Bug #479 » 0001-unittests-that-fail-displaying-the-issue-that-we-don.patch
src/detect-http-cookie.c | ||
---|---|---|
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(msg:\"Testing http_cookie\"; http_cookie;sid:1;)");
|
||
if (de_ctx->sig_list == NULL)
|
||
result = 1;
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(msg:\"Testing http_cookie\"; content:\"me\"; "
|
||
"http_cookie:woo; sid:1;)");
|
||
if (de_ctx->sig_list == NULL)
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(msg:\"Testing http_cookie\"; content:\"one\"; "
|
||
"http_cookie; content:\"two\"; http_cookie; "
|
||
"content:\"two\"; http_cookie; "
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(msg:\"Testing http_cookie\"; content:\"one\"; "
|
||
"fast_pattern; http_cookie; sid:1;)");
|
||
if (de_ctx->sig_list != NULL)
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(msg:\"Testing http_cookie\"; content:\"one\"; "
|
||
"rawbytes; http_cookie; sid:1;)");
|
||
if (de_ctx->sig_list == NULL)
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(content:\"one\"; content:\"one\"; http_cookie; sid:1;)");
|
||
if (de_ctx->sig_list == NULL) {
|
||
printf("de_ctx->sig_list == NULL\n");
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(content:\"one\"; http_cookie; content:\"one\"; sid:1;)");
|
||
if (de_ctx->sig_list == NULL) {
|
||
printf("de_ctx->sig_list == NULL\n");
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(content:\"one\"; content:\"one\"; content:\"one\"; http_cookie; content:\"one\"; sid:1;)");
|
||
if (de_ctx->sig_list == NULL) {
|
||
printf("de_ctx->sig_list == NULL\n");
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(content:\"one\"; http_cookie; content:\"one\"; content:\"one\"; content:\"one\"; sid:1;)");
|
||
if (de_ctx->sig_list == NULL) {
|
||
printf("de_ctx->sig_list == NULL\n");
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(content:\"one\"; http_cookie; "
|
||
"content:\"one\"; content:\"one\"; http_cookie; content:\"one\"; sid:1;)");
|
||
if (de_ctx->sig_list == NULL) {
|
||
... | ... | |
goto end;
|
||
de_ctx->flags |= DE_QUIET;
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert icmp any any -> any any "
|
||
de_ctx->sig_list = SigInit(de_ctx, "alert tcp any any -> any any "
|
||
"(content:\"one\"; http_cookie; "
|
||
"content:\"one\"; content:\"one\"; http_cookie; content:\"two\"; sid:1;)");
|
||
if (de_ctx->sig_list == NULL) {
|
||
... | ... | |
return result;
|
||
}
|
||
/**
|
||
* \test Check the signature working to alert against set-cookie
|
||
*/
|
||
static int DetectHttpCookieSigTest08(void)
|
||
{
|
||
int result = 0;
|
||
Flow f;
|
||
uint8_t httpbuf_request[] =
|
||
"GET / HTTP/1.1\r\n"
|
||
"User-Agent: Mozilla/1.0\r\n"
|
||
"\r\n";
|
||
uint32_t httpbuf_request_len = sizeof(httpbuf_request) - 1; /* minus the \0 */
|
||
uint8_t httpbuf_response[] =
|
||
"HTTP/1.1 200 OK\r\n"
|
||
"Set-Cookie: response_user_agent\r\n"
|
||
"\r\n";
|
||
uint32_t httpbuf_response_len = sizeof(httpbuf_response) - 1; /* minus the \0 */
|
||
TcpSession ssn;
|
||
Packet *p1 = NULL, *p2 = NULL;
|
||
Signature *s = NULL;
|
||
ThreadVars th_v;
|
||
DetectEngineThreadCtx *det_ctx = NULL;
|
||
HtpState *http_state = NULL;
|
||
memset(&th_v, 0, sizeof(th_v));
|
||
memset(&f, 0, sizeof(f));
|
||
memset(&ssn, 0, sizeof(ssn));
|
||
FLOW_INITIALIZE(&f);
|
||
f.protoctx = (void *)&ssn;
|
||
f.flags |= FLOW_IPV4;
|
||
f.alproto = ALPROTO_HTTP;
|
||
p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
||
p1->flow = &f;
|
||
p1->flowflags |= FLOW_PKT_TOSERVER;
|
||
p1->flowflags |= FLOW_PKT_ESTABLISHED;
|
||
p1->flags |= PKT_HAS_FLOW | PKT_STREAM_EST;
|
||
p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
||
p2->flow = &f;
|
||
p2->flowflags |= FLOW_PKT_TOCLIENT;
|
||
p2->flowflags |= FLOW_PKT_ESTABLISHED;
|
||
p2->flags |= PKT_HAS_FLOW | PKT_STREAM_EST;
|
||
StreamTcpInitConfig(TRUE);
|
||
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
||
if (de_ctx == NULL) {
|
||
goto end;
|
||
}
|
||
de_ctx->flags |= DE_QUIET;
|
||
s = de_ctx->sig_list = SigInit(de_ctx,"alert http any any -> any any "
|
||
"(flow:to_client; content:\"response_user_agent\"; "
|
||
"http_cookie; sid:1;)");
|
||
if (s == NULL) {
|
||
goto end;
|
||
}
|
||
SigGroupBuild(de_ctx);
|
||
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
||
/* request */
|
||
int r = AppLayerParse(NULL, &f, ALPROTO_HTTP, STREAM_TOSERVER,
|
||
httpbuf_request, httpbuf_request_len);
|
||
if (r != 0) {
|
||
printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||
result = 0;
|
||
goto end;
|
||
}
|
||
http_state = f.alstate;
|
||
if (http_state == NULL) {
|
||
printf("no http state: ");
|
||
goto end;
|
||
}
|
||
/* do detect */
|
||
SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
|
||
if (PacketAlertCheck(p1, 1)) {
|
||
goto end;
|
||
}
|
||
/* response */
|
||
r = AppLayerParse(NULL, &f, ALPROTO_HTTP, STREAM_TOCLIENT,
|
||
httpbuf_response, httpbuf_response_len);
|
||
if (r != 0) {
|
||
printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||
result = 0;
|
||
goto end;
|
||
}
|
||
/* do detect */
|
||
SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
|
||
if (!PacketAlertCheck(p2, 1)) {
|
||
goto end;
|
||
}
|
||
result = 1;
|
||
end:
|
||
if (det_ctx != NULL) {
|
||
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
||
}
|
||
if (de_ctx != NULL) {
|
||
SigGroupCleanup(de_ctx);
|
||
DetectEngineCtxFree(de_ctx);
|
||
}
|
||
StreamTcpFreeConfig(TRUE);
|
||
UTHFreePackets(&p1, 1);
|
||
UTHFreePackets(&p2, 1);
|
||
return result;
|
||
}
|
||
/**
|
||
* \test Check the signature working to alert against cookie/set-cookie
|
||
*/
|
||
static int DetectHttpCookieSigTest09(void)
|
||
{
|
||
int result = 0;
|
||
Flow f;
|
||
uint8_t httpbuf_request[] =
|
||
"GET / HTTP/1.1\r\n"
|
||
"Cookie: request_user_agent\r\n"
|
||
"User-Agent: Mozilla/1.0\r\n"
|
||
"\r\n";
|
||
uint32_t httpbuf_request_len = sizeof(httpbuf_request) - 1; /* minus the \0 */
|
||
uint8_t httpbuf_response[] =
|
||
"HTTP/1.1 200 OK\r\n"
|
||
"Set-Cookie: response_user_agent\r\n"
|
||
"\r\n";
|
||
uint32_t httpbuf_response_len = sizeof(httpbuf_response) - 1; /* minus the \0 */
|
||
TcpSession ssn;
|
||
Packet *p1 = NULL, *p2 = NULL;
|
||
Signature *s = NULL;
|
||
ThreadVars th_v;
|
||
DetectEngineThreadCtx *det_ctx = NULL;
|
||
HtpState *http_state = NULL;
|
||
memset(&th_v, 0, sizeof(th_v));
|
||
memset(&f, 0, sizeof(f));
|
||
memset(&ssn, 0, sizeof(ssn));
|
||
FLOW_INITIALIZE(&f);
|
||
f.protoctx = (void *)&ssn;
|
||
f.flags |= FLOW_IPV4;
|
||
f.alproto = ALPROTO_HTTP;
|
||
p1 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
||
p1->flow = &f;
|
||
p1->flowflags |= FLOW_PKT_TOSERVER;
|
||
p1->flowflags |= FLOW_PKT_ESTABLISHED;
|
||
p1->flags |= PKT_HAS_FLOW | PKT_STREAM_EST;
|
||
p2 = UTHBuildPacket(NULL, 0, IPPROTO_TCP);
|
||
p2->flow = &f;
|
||
p2->flowflags |= FLOW_PKT_TOCLIENT;
|
||
p2->flowflags |= FLOW_PKT_ESTABLISHED;
|
||
p2->flags |= PKT_HAS_FLOW | PKT_STREAM_EST;
|
||
StreamTcpInitConfig(TRUE);
|
||
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
||
if (de_ctx == NULL) {
|
||
goto end;
|
||
}
|
||
de_ctx->flags |= DE_QUIET;
|
||
s = de_ctx->sig_list = SigInit(de_ctx,"alert http any any -> any any "
|
||
"(flow:to_server; content:\"request_user_agent\"; "
|
||
"http_cookie; sid:1;)");
|
||
if (s == NULL) {
|
||
goto end;
|
||
}
|
||
s = de_ctx->sig_list->next = SigInit(de_ctx,"alert http any any -> any any "
|
||
"(flow:to_client; content:\"response_user_agent\"; "
|
||
"http_cookie; sid:2;)");
|
||
if (s == NULL) {
|
||
goto end;
|
||
}
|
||
SigGroupBuild(de_ctx);
|
||
DetectEngineThreadCtxInit(&th_v, (void *)de_ctx, (void *)&det_ctx);
|
||
/* request */
|
||
int r = AppLayerParse(NULL, &f, ALPROTO_HTTP, STREAM_TOSERVER,
|
||
httpbuf_request, httpbuf_request_len);
|
||
if (r != 0) {
|
||
printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||
result = 0;
|
||
goto end;
|
||
}
|
||
http_state = f.alstate;
|
||
if (http_state == NULL) {
|
||
printf("no http state: ");
|
||
goto end;
|
||
}
|
||
/* do detect */
|
||
SigMatchSignatures(&th_v, de_ctx, det_ctx, p1);
|
||
if (!PacketAlertCheck(p1, 1) || PacketAlertCheck(p1, 2)) {
|
||
goto end;
|
||
}
|
||
/* response */
|
||
r = AppLayerParse(NULL, &f, ALPROTO_HTTP, STREAM_TOCLIENT,
|
||
httpbuf_response, httpbuf_response_len);
|
||
if (r != 0) {
|
||
printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
||
result = 0;
|
||
goto end;
|
||
}
|
||
/* do detect */
|
||
SigMatchSignatures(&th_v, de_ctx, det_ctx, p2);
|
||
if (PacketAlertCheck(p2, 1) || !PacketAlertCheck(p2, 2)) {
|
||
goto end;
|
||
}
|
||
result = 1;
|
||
end:
|
||
if (det_ctx != NULL) {
|
||
DetectEngineThreadCtxDeinit(&th_v, (void *)det_ctx);
|
||
}
|
||
if (de_ctx != NULL) {
|
||
SigGroupCleanup(de_ctx);
|
||
DetectEngineCtxFree(de_ctx);
|
||
}
|
||
StreamTcpFreeConfig(TRUE);
|
||
UTHFreePackets(&p1, 1);
|
||
UTHFreePackets(&p2, 1);
|
||
return result;
|
||
}
|
||
#endif /* UNITTESTS */
|
||
/**
|
||
... | ... | |
UtRegisterTest("DetectHttpCookieSigTest05", DetectHttpCookieSigTest05, 1);
|
||
UtRegisterTest("DetectHttpCookieSigTest06", DetectHttpCookieSigTest06, 1);
|
||
UtRegisterTest("DetectHttpCookieSigTest07", DetectHttpCookieSigTest07, 1);
|
||
UtRegisterTest("DetectHttpCookieSigTest08", DetectHttpCookieSigTest08, 1);
|
||
UtRegisterTest("DetectHttpCookieSigTest09", DetectHttpCookieSigTest09, 1);
|
||
#endif /* UNITTESTS */
|
||
}
|