sig->flags & SIG_FLAG_APPLAYER)) {
- if (sig->sm_lists[DETECT_SM_LIST_MATCH] != NULL) {
- SigMatch *sm = sig->sm_lists[DETECT_SM_LIST_MATCH];
- for ( ; sm != NULL; sm = sm->next) {
- if (sigmatch_table[sm->type].Match != NULL)
- sig->init_flags |= SIG_FLAG_INIT_PACKET;
- }
- } else {
- sig->init_flags |= SIG_FLAG_INIT_PACKET;
- }
- }
-
- if (sig->sm_lists[DETECT_SM_LIST_AMATCH] != NULL)
- sig->flags |= SIG_FLAG_APPLAYER;
-
- if (sig->sm_lists[DETECT_SM_LIST_UMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_DMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_AMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HRLMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HCBDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_FILEDATA])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HHDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HRHDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HMDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HCDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HRUDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_FILEMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HSMDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HSCDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HUADMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HHHDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_HRHHDMATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
-
- /* Template. */
- if (sig->sm_lists[DETECT_SM_LIST_TEMPLATE_BUFFER_MATCH]) {
- sig->flags |= SIG_FLAG_STATE_MATCH;
- }
-
- /* DNS */
- if (sig->sm_lists[DETECT_SM_LIST_DNSQUERYNAME_MATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_DNSREQUEST_MATCH]) {
- sig->flags |= SIG_FLAG_STATE_MATCH;
- }
- if (sig->sm_lists[DETECT_SM_LIST_DNSRESPONSE_MATCH]) {
- sig->flags |= SIG_FLAG_STATE_MATCH;
- }
-
- if (sig->sm_lists[DETECT_SM_LIST_MODBUS_MATCH])
- sig->flags |= SIG_FLAG_STATE_MATCH;
- if (sig->sm_lists[DETECT_SM_LIST_APP_EVENT])
- sig->flags |= SIG_FLAG_STATE_MATCH;
-
- if (!(sig->init_flags & SIG_FLAG_INIT_FLOW)) {
- sig->flags |= SIG_FLAG_TOSERVER;
- sig->flags |= SIG_FLAG_TOCLIENT;
- }
-
- SCLogDebug("sig %"PRIu32" SIG_FLAG_APPLAYER: %s, SIG_FLAG_PACKET: %s",
- sig->id, sig->flags & SIG_FLAG_APPLAYER ? "set" : "not set",
- sig->init_flags & SIG_FLAG_INIT_PACKET ? "set" : "not set");
-
- SigBuildAddressMatchArray(sig);
-
- if (sig->sm_lists[DETECT_SM_LIST_APP_EVENT] != NULL) {
- if (AppLayerParserProtocolIsTxEventAware(IPPROTO_TCP, sig->alproto)) {
- if (sig->flags & SIG_FLAG_TOSERVER) {
- DetectEngineRegisterAppInspectionEngine(IPPROTO_TCP,
- sig->alproto,
- 0,
- DETECT_SM_LIST_APP_EVENT,
- DE_STATE_FLAG_APP_EVENT_INSPECT,
- DetectEngineAptEventInspect,
- app_inspection_engine);
- }
- if (sig->flags & SIG_FLAG_TOCLIENT) {
- DetectEngineRegisterAppInspectionEngine(IPPROTO_TCP,
- sig->alproto,
- 1,
- DETECT_SM_LIST_APP_EVENT,
- DE_STATE_FLAG_APP_EVENT_INSPECT,
- DetectEngineAptEventInspect,
- app_inspection_engine);
- }
- }
- if (AppLayerParserProtocolIsTxEventAware(IPPROTO_UDP, sig->alproto)) {
- if (sig->flags & SIG_FLAG_TOSERVER) {
- DetectEngineRegisterAppInspectionEngine(IPPROTO_UDP,
- sig->alproto,
- 0,
- DETECT_SM_LIST_APP_EVENT,
- DE_STATE_FLAG_APP_EVENT_INSPECT,
- DetectEngineAptEventInspect,
- app_inspection_engine);
- }
- if (sig->flags & SIG_FLAG_TOCLIENT) {
- DetectEngineRegisterAppInspectionEngine(IPPROTO_UDP,
- sig->alproto,
- 1,
- DETECT_SM_LIST_APP_EVENT,
- DE_STATE_FLAG_APP_EVENT_INSPECT,
- DetectEngineAptEventInspect,
- app_inspection_engine);
- }
- }
- }
-
- /* validate signature, SigValidate will report the error reason */
- if (SigValidate(de_ctx, sig) == 0) {
- goto error;
- }
-
- return sig;
-
-error:
- if (sig != NULL) {
- SigFree(sig);
- }
- return NULL;
-}
-
-/**
- * \brief Parses a signature and adds it to the Detection Engine Context.
- *
- * \param de_ctx Pointer to the Detection Engine Context.
- * \param sigstr Pointer to a character string containing the signature to be
- * parsed.
- *
- * \retval Pointer to the Signature instance on success; NULL on failure.
- */
-Signature *SigInit(DetectEngineCtx *de_ctx, char *sigstr)
-{
- SCEnter();
-
- uint32_t oldsignum = de_ctx->signum;
-
- Signature *sig;
-
- if ((sig = SigInitHelper(de_ctx, sigstr, SIG_DIREC_NORMAL)) == NULL) {
- goto error;
- }
-
- if (sig->init_flags & SIG_FLAG_INIT_BIDIREC) {
- sig->next = SigInitHelper(de_ctx, sigstr, SIG_DIREC_SWITCHED);
- if (sig->next == NULL) {
- goto error;
- }
- }
-
- SCReturnPtr(sig, "Signature");
-
-error:
- if (sig != NULL) {
- SigFree(sig);
- }
- /* if something failed, restore the old signum count
- * since we didn't install it */
- de_ctx->signum = oldsignum;
-
- SCReturnPtr(NULL, "Signature");
-}
-
-/**
- * \brief The hash free function to be the used by the hash table -
- * DetectEngineCtx->dup_sig_hash_table.
- *
- * \param data Pointer to the data, in our case SigDuplWrapper to be freed.
- */
-void DetectParseDupSigFreeFunc(void *data)
-{
- if (data != NULL)
- SCFree(data);
-
- return;
-}
-
-/**
- * \brief The hash function to be the used by the hash table -
- * DetectEngineCtx->dup_sig_hash_table.
- *
- * \param ht Pointer to the hash table.
- * \param data Pointer to the data, in our case SigDuplWrapper.
- * \param datalen Not used in our case.
- *
- * \retval sw->s->id The generated hash value.
- */
-uint32_t DetectParseDupSigHashFunc(HashListTable *ht, void *data, uint16_t datalen)
-{
- SigDuplWrapper *sw = (SigDuplWrapper *)data;
-
- return (sw->s->id % ht->array_size);
-}
-
-/**
- * \brief The Compare function to be used by the hash table -
- * DetectEngineCtx->dup_sig_hash_table.
- *
- * \param data1 Pointer to the first SigDuplWrapper.
- * \param len1 Not used.
- * \param data2 Pointer to the second SigDuplWrapper.
- * \param len2 Not used.
- *
- * \retval 1 If the 2 SigDuplWrappers sent as args match.
- * \retval 0 If the 2 SigDuplWrappers sent as args do not match.
- */
-char DetectParseDupSigCompareFunc(void *data1, uint16_t len1, void *data2,
- uint16_t len2)
-{
- SigDuplWrapper *sw1 = (SigDuplWrapper *)data1;
- SigDuplWrapper *sw2 = (SigDuplWrapper *)data2;
-
- if (sw1 == NULL || sw2 == NULL ||
- sw1->s == NULL || sw2->s == NULL)
- return 0;
-
- /* sid and gid match required */
- if (sw1->s->id == sw2->s->id && sw1->s->gid == sw2->s->gid) return 1;
-
- return 0;
-}
-
-/**
- * \brief Initializes the hash table that is used to cull duplicate sigs.
- *
- * \param de_ctx Pointer to the detection engine context.
- *
- * \retval 0 On success.
- * \retval -1 On failure.
- */
-int DetectParseDupSigHashInit(DetectEngineCtx *de_ctx)
-{
- de_ctx->dup_sig_hash_table = HashListTableInit(15000,
- DetectParseDupSigHashFunc,
- DetectParseDupSigCompareFunc,
- DetectParseDupSigFreeFunc);
- if (de_ctx->dup_sig_hash_table == NULL)
- return -1;
-
- return 0;
-}
-
-/**
- * \brief Frees the hash table that is used to cull duplicate sigs.
- *
- * \param de_ctx Pointer to the detection engine context that holds this table.
- */
-void DetectParseDupSigHashFree(DetectEngineCtx *de_ctx)
-{
- if (de_ctx->dup_sig_hash_table != NULL)
- HashListTableFree(de_ctx->dup_sig_hash_table);
-
- de_ctx->dup_sig_hash_table = NULL;
-
- return;
-}
-
-/**
- * \brief Check if a signature is a duplicate.
- *
- * There are 3 types of return values for this function.
- *
- * - 0, which indicates that the Signature is not a duplicate
- * and has to be added to the detection engine list.
- * - 1, Signature is duplicate, and the existing signature in
- * the list shouldn't be replaced with this duplicate.
- * - 2, Signature is duplicate, and the existing signature in
- * the list should be replaced with this duplicate.
- *
- * \param de_ctx Pointer to the detection engine context.
- * \param sig Pointer to the Signature that has to be checked.
- *
- * \retval 2 If Signature is duplicate and the existing signature in
- * the list should be chucked out and replaced with this.
- * \retval 1 If Signature is duplicate, and should be chucked out.
- * \retval 0 If Signature is not a duplicate.
- */
-static inline int DetectEngineSignatureIsDuplicate(DetectEngineCtx *de_ctx,
- Signature *sig)
-{
- /* we won't do any NULL checks on the args */
-
- /* return value */
- int ret = 0;
-
- SigDuplWrapper *sw_dup = NULL;
- SigDuplWrapper *sw = NULL;
-
- /* used for making a duplicate_sig_hash_table entry */
- sw = SCMalloc(sizeof(SigDuplWrapper));
- if (unlikely(sw == NULL)) {
- exit(EXIT_FAILURE);
- }
- memset(sw, 0, sizeof(SigDuplWrapper));
- sw->s = sig;
-
- /* check if we have a duplicate entry for this signature */
- sw_dup = HashListTableLookup(de_ctx->dup_sig_hash_table, (void *)sw, 0);
- /* we don't have a duplicate entry for this sig */
- if (sw_dup == NULL) {
- /* add it to the hash table */
- HashListTableAdd(de_ctx->dup_sig_hash_table, (void *)sw, 0);
-
- /* add the s_prev entry for the previously loaded sw in the hash_table */
- if (de_ctx->sig_list != NULL) {
- SigDuplWrapper *sw_old = NULL;
- SigDuplWrapper sw_tmp;
- memset(&sw_tmp, 0, sizeof(SigDuplWrapper));
-
- /* the topmost sig would be the last loaded sig */
- sw_tmp.s = de_ctx->sig_list;
- sw_old = HashListTableLookup(de_ctx->dup_sig_hash_table,
- (void *)&sw_tmp, 0);
- /* sw_old == NULL case is impossible */
- sw_old->s_prev = sig;
- }
-
- ret = 0;
- goto end;
- }
-
- /* if we have reached here we have a duplicate entry for this signature.
- * Check the signature revision. Store the signature with the latest rev
- * and discard the other one */
- if (sw->s->rev <= sw_dup->s->rev) {
- ret = 1;
- goto end;
- }
-
- /* the new sig is of a newer revision than the one that is already in the
- * list. Remove the old sig from the list */
- if (sw_dup->s_prev == NULL) {
- SigDuplWrapper sw_temp;
- memset(&sw_temp, 0, sizeof(SigDuplWrapper));
- if (sw_dup->s->init_flags & SIG_FLAG_INIT_BIDIREC) {
- sw_temp.s = sw_dup->s->next->next;
- de_ctx->sig_list = sw_dup->s->next->next;
- SigFree(sw_dup->s->next);
- } else {
- sw_temp.s = sw_dup->s->next;
- de_ctx->sig_list = sw_dup->s->next;
- }
- SigDuplWrapper *sw_next = NULL;
- if (sw_temp.s != NULL) {
- sw_next = HashListTableLookup(de_ctx->dup_sig_hash_table,
- (void *)&sw_temp, 0);
- sw_next->s_prev = sw_dup->s_prev;
- }
- SigFree(sw_dup->s);
- } else {
- SigDuplWrapper sw_temp;
- memset(&sw_temp, 0, sizeof(SigDuplWrapper));
- if (sw_dup->s->init_flags & SIG_FLAG_INIT_BIDIREC) {
- sw_temp.s = sw_dup->s->next->next;
- sw_dup->s_prev->next = sw_dup->s->next->next;
- SigFree(sw_dup->s->next);
- } else {
- sw_temp.s = sw_dup->s->next;
- sw_dup->s_prev->next = sw_dup->s->next;
- }
- SigDuplWrapper *sw_next = NULL;
- if (sw_temp.s != NULL) {
- sw_next = HashListTableLookup(de_ctx->dup_sig_hash_table,
- (void *)&sw_temp, 0);
- sw_next->s_prev = sw_dup->s_prev;;
- }
- SigFree(sw_dup->s);
- }
-
- /* make changes to the entry to reflect the presence of the new sig */
- sw_dup->s = sig;
- sw_dup->s_prev = NULL;
-
- /* this is duplicate, but a duplicate that replaced the existing sig entry */
- ret = 2;
-
- SCFree(sw);
-
-end:
- return ret;
-}
-
-/**
- * \brief Parse and append a Signature into the Detection Engine Context
- * signature list.
- *
- * If the signature is bidirectional it should append two signatures
- * (with the addresses switched) into the list. Also handle duplicate
- * signatures. In case of duplicate sigs, use the ones that have the
- * latest revision. We use the sid and the msg to identifiy duplicate
- * sigs. If 2 sigs have the same sid and gid, they are duplicates.
- *
- * \param de_ctx Pointer to the Detection Engine Context.
- * \param sigstr Pointer to a character string containing the signature to be
- * parsed.
- * \param sig_file Pointer to a character string containing the filename from
- * which signature is read
- * \param lineno Line number from where signature is read
- *
- * \retval Pointer to the head Signature in the detection engine ctx sig_list
- * on success; NULL on failure.
- */
-Signature *DetectEngineAppendSig(DetectEngineCtx *de_ctx, char *sigstr)
-{
- Signature *sig = SigInit(de_ctx, sigstr);
- if (sig == NULL) {
- return NULL;
- }
-
- /* checking for the status of duplicate signature */
- int dup_sig = DetectEngineSignatureIsDuplicate(de_ctx, sig);
- /* a duplicate signature that should be chucked out. Check the previously
- * called function details to understand the different return values */
- if (dup_sig == 1) {
- SCLogError(SC_ERR_DUPLICATE_SIG, "Duplicate signature \"%s\"", sigstr);
- goto error;
- } else if (dup_sig == 2) {
- SCLogWarning(SC_ERR_DUPLICATE_SIG, "Signature with newer revision,"
- " so the older sig replaced by this new signature \"%s\"",
- sigstr);
- }
-
- if (sig->init_flags & SIG_FLAG_INIT_BIDIREC) {
- if (sig->next != NULL) {
- sig->next->next = de_ctx->sig_list;
- } else {
- goto error;
- }
- } else {
- /* if this sig is the first one, sig_list should be null */
- sig->next = de_ctx->sig_list;
- }
-
- de_ctx->sig_list = sig;
-
- /**
- * In DetectEngineAppendSig(), the signatures are prepended and we always return the first one
- * so if the signature is bidirectional, the returned sig will point through "next" ptr
- * to the cloned signatures with the switched addresses
- */
- return (dup_sig == 0 || dup_sig == 2) ? sig : NULL;
-
-error:
- if (sig != NULL)
- SigFree(sig);
- return NULL;
-}
-
-/*
- * TESTS
- */
-
-#ifdef UNITTESTS
-int SigParseTest01 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = SigInit(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1;)");
- if (sig == NULL)
- result = 0;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-int SigParseTest02 (void)
-{
- int result = 0;
- Signature *sig = NULL;
- DetectPort *port = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
-
- if (de_ctx == NULL)
- goto end;
-
- FILE *fd = SCClassConfGenerateValidDummyClassConfigFD01();
- SCClassConfLoadClassficationConfigFile(de_ctx, fd);
-
- sig = SigInit(de_ctx, "alert tcp any !21:902 -> any any (msg:\"ET MALWARE Suspicious 220 Banner on Local Port\"; content:\"220\"; offset:0; depth:4; pcre:\"/220[- ]/\"; sid:2003055; rev:4;)");
- if (sig == NULL) {
- goto end;
- }
-
- int r = DetectPortParse(de_ctx, &port, "0:20");
- if (r < 0)
- goto end;
-
- if (DetectPortCmp(sig->sp, port) == PORT_EQ) {
- result = 1;
- } else {
- DetectPortPrint(port); printf(" != "); DetectPortPrint(sig->sp); printf(": ");
- }
-
-end:
- if (port != NULL) DetectPortCleanupList(port);
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test SigParseTest03 test for invalid direction operator in rule
- */
-int SigParseTest03 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = SigInit(de_ctx, "alert tcp 1.2.3.4 any <- !1.2.3.4 any (msg:\"SigParseTest03\"; sid:1;)");
- if (sig != NULL) {
- result = 0;
- printf("expected NULL got sig ptr %p: ",sig);
- }
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-int SigParseTest04 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = SigInit(de_ctx, "alert tcp 1.2.3.4 1024: -> !1.2.3.4 1024: (msg:\"SigParseTest04\"; sid:1;)");
- if (sig == NULL)
- result = 0;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Port validation */
-int SigParseTest05 (void)
-{
- int result = 0;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = SigInit(de_ctx, "alert tcp 1.2.3.4 1024:65536 -> !1.2.3.4 any (msg:\"SigParseTest05\"; sid:1;)");
- if (sig == NULL) {
- result = 1;
- } else {
- printf("signature didn't fail to parse as we expected: ");
- }
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Parsing bug debugging at 2010-03-18 */
-int SigParseTest06 (void)
-{
- int result = 0;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = SigInit(de_ctx, "alert tcp any any -> any any (flow:to_server; content:\"GET\"; nocase; http_method; uricontent:\"/uri/\"; nocase; content:\"Host|3A| abc\"; nocase; sid:1; rev:1;)");
- if (sig != NULL) {
- result = 1;
- } else {
- printf("signature failed to parse: ");
- }
-
-end:
- if (sig != NULL)
- SigFree(sig);
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test Parsing duplicate sigs.
- */
-int SigParseTest07(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)");
-
- result = (de_ctx->sig_list != NULL && de_ctx->sig_list->next == NULL);
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test Parsing duplicate sigs.
- */
-int SigParseTest08(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:2;)");
-
- result = (de_ctx->sig_list != NULL && de_ctx->sig_list->next == NULL &&
- de_ctx->sig_list->rev == 2);
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test Parsing duplicate sigs.
- */
-int SigParseTest09(void)
-{
- int result = 1;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:2;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:6;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:4;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:2;)");
- result &= (de_ctx->sig_list != NULL && de_ctx->sig_list->id == 2 &&
- de_ctx->sig_list->rev == 2);
- if (result == 0)
- goto end;
- result &= (de_ctx->sig_list->next != NULL && de_ctx->sig_list->next->id == 1 &&
- de_ctx->sig_list->next->rev == 6);
- if (result == 0)
- goto end;
-
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:1;)");
- result &= (de_ctx->sig_list != NULL && de_ctx->sig_list->id == 2 &&
- de_ctx->sig_list->rev == 2);
- if (result == 0)
- goto end;
- result &= (de_ctx->sig_list->next != NULL && de_ctx->sig_list->next->id == 1 &&
- de_ctx->sig_list->next->rev == 6);
- if (result == 0)
- goto end;
-
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:4;)");
- result &= (de_ctx->sig_list != NULL && de_ctx->sig_list->id == 2 &&
- de_ctx->sig_list->rev == 4);
- if (result == 0)
- goto end;
- result &= (de_ctx->sig_list->next != NULL && de_ctx->sig_list->next->id == 1 &&
- de_ctx->sig_list->next->rev == 6);
- if (result == 0)
- goto end;
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test Parsing duplicate sigs.
- */
-int SigParseTest10(void)
-{
- int result = 1;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:1; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:3; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:4; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:5; rev:1;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:3; rev:2;)");
- DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (msg:\"boo\"; sid:2; rev:2;)");
-
- result &= ((de_ctx->sig_list->id == 2) &&
- (de_ctx->sig_list->next->id == 3) &&
- (de_ctx->sig_list->next->next->id == 5) &&
- (de_ctx->sig_list->next->next->next->id == 4) &&
- (de_ctx->sig_list->next->next->next->next->id == 1));
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test Parsing sig with trailing space(s) as reported by
- * Morgan Cox on oisf-users.
- */
-int SigParseTest11(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- Signature *s = NULL;
-
- s = DetectEngineAppendSig(de_ctx, "drop tcp any any -> any 80 (msg:\"Snort_Inline is blocking the http link\";) ");
- if (s == NULL) {
- printf("sig 1 didn't parse: ");
- goto end;
- }
-
- s = DetectEngineAppendSig(de_ctx, "drop tcp any any -> any 80 (msg:\"Snort_Inline is blocking the http link\"; sid:1;) ");
- if (s == NULL) {
- printf("sig 2 didn't parse: ");
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test file_data with rawbytes
- */
-static int SigParseTest12(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- Signature *s = NULL;
-
- s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (file_data; content:\"abc\"; rawbytes; sid:1;)");
- if (s != NULL) {
- printf("sig 1 should have given an error: ");
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test packet/stream sig
- */
-static int SigParseTest13(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- Signature *s = NULL;
-
- s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; sid:1;)");
- if (s == NULL) {
- printf("sig 1 invalidated: failure");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) {
- printf("sig doesn't have stream flag set\n");
- goto end;
- }
-
- if (s->flags & SIG_FLAG_REQUIRE_PACKET) {
- printf("sig has packet flag set\n");
- goto end;
- }
-
- result = 1;
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test packet/stream sig
- */
-static int SigParseTest14(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- Signature *s = NULL;
-
- s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; dsize:>0; sid:1;)");
- if (s == NULL) {
- printf("sig 1 invalidated: failure");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) {
- printf("sig doesn't have packet flag set\n");
- goto end;
- }
-
- if (s->flags & SIG_FLAG_REQUIRE_STREAM) {
- printf("sig has stream flag set\n");
- goto end;
- }
-
- result = 1;
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test packet/stream sig
- */
-static int SigParseTest15(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- Signature *s = NULL;
-
- s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; offset:5; sid:1;)");
- if (s == NULL) {
- printf("sig 1 invalidated: failure");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) {
- printf("sig doesn't have packet flag set\n");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) {
- printf("sig doesn't have stream flag set\n");
- goto end;
- }
-
- result = 1;
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test packet/stream sig
- */
-static int SigParseTest16(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- Signature *s = NULL;
-
- s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; depth:5; sid:1;)");
- if (s == NULL) {
- printf("sig 1 invalidated: failure");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) {
- printf("sig doesn't have packet flag set\n");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) {
- printf("sig doesn't have stream flag set\n");
- goto end;
- }
-
- result = 1;
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test packet/stream sig
- */
-static int SigParseTest17(void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- Signature *s = NULL;
-
- s = DetectEngineAppendSig(de_ctx, "alert tcp any any -> any any (content:\"abc\"; offset:1; depth:5; sid:1;)");
- if (s == NULL) {
- printf("sig 1 invalidated: failure");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_PACKET)) {
- printf("sig doesn't have packet flag set\n");
- goto end;
- }
-
- if (!(s->flags & SIG_FLAG_REQUIRE_STREAM)) {
- printf("sig doesn't have stream flag set\n");
- goto end;
- }
-
- result = 1;
-
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test sid value too large. Bug #779 */
-static int SigParseTest18 (void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- if (DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:99999999999999999999;)") != NULL)
- goto end;
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test gid value too large. Related to bug #779 */
-static int SigParseTest19 (void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- if (DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1; gid:99999999999999999999;)") != NULL)
- goto end;
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test rev value too large. Related to bug #779 */
-static int SigParseTest20 (void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- if (DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 any -> !1.2.3.4 any (msg:\"SigParseTest01\"; sid:1; rev:99999999999999999999;)") != NULL)
- goto end;
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test address parsing */
-static int SigParseTest21 (void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- if (DetectEngineAppendSig(de_ctx, "alert tcp [1.2.3.4, 1.2.3.5] any -> !1.2.3.4 any (sid:1;)") == NULL)
- goto end;
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test address parsing */
-static int SigParseTest22 (void)
-{
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- if (DetectEngineAppendSig(de_ctx, "alert tcp [10.10.10.0/24, !10.10.10.247] any -> [10.10.10.0/24, !10.10.10.247] any (sid:1;)") == NULL)
- goto end;
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (invalid) */
-int SigParseBidirecTest06 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any - 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig == NULL)
- result = 1;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (invalid) */
-int SigParseBidirecTest07 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any <- 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig == NULL)
- result = 1;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (invalid) */
-int SigParseBidirecTest08 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any < 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig == NULL)
- result = 1;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (invalid) */
-int SigParseBidirecTest09 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any > 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig == NULL)
- result = 1;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (invalid) */
-int SigParseBidirecTest10 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -< 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig == NULL)
- result = 1;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (invalid) */
-int SigParseBidirecTest11 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any >- 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig == NULL)
- result = 1;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (invalid) */
-int SigParseBidirecTest12 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any >< 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig == NULL)
- result = 1;
-
-end:
- if (sig != NULL) SigFree(sig);
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (valid) */
-int SigParseBidirecTest13 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any <> 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig != NULL)
- result = 1;
-
-end:
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Direction operator validation (valid) */
-int SigParseBidirecTest14 (void)
-{
- int result = 1;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -> 192.168.1.5 any (msg:\"SigParseBidirecTest05\"; sid:1;)");
- if (sig != NULL)
- result = 1;
-
-end:
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/** \test Ensure that we don't set bidirectional in a
- * normal (one direction) Signature
- */
-int SigTestBidirec01 (void)
-{
- Signature *sig = NULL;
- int result = 0;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 1024:65535 -> !1.2.3.4 any (msg:\"SigTestBidirec01\"; sid:1;)");
- if (sig == NULL)
- goto end;
- if (sig->next != NULL)
- goto end;
- if (sig->init_flags & SIG_FLAG_INIT_BIDIREC)
- goto end;
- if (de_ctx->signum != 1)
- goto end;
-
- result = 1;
-
-end:
- if (de_ctx != NULL) {
- SigCleanSignatures(de_ctx);
- SigGroupCleanup(de_ctx);
- DetectEngineCtxFree(de_ctx);
- }
- return result;
-}
-
-/** \test Ensure that we set a bidirectional Signature correctly */
-int SigTestBidirec02 (void)
-{
- int result = 0;
- Signature *sig = NULL;
- Signature *copy = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- de_ctx->flags |= DE_QUIET;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 1.2.3.4 1024:65535 <> !1.2.3.4 any (msg:\"SigTestBidirec02\"; sid:1;)");
- if (sig == NULL)
- goto end;
- if (de_ctx->sig_list != sig)
- goto end;
- if (!(sig->init_flags & SIG_FLAG_INIT_BIDIREC))
- goto end;
- if (sig->next == NULL)
- goto end;
- if (de_ctx->signum != 2)
- goto end;
- copy = sig->next;
- if (copy->next != NULL)
- goto end;
- if (!(copy->init_flags & SIG_FLAG_INIT_BIDIREC))
- goto end;
-
- result = 1;
-
-end:
- if (de_ctx != NULL) {
- SigCleanSignatures(de_ctx);
- SigGroupCleanup(de_ctx);
- DetectEngineCtxFree(de_ctx);
- }
-
- return result;
-}
-
-/** \test Ensure that we set a bidirectional Signature correctly
-* and we install it with the rest of the signatures, checking
-* also that it match with the correct addr directions
-*/
-int SigTestBidirec03 (void)
-{
- int result = 0;
- Signature *sig = NULL;
- Packet *p = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- de_ctx->flags |= DE_QUIET;
-
- char *sigs[3];
- sigs[0] = "alert tcp any any -> 192.168.1.1 any (msg:\"SigTestBidirec03 sid 1\"; sid:1;)";
- sigs[1] = "alert tcp any any <> 192.168.1.1 any (msg:\"SigTestBidirec03 sid 2 bidirectional\"; sid:2;)";
- sigs[2] = "alert tcp any any -> 192.168.1.1 any (msg:\"SigTestBidirec03 sid 3\"; sid:3;)";
- UTHAppendSigs(de_ctx, sigs, 3);
-
- /* Checking that bidirectional rules are set correctly */
- sig = de_ctx->sig_list;
- if (sig == NULL)
- goto end;
- if (sig->next == NULL)
- goto end;
- if (sig->next->next == NULL)
- goto end;
- if (sig->next->next->next == NULL)
- goto end;
- if (sig->next->next->next->next != NULL)
- goto end;
- if (de_ctx->signum != 4)
- goto end;
-
- uint8_t rawpkt1_ether[] = {
- 0x00,0x50,0x56,0xea,0x00,0xbd,0x00,0x0c,
- 0x29,0x40,0xc8,0xb5,0x08,0x00,0x45,0x00,
- 0x01,0xa8,0xb9,0xbb,0x40,0x00,0x40,0x06,
- 0xe0,0xbf,0xc0,0xa8,0x1c,0x83,0xc0,0xa8,
- 0x01,0x01,0xb9,0x0a,0x00,0x50,0x6f,0xa2,
- 0x92,0xed,0x7b,0xc1,0xd3,0x4d,0x50,0x18,
- 0x16,0xd0,0xa0,0x6f,0x00,0x00,0x47,0x45,
- 0x54,0x20,0x2f,0x20,0x48,0x54,0x54,0x50,
- 0x2f,0x31,0x2e,0x31,0x0d,0x0a,0x48,0x6f,
- 0x73,0x74,0x3a,0x20,0x31,0x39,0x32,0x2e,
- 0x31,0x36,0x38,0x2e,0x31,0x2e,0x31,0x0d,
- 0x0a,0x55,0x73,0x65,0x72,0x2d,0x41,0x67,
- 0x65,0x6e,0x74,0x3a,0x20,0x4d,0x6f,0x7a,
- 0x69,0x6c,0x6c,0x61,0x2f,0x35,0x2e,0x30,
- 0x20,0x28,0x58,0x31,0x31,0x3b,0x20,0x55,
- 0x3b,0x20,0x4c,0x69,0x6e,0x75,0x78,0x20,
- 0x78,0x38,0x36,0x5f,0x36,0x34,0x3b,0x20,
- 0x65,0x6e,0x2d,0x55,0x53,0x3b,0x20,0x72,
- 0x76,0x3a,0x31,0x2e,0x39,0x2e,0x30,0x2e,
- 0x31,0x34,0x29,0x20,0x47,0x65,0x63,0x6b,
- 0x6f,0x2f,0x32,0x30,0x30,0x39,0x30,0x39,
- 0x30,0x32,0x31,0x37,0x20,0x55,0x62,0x75,
- 0x6e,0x74,0x75,0x2f,0x39,0x2e,0x30,0x34,
- 0x20,0x28,0x6a,0x61,0x75,0x6e,0x74,0x79,
- 0x29,0x20,0x46,0x69,0x72,0x65,0x66,0x6f,
- 0x78,0x2f,0x33,0x2e,0x30,0x2e,0x31,0x34,
- 0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,0x74,
- 0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,
- 0x74,0x6d,0x6c,0x2c,0x61,0x70,0x70,0x6c,
- 0x69,0x63,0x61,0x74,0x69,0x6f,0x6e,0x2f,
- 0x78,0x68,0x74,0x6d,0x6c,0x2b,0x78,0x6d,
- 0x6c,0x2c,0x61,0x70,0x70,0x6c,0x69,0x63,
- 0x61,0x74,0x69,0x6f,0x6e,0x2f,0x78,0x6d,
- 0x6c,0x3b,0x71,0x3d,0x30,0x2e,0x39,0x2c,
- 0x2a,0x2f,0x2a,0x3b,0x71,0x3d,0x30,0x2e,
- 0x38,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,
- 0x74,0x2d,0x4c,0x61,0x6e,0x67,0x75,0x61,
- 0x67,0x65,0x3a,0x20,0x65,0x6e,0x2d,0x75,
- 0x73,0x2c,0x65,0x6e,0x3b,0x71,0x3d,0x30,
- 0x2e,0x35,0x0d,0x0a,0x41,0x63,0x63,0x65,
- 0x70,0x74,0x2d,0x45,0x6e,0x63,0x6f,0x64,
- 0x69,0x6e,0x67,0x3a,0x20,0x67,0x7a,0x69,
- 0x70,0x2c,0x64,0x65,0x66,0x6c,0x61,0x74,
- 0x65,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,
- 0x74,0x2d,0x43,0x68,0x61,0x72,0x73,0x65,
- 0x74,0x3a,0x20,0x49,0x53,0x4f,0x2d,0x38,
- 0x38,0x35,0x39,0x2d,0x31,0x2c,0x75,0x74,
- 0x66,0x2d,0x38,0x3b,0x71,0x3d,0x30,0x2e,
- 0x37,0x2c,0x2a,0x3b,0x71,0x3d,0x30,0x2e,
- 0x37,0x0d,0x0a,0x4b,0x65,0x65,0x70,0x2d,
- 0x41,0x6c,0x69,0x76,0x65,0x3a,0x20,0x33,
- 0x30,0x30,0x0d,0x0a,0x43,0x6f,0x6e,0x6e,
- 0x65,0x63,0x74,0x69,0x6f,0x6e,0x3a,0x20,
- 0x6b,0x65,0x65,0x70,0x2d,0x61,0x6c,0x69,
- 0x76,0x65,0x0d,0x0a,0x0d,0x0a }; /* end rawpkt1_ether */
-
- FlowInitConfig(FLOW_QUIET);
- p = UTHBuildPacketFromEth(rawpkt1_ether, sizeof(rawpkt1_ether));
- if (p == NULL) {
- SCLogDebug("Error building packet");
- goto end;
- }
- UTHMatchPackets(de_ctx, &p, 1);
-
- uint32_t sids[3] = {1, 2, 3};
- uint32_t results[3] = {1, 1, 1};
- result = UTHCheckPacketMatchResults(p, sids, results, 1);
-
-end:
- if (p != NULL) {
- PACKET_RECYCLE(p);
- SCFree(p);
- }
- if (de_ctx != NULL) {
- SigCleanSignatures(de_ctx);
- SigGroupCleanup(de_ctx);
- DetectEngineCtxFree(de_ctx);
- }
- FlowShutdown();
-
- return result;
-}
-
-/** \test Ensure that we set a bidirectional Signature correctly
-* and we install it with the rest of the signatures, checking
-* also that it match with the correct addr directions
-*/
-int SigTestBidirec04 (void)
-{
- int result = 0;
- Signature *sig = NULL;
- Packet *p = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- de_ctx->flags |= DE_QUIET;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -> any any (msg:\"SigTestBidirec03 sid 1\"; sid:1;)");
- if (sig == NULL)
- goto end;
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any <> any any (msg:\"SigTestBidirec03 sid 2 bidirectional\"; sid:2;)");
- if (sig == NULL)
- goto end;
- if ( !(sig->init_flags & SIG_FLAG_INIT_BIDIREC))
- goto end;
- if (sig->next == NULL)
- goto end;
- if (sig->next->next == NULL)
- goto end;
- if (sig->next->next->next != NULL)
- goto end;
- if (de_ctx->signum != 3)
- goto end;
-
- sig = DetectEngineAppendSig(de_ctx, "alert tcp 192.168.1.1 any -> any any (msg:\"SigTestBidirec03 sid 3\"; sid:3;)");
- if (sig == NULL)
- goto end;
- if (sig->next == NULL)
- goto end;
- if (sig->next->next == NULL)
- goto end;
- if (sig->next->next->next == NULL)
- goto end;
- if (sig->next->next->next->next != NULL)
- goto end;
- if (de_ctx->signum != 4)
- goto end;
-
- uint8_t rawpkt1_ether[] = {
- 0x00,0x50,0x56,0xea,0x00,0xbd,0x00,0x0c,
- 0x29,0x40,0xc8,0xb5,0x08,0x00,0x45,0x00,
- 0x01,0xa8,0xb9,0xbb,0x40,0x00,0x40,0x06,
- 0xe0,0xbf,0xc0,0xa8,0x1c,0x83,0xc0,0xa8,
- 0x01,0x01,0xb9,0x0a,0x00,0x50,0x6f,0xa2,
- 0x92,0xed,0x7b,0xc1,0xd3,0x4d,0x50,0x18,
- 0x16,0xd0,0xa0,0x6f,0x00,0x00,0x47,0x45,
- 0x54,0x20,0x2f,0x20,0x48,0x54,0x54,0x50,
- 0x2f,0x31,0x2e,0x31,0x0d,0x0a,0x48,0x6f,
- 0x73,0x74,0x3a,0x20,0x31,0x39,0x32,0x2e,
- 0x31,0x36,0x38,0x2e,0x31,0x2e,0x31,0x0d,
- 0x0a,0x55,0x73,0x65,0x72,0x2d,0x41,0x67,
- 0x65,0x6e,0x74,0x3a,0x20,0x4d,0x6f,0x7a,
- 0x69,0x6c,0x6c,0x61,0x2f,0x35,0x2e,0x30,
- 0x20,0x28,0x58,0x31,0x31,0x3b,0x20,0x55,
- 0x3b,0x20,0x4c,0x69,0x6e,0x75,0x78,0x20,
- 0x78,0x38,0x36,0x5f,0x36,0x34,0x3b,0x20,
- 0x65,0x6e,0x2d,0x55,0x53,0x3b,0x20,0x72,
- 0x76,0x3a,0x31,0x2e,0x39,0x2e,0x30,0x2e,
- 0x31,0x34,0x29,0x20,0x47,0x65,0x63,0x6b,
- 0x6f,0x2f,0x32,0x30,0x30,0x39,0x30,0x39,
- 0x30,0x32,0x31,0x37,0x20,0x55,0x62,0x75,
- 0x6e,0x74,0x75,0x2f,0x39,0x2e,0x30,0x34,
- 0x20,0x28,0x6a,0x61,0x75,0x6e,0x74,0x79,
- 0x29,0x20,0x46,0x69,0x72,0x65,0x66,0x6f,
- 0x78,0x2f,0x33,0x2e,0x30,0x2e,0x31,0x34,
- 0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,0x74,
- 0x3a,0x20,0x74,0x65,0x78,0x74,0x2f,0x68,
- 0x74,0x6d,0x6c,0x2c,0x61,0x70,0x70,0x6c,
- 0x69,0x63,0x61,0x74,0x69,0x6f,0x6e,0x2f,
- 0x78,0x68,0x74,0x6d,0x6c,0x2b,0x78,0x6d,
- 0x6c,0x2c,0x61,0x70,0x70,0x6c,0x69,0x63,
- 0x61,0x74,0x69,0x6f,0x6e,0x2f,0x78,0x6d,
- 0x6c,0x3b,0x71,0x3d,0x30,0x2e,0x39,0x2c,
- 0x2a,0x2f,0x2a,0x3b,0x71,0x3d,0x30,0x2e,
- 0x38,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,
- 0x74,0x2d,0x4c,0x61,0x6e,0x67,0x75,0x61,
- 0x67,0x65,0x3a,0x20,0x65,0x6e,0x2d,0x75,
- 0x73,0x2c,0x65,0x6e,0x3b,0x71,0x3d,0x30,
- 0x2e,0x35,0x0d,0x0a,0x41,0x63,0x63,0x65,
- 0x70,0x74,0x2d,0x45,0x6e,0x63,0x6f,0x64,
- 0x69,0x6e,0x67,0x3a,0x20,0x67,0x7a,0x69,
- 0x70,0x2c,0x64,0x65,0x66,0x6c,0x61,0x74,
- 0x65,0x0d,0x0a,0x41,0x63,0x63,0x65,0x70,
- 0x74,0x2d,0x43,0x68,0x61,0x72,0x73,0x65,
- 0x74,0x3a,0x20,0x49,0x53,0x4f,0x2d,0x38,
- 0x38,0x35,0x39,0x2d,0x31,0x2c,0x75,0x74,
- 0x66,0x2d,0x38,0x3b,0x71,0x3d,0x30,0x2e,
- 0x37,0x2c,0x2a,0x3b,0x71,0x3d,0x30,0x2e,
- 0x37,0x0d,0x0a,0x4b,0x65,0x65,0x70,0x2d,
- 0x41,0x6c,0x69,0x76,0x65,0x3a,0x20,0x33,
- 0x30,0x30,0x0d,0x0a,0x43,0x6f,0x6e,0x6e,
- 0x65,0x63,0x74,0x69,0x6f,0x6e,0x3a,0x20,
- 0x6b,0x65,0x65,0x70,0x2d,0x61,0x6c,0x69,
- 0x76,0x65,0x0d,0x0a,0x0d,0x0a }; /* end rawpkt1_ether */
-
- p = SCMalloc(SIZE_OF_PACKET);
- if (unlikely(p == NULL))
- return 0;
- DecodeThreadVars dtv;
- ThreadVars th_v;
- DetectEngineThreadCtx *det_ctx;
-
- memset(&th_v, 0, sizeof(th_v));
- memset(p, 0, SIZE_OF_PACKET);
-
- FlowInitConfig(FLOW_QUIET);
- DecodeEthernet(&th_v, &dtv, p, rawpkt1_ether, sizeof(rawpkt1_ether), NULL);
- DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
-
- /* At this point we have a list of 4 signatures. The last one
- is a copy of the second one. If we receive a packet
- with source 192.168.1.1 80, all the sids should match */
-
- SigGroupBuild(de_ctx);
- //PatternMatchPrepare(mpm_ctx, MPM_B2G);
- SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
-
- /* only sid 2 should match with a packet going to 192.168.1.1 port 80 */
- if (PacketAlertCheck(p, 1) <= 0 && PacketAlertCheck(p, 3) <= 0 &&
- PacketAlertCheck(p, 2) == 1) {
- result = 1;
- }
-
- if (p != NULL) {
- PACKET_RECYCLE(p);
- }
- FlowShutdown();
- //PatternMatchDestroy(mpm_ctx);
- DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
-
-end:
- if (de_ctx != NULL) {
- SigCleanSignatures(de_ctx);
- SigGroupCleanup(de_ctx);
- DetectEngineCtxFree(de_ctx);
- }
-
- if (p != NULL)
- SCFree(p);
- return result;
-}
-
-/**
- * \test check that we don't allow invalid negation options
- */
-static int SigParseTestNegation01 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp !any any -> any any (msg:\"SigTest41-01 src address is !any \"; classtype:misc-activity; sid:410001; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL) DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test check that we don't allow invalid negation options
- */
-static int SigParseTestNegation02 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp any !any -> any any (msg:\"SigTest41-02 src ip is !any \"; classtype:misc-activity; sid:410002; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-/**
- * \test check that we don't allow invalid negation options
- */
-static int SigParseTestNegation03 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp any any -> any [80:!80] (msg:\"SigTest41-03 dst port [80:!80] \"; classtype:misc-activity; sid:410003; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-/**
- * \test check that we don't allow invalid negation options
- */
-static int SigParseTestNegation04 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp any any -> any [80,!80] (msg:\"SigTest41-03 dst port [80:!80] \"; classtype:misc-activity; sid:410003; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-/**
- * \test check that we don't allow invalid negation options
- */
-static int SigParseTestNegation05 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp any any -> [192.168.0.2,!192.168.0.2] any (msg:\"SigTest41-04 dst ip [192.168.0.2,!192.168.0.2] \"; classtype:misc-activity; sid:410004; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-/**
- * \test check that we don't allow invalid negation options
- */
-static int SigParseTestNegation06 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp any any -> any [100:1000,!1:20000] (msg:\"SigTest41-05 dst port [100:1000,!1:20000] \"; classtype:misc-activity; sid:410005; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test check that we don't allow invalid negation options
- */
-static int SigParseTestNegation07 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp any any -> [192.168.0.2,!192.168.0.0/24] any (msg:\"SigTest41-06 dst ip [192.168.0.2,!192.168.0.0/24] \"; classtype:misc-activity; sid:410006; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test check valid negation bug 1079
- */
-static int SigParseTestNegation08 (void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tcp any any -> [192.168.0.0/16,!192.168.0.0/24] any (sid:410006; rev:1;)");
- if (s == NULL) {
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test mpm
- */
-int SigParseTestMpm01 (void)
-{
- int result = 0;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = SigInit(de_ctx, "alert tcp any any -> any any (msg:\"mpm test\"; content:\"abcd\"; sid:1;)");
- if (sig == NULL) {
- printf("sig failed to init: ");
- goto end;
- }
-
- if (sig->sm_lists[DETECT_SM_LIST_PMATCH] == NULL) {
- printf("sig doesn't have content list: ");
- goto end;
- }
-
- result = 1;
-end:
- if (sig != NULL)
- SigFree(sig);
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test mpm
- */
-int SigParseTestMpm02 (void)
-{
- int result = 0;
- Signature *sig = NULL;
-
- DetectEngineCtx *de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
-
- sig = SigInit(de_ctx, "alert tcp any any -> any any (msg:\"mpm test\"; content:\"abcd\"; content:\"abcdef\"; sid:1;)");
- if (sig == NULL) {
- printf("sig failed to init: ");
- goto end;
- }
-
- if (sig->sm_lists[DETECT_SM_LIST_PMATCH] == NULL) {
- printf("sig doesn't have content list: ");
- goto end;
- }
-
- result = 1;
-end:
- if (sig != NULL)
- SigFree(sig);
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test test tls (app layer) rule
- */
-static int SigParseTestAppLayerTLS01(void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tls any any -> any any (msg:\"SigParseTestAppLayerTLS01 \"; sid:410006; rev:1;)");
- if (s == NULL) {
- printf("parsing sig failed: ");
- goto end;
- }
-
- if (s->alproto == 0) {
- printf("alproto not set: ");
- goto end;
- }
-
- result = 1;
-end:
- if (s != NULL)
- SigFree(s);
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
-
- return result;
-}
-
-/**
- * \test test tls (app layer) rule
- */
-static int SigParseTestAppLayerTLS02(void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tls any any -> any any (msg:\"SigParseTestAppLayerTLS02 \"; tls.version:1.0; sid:410006; rev:1;)");
- if (s == NULL) {
- printf("parsing sig failed: ");
- goto end;
- }
-
- if (s->alproto == 0) {
- printf("alproto not set: ");
- goto end;
- }
-
- result = 1;
-end:
- if (s != NULL)
- SigFree(s);
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-/**
- * \test test tls (app layer) rule
- */
-static int SigParseTestAppLayerTLS03(void)
-{
- int result = 0;
- DetectEngineCtx *de_ctx;
- Signature *s=NULL;
-
- de_ctx = DetectEngineCtxInit();
- if (de_ctx == NULL)
- goto end;
- de_ctx->flags |= DE_QUIET;
-
- s = SigInit(de_ctx,"alert tls any any -> any any (msg:\"SigParseTestAppLayerTLS03 \"; tls.version:2.5; sid:410006; rev:1;)");
- if (s != NULL) {
- SigFree(s);
- goto end;
- }
-
- result = 1;
-end:
- if (de_ctx != NULL)
- DetectEngineCtxFree(de_ctx);
- return result;
-}
-
-#endif /* UNITTESTS */
-
-void SigParseRegisterTests(void)
-{
-#ifdef UNITTESTS
- UtRegisterTest("SigParseTest01", SigParseTest01, 1);
- UtRegisterTest("SigParseTest02", SigParseTest02, 1);
- UtRegisterTest("SigParseTest03", SigParseTest03, 1);
- UtRegisterTest("SigParseTest04", SigParseTest04, 1);
- UtRegisterTest("SigParseTest05", SigParseTest05, 1);
- UtRegisterTest("SigParseTest06", SigParseTest06, 1);
- UtRegisterTest("SigParseTest07", SigParseTest07, 1);
- UtRegisterTest("SigParseTest08", SigParseTest08, 1);
- UtRegisterTest("SigParseTest09", SigParseTest09, 1);
- UtRegisterTest("SigParseTest10", SigParseTest10, 1);
- UtRegisterTest("SigParseTest11", SigParseTest11, 1);
- UtRegisterTest("SigParseTest12", SigParseTest12, 1);
- UtRegisterTest("SigParseTest13", SigParseTest13, 1);
- UtRegisterTest("SigParseTest14", SigParseTest14, 1);
- UtRegisterTest("SigParseTest15", SigParseTest15, 1);
- UtRegisterTest("SigParseTest16", SigParseTest16, 1);
- UtRegisterTest("SigParseTest17", SigParseTest17, 1);
- UtRegisterTest("SigParseTest18", SigParseTest18, 1);
- UtRegisterTest("SigParseTest19", SigParseTest19, 1);
- UtRegisterTest("SigParseTest20", SigParseTest20, 1);
- UtRegisterTest("SigParseTest21 -- address with space", SigParseTest21, 1);
- UtRegisterTest("SigParseTest22 -- address with space", SigParseTest22, 1);
-
- UtRegisterTest("SigParseBidirecTest06", SigParseBidirecTest06, 1);
- UtRegisterTest("SigParseBidirecTest07", SigParseBidirecTest07, 1);
- UtRegisterTest("SigParseBidirecTest08", SigParseBidirecTest08, 1);
- UtRegisterTest("SigParseBidirecTest09", SigParseBidirecTest09, 1);
- UtRegisterTest("SigParseBidirecTest10", SigParseBidirecTest10, 1);
- UtRegisterTest("SigParseBidirecTest11", SigParseBidirecTest11, 1);
- UtRegisterTest("SigParseBidirecTest12", SigParseBidirecTest12, 1);
- UtRegisterTest("SigParseBidirecTest13", SigParseBidirecTest13, 1);
- UtRegisterTest("SigParseBidirecTest14", SigParseBidirecTest14, 1);
- UtRegisterTest("SigTestBidirec01", SigTestBidirec01, 1);
- UtRegisterTest("SigTestBidirec02", SigTestBidirec02, 1);
- UtRegisterTest("SigTestBidirec03", SigTestBidirec03, 1);
- UtRegisterTest("SigTestBidirec04", SigTestBidirec04, 1);
- UtRegisterTest("SigParseTestNegation01", SigParseTestNegation01, 1);
- UtRegisterTest("SigParseTestNegation02", SigParseTestNegation02, 1);
- UtRegisterTest("SigParseTestNegation03", SigParseTestNegation03, 1);
- UtRegisterTest("SigParseTestNegation04", SigParseTestNegation04, 1);
- UtRegisterTest("SigParseTestNegation05", SigParseTestNegation05, 1);
- UtRegisterTest("SigParseTestNegation06", SigParseTestNegation06, 1);
- UtRegisterTest("SigParseTestNegation07", SigParseTestNegation07, 1);
- UtRegisterTest("SigParseTestNegation08", SigParseTestNegation08, 1);
- UtRegisterTest("SigParseTestMpm01", SigParseTestMpm01, 1);
- UtRegisterTest("SigParseTestMpm02", SigParseTestMpm02, 1);
- UtRegisterTest("SigParseTestAppLayerTLS01", SigParseTestAppLayerTLS01, 1);
- UtRegisterTest("SigParseTestAppLayerTLS02", SigParseTestAppLayerTLS02, 1);
- UtRegisterTest("SigParseTestAppLayerTLS03", SigParseTestAppLayerTLS03, 1);
-#endif /* UNITTESTS */
-}