return result;
}
-/** \test CONNECT with plain text HTTP being tunneled */
-static int HTPParserTest17(void)
-{
- int result = 0;
- Flow *f = NULL;
- HtpState *http_state = NULL;
- /* CONNECT setup */
- uint8_t httpbuf1[] = "CONNECT abc:443 HTTP/1.1\r\nUser-Agent: Victor/1.0\r\n\r\n";
- uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
- uint8_t httpbuf2[] = "HTTP/1.1 200 OK\r\nServer: VictorServer/1.0\r\n\r\n";
- uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
- /* plain text HTTP */
- uint8_t httpbuf3[] = "GET / HTTP/1.1\r\nUser-Agent: Victor/1.0\r\n\r\n";
- uint32_t httplen3 = sizeof(httpbuf3) - 1; /* minus the \0 */
- uint8_t httpbuf4[] = "HTTP/1.1 200 OK\r\nServer: VictorServer/1.0\r\n\r\n";
- uint32_t httplen4 = sizeof(httpbuf4) - 1; /* minus the \0 */
- TcpSession ssn;
- AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
-
- memset(&ssn, 0, sizeof(ssn));
-
- f = UTHBuildFlow(AF_INET, "1.2.3.4", "1.2.3.5", 1024, 80);
- if (f == NULL)
- goto end;
- f->protoctx = &ssn;
- f->proto = IPPROTO_TCP;
- f->alproto = ALPROTO_HTTP;
-
- StreamTcpInitConfig(TRUE);
-
- FLOWLOCK_WRLOCK(f);
- int r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP,
- STREAM_TOSERVER | STREAM_START, httpbuf1,
- httplen1);
- if (r != 0) {
- printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP,
- STREAM_TOCLIENT | STREAM_START, httpbuf2,
- httplen2);
- if (r != 0) {
- printf("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, STREAM_TOSERVER,
- httpbuf3, httplen3);
- if (r != 0) {
- printf("toserver chunk 3 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, STREAM_TOCLIENT,
- httpbuf4, httplen4);
- if (r != 0) {
- printf("toserver chunk 4 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
- FLOWLOCK_UNLOCK(f);
-
- http_state = f->alstate;
- if (http_state == NULL) {
- printf("no http state: ");
- goto end;
- }
-
- htp_tx_t *tx = HTPStateGetTx(http_state, 0);
- if (tx == NULL)
- goto end;
- htp_header_t *h = htp_table_get_index(tx->request_headers, 0, NULL);
- if (tx->request_method_number != HTP_M_CONNECT ||
- h == NULL || tx->request_protocol_number != HTP_PROTOCOL_1_1)
- {
- printf("expected method M_POST and got %s: , expected protocol "
- "HTTP/1.1 and got %s \n", bstr_util_strdup_to_c(tx->request_method),
- bstr_util_strdup_to_c(tx->request_protocol));
- goto end;
- }
-
- if (tx->response_status_number != 200) {
- printf("expected response 200 OK and got %"PRId32" %s: , expected protocol "
- "HTTP/1.1 and got %s \n", tx->response_status_number,
- bstr_util_strdup_to_c(tx->response_message),
- bstr_util_strdup_to_c(tx->response_protocol));
- goto end;
- }
-
- tx = HTPStateGetTx(http_state, 1);
- if (tx == NULL)
- goto end;
- h = htp_table_get_index(tx->request_headers, 0, NULL);
- if (tx->request_method_number != HTP_M_GET ||
- h == NULL || tx->request_protocol_number != HTP_PROTOCOL_1_1)
- {
- printf("expected method M_GET and got %s: , expected protocol "
- "HTTP/1.1 and got %s \n", bstr_util_strdup_to_c(tx->request_method),
- bstr_util_strdup_to_c(tx->request_protocol));
- goto end;
- }
-
- if (tx->response_status_number != 200) {
- printf("expected response 200 OK and got %"PRId32" %s: , expected protocol "
- "HTTP/1.1 and got %s \n", tx->response_status_number,
- bstr_util_strdup_to_c(tx->response_message),
- bstr_util_strdup_to_c(tx->response_protocol));
- goto end;
- }
- result = 1;
-end:
- if (alp_tctx != NULL)
- AppLayerParserThreadCtxFree(alp_tctx);
- StreamTcpFreeConfig(TRUE);
- UTHFreeFlow(f);
- return result;
-}
-
-/** \test CONNECT with plain text HTTP being tunneled */
-static int HTPParserTest18(void)
-{
- int result = 0;
- Flow *f = NULL;
- HtpState *http_state = NULL;
- /* CONNECT setup */
- uint8_t httpbuf1[] = "CONNECT abc:443 HTTP/1.1\r\nUser-Agent: Victor/1.0\r\n\r\n";
- uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
- uint8_t httpbuf2[] = "HTTP/1.1 200 OK\r\nServer: VictorServer/1.0\r\n\r\n";
- uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
- /* plain text HTTP */
- uint8_t httpbuf3[] = "GE";
- uint32_t httplen3 = sizeof(httpbuf3) - 1; /* minus the \0 */
- uint8_t httpbuf4[] = "T / HTTP/1.1\r\nUser-Agent: Victor/1.0\r\n\r\n";
- uint32_t httplen4 = sizeof(httpbuf4) - 1; /* minus the \0 */
- uint8_t httpbuf5[] = "HTTP/1.1 200 OK\r\nServer: VictorServer/1.0\r\n\r\n";
- uint32_t httplen5 = sizeof(httpbuf5) - 1; /* minus the \0 */
- TcpSession ssn;
- AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
-
- memset(&ssn, 0, sizeof(ssn));
-
- f = UTHBuildFlow(AF_INET, "1.2.3.4", "1.2.3.5", 1024, 80);
- if (f == NULL)
- goto end;
- f->protoctx = &ssn;
- f->proto = IPPROTO_TCP;
- f->alproto = ALPROTO_HTTP;
-
- StreamTcpInitConfig(TRUE);
-
- FLOWLOCK_WRLOCK(f);
- int r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP,
- STREAM_TOSERVER | STREAM_START, httpbuf1,
- httplen1);
- if (r != 0) {
- printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP,
- STREAM_TOCLIENT | STREAM_START, httpbuf2,
- httplen2);
- if (r != 0) {
- printf("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, STREAM_TOSERVER,
- httpbuf3, httplen3);
- if (r != 0) {
- printf("toserver chunk 3 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, STREAM_TOSERVER,
- httpbuf4, httplen4);
- if (r != 0) {
- printf("toserver chunk 4 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
-
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, STREAM_TOCLIENT,
- httpbuf5, httplen5);
- if (r != 0) {
- printf("toserver chunk 5 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
- FLOWLOCK_UNLOCK(f);
-
- http_state = f->alstate;
- if (http_state == NULL) {
- printf("no http state: ");
- goto end;
- }
-
- htp_tx_t *tx = HTPStateGetTx(http_state, 0);
- if (tx == NULL)
- goto end;
- htp_header_t *h = htp_table_get_index(tx->request_headers, 0, NULL);
- if (tx->request_method_number != HTP_M_CONNECT ||
- h == NULL || tx->request_protocol_number != HTP_PROTOCOL_1_1)
- {
- printf("expected method M_POST and got %s: , expected protocol "
- "HTTP/1.1 and got %s \n", bstr_util_strdup_to_c(tx->request_method),
- bstr_util_strdup_to_c(tx->request_protocol));
- goto end;
- }
-
- if (tx->response_status_number != 200) {
- printf("expected response 200 OK and got %"PRId32" %s: , expected protocol "
- "HTTP/1.1 and got %s \n", tx->response_status_number,
- bstr_util_strdup_to_c(tx->response_message),
- bstr_util_strdup_to_c(tx->response_protocol));
- goto end;
- }
-
- tx = HTPStateGetTx(http_state, 1);
- if (tx == NULL)
- goto end;
- h = htp_table_get_index(tx->request_headers, 0, NULL);
- if (tx->request_method_number != HTP_M_GET ||
- h == NULL || tx->request_protocol_number != HTP_PROTOCOL_1_1)
- {
- printf("expected method M_GET and got %s: , expected protocol "
- "HTTP/1.1 and got %s \n", bstr_util_strdup_to_c(tx->request_method),
- bstr_util_strdup_to_c(tx->request_protocol));
- goto end;
- }
-
- if (tx->response_status_number != 200) {
- printf("expected response 200 OK and got %"PRId32" %s: , expected protocol "
- "HTTP/1.1 and got %s \n", tx->response_status_number,
- bstr_util_strdup_to_c(tx->response_message),
- bstr_util_strdup_to_c(tx->response_protocol));
- goto end;
- }
- result = 1;
-end:
- if (alp_tctx != NULL)
- AppLayerParserThreadCtxFree(alp_tctx);
- StreamTcpFreeConfig(TRUE);
- UTHFreeFlow(f);
- return result;
-}
-
-/** \test CONNECT with TLS content (start of it at least) */
-static int HTPParserTest19(void)
-{
- int result = 0;
- Flow *f = NULL;
- HtpState *http_state = NULL;
- /* CONNECT setup */
- uint8_t httpbuf1[] = "CONNECT abc:443 HTTP/1.1\r\nUser-Agent: Victor/1.0\r\n\r\n";
- uint32_t httplen1 = sizeof(httpbuf1) - 1; /* minus the \0 */
- uint8_t httpbuf2[] = "HTTP/1.1 200 OK\r\nServer: VictorServer/1.0\r\n\r\n";
- uint32_t httplen2 = sizeof(httpbuf2) - 1; /* minus the \0 */
- /* start of TLS/SSL */
- uint8_t httpbuf3[] = "\x16\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00";
- uint32_t httplen3 = sizeof(httpbuf3) - 1; /* minus the \0 */
- TcpSession ssn;
- AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
-
- memset(&ssn, 0, sizeof(ssn));
-
- f = UTHBuildFlow(AF_INET, "1.2.3.4", "1.2.3.5", 1024, 80);
- if (f == NULL)
- goto end;
- f->protoctx = &ssn;
- f->proto = IPPROTO_TCP;
- f->alproto = ALPROTO_HTTP;
-
- StreamTcpInitConfig(TRUE);
-
- FLOWLOCK_WRLOCK(f);
- int r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP,
- STREAM_TOSERVER | STREAM_START, httpbuf1,
- httplen1);
- if (r != 0) {
- printf("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP,
- STREAM_TOCLIENT | STREAM_START, httpbuf2,
- httplen2);
- if (r != 0) {
- printf("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
- r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, STREAM_TOSERVER,
- httpbuf3, httplen3);
- if (r != 0) {
- printf("toserver chunk 3 returned %" PRId32 ", expected 0: ", r);
- FLOWLOCK_UNLOCK(f);
- goto end;
- }
-
- FLOWLOCK_UNLOCK(f);
-
- http_state = f->alstate;
- if (http_state == NULL) {
- printf("no http state: ");
- goto end;
- }
-
- htp_tx_t *tx = HTPStateGetTx(http_state, 0);
- if (tx == NULL)
- goto end;
- htp_header_t *h = htp_table_get_index(tx->request_headers, 0, NULL);
- if (tx->request_method_number != HTP_M_CONNECT ||
- h == NULL || tx->request_protocol_number != HTP_PROTOCOL_1_1)
- {
- printf("expected method M_POST and got %s: , expected protocol "
- "HTTP/1.1 and got %s \n", bstr_util_strdup_to_c(tx->request_method),
- bstr_util_strdup_to_c(tx->request_protocol));
- goto end;
- }
-
- if (tx->response_status_number != 200) {
- printf("expected response 200 OK and got %"PRId32" %s: , expected protocol "
- "HTTP/1.1 and got %s \n", tx->response_status_number,
- bstr_util_strdup_to_c(tx->response_message),
- bstr_util_strdup_to_c(tx->response_protocol));
- goto end;
- }
-
- /* no new tx should have been set up for the tunneled data */
- tx = HTPStateGetTx(http_state, 1);
- if (tx != NULL)
- goto end;
-
- result = 1;
-end:
- if (alp_tctx != NULL)
- AppLayerParserThreadCtxFree(alp_tctx);
- StreamTcpFreeConfig(TRUE);
- UTHFreeFlow(f);
- return result;
-}
-
/** \test Test response not HTTP
*/
static int HTPParserTest20(void)
UtRegisterTest("HTPParserTest14", HTPParserTest14);
UtRegisterTest("HTPParserTest15", HTPParserTest15);
UtRegisterTest("HTPParserTest16", HTPParserTest16);
- UtRegisterTest("HTPParserTest17", HTPParserTest17);
- UtRegisterTest("HTPParserTest18", HTPParserTest18);
- UtRegisterTest("HTPParserTest19", HTPParserTest19);
UtRegisterTest("HTPParserTest20", HTPParserTest20);
UtRegisterTest("HTPParserTest21", HTPParserTest21);
UtRegisterTest("HTPParserTest22", HTPParserTest22);