• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

OISF / suricata / 23374838686

21 Mar 2026 07:29AM UTC coverage: 59.341% (-20.0%) from 79.315%
23374838686

Pull #15075

github

web-flow
Merge 90b4e834f into 6587e363a
Pull Request #15075: Stack 8001 v16.4

38 of 70 new or added lines in 10 files covered. (54.29%)

34165 existing lines in 563 files now uncovered.

119621 of 201584 relevant lines covered (59.34%)

650666.92 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

85.25
/src/app-layer-parser.c
1
/* Copyright (C) 2007-2026 Open Information Security Foundation
2
 *
3
 * You can copy, redistribute or modify this Program under the terms of
4
 * the GNU General Public License version 2 as published by the Free
5
 * Software Foundation.
6
 *
7
 * This program is distributed in the hope that it will be useful,
8
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
10
 * GNU General Public License for more details.
11
 *
12
 * You should have received a copy of the GNU General Public License
13
 * version 2 along with this program; if not, write to the Free Software
14
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
15
 * 02110-1301, USA.
16
 */
17

18
/**
19
 * \file
20
 *
21
 * \author Victor Julien <victor@inliniac.net>
22
 *
23
 * Generic App-layer parsing functions.
24
 */
25

26
#include "suricata-common.h"
27
#include "app-layer-parser.h"
28

29
#include "flow.h"
30
#include "flow-private.h"
31
#include "flow-util.h"
32

33
#include "app-layer-frames.h"
34
#include "app-layer-events.h"
35

36
#include "stream-tcp.h"
37

38
#include "util-validate.h"
39
#include "util-config.h"
40

41
#include "app-layer.h"
42
#include "app-layer-detect-proto.h"
43

44
#include "app-layer-ftp.h"
45
#include "app-layer-smtp.h"
46

47
#include "app-layer-smb.h"
48
#include "app-layer-htp.h"
49
#include "app-layer-ssl.h"
50
#include "app-layer-ssh.h"
51
#include "app-layer-modbus.h"
52
#include "app-layer-dnp3.h"
53
#include "app-layer-nfs-tcp.h"
54
#include "app-layer-nfs-udp.h"
55
#include "app-layer-tftp.h"
56
#include "app-layer-ike.h"
57
#include "app-layer-http2.h"
58
#include "app-layer-imap.h"
59

60
struct AppLayerParserThreadCtx_ {
61
    void *(*alproto_local_storage)[FLOW_PROTO_MAX];
62
};
63

64

65
/**
66
 * \brief App layer protocol parser context.
67
 */
68
typedef struct AppLayerParserProtoCtx_
69
{
70
    /* 0 - to_server, 1 - to_client. */
71
    AppLayerParserFPtr Parser[2];
72

73
    bool logger;
74

75
    /* Indicates the direction the parser is ready to see the data
76
     * the first time for a flow.  Values accepted -
77
     * STREAM_TOSERVER, STREAM_TOCLIENT */
78
    uint8_t first_data_dir;
79

80
    uint32_t logger_bits;   /**< registered loggers for this proto */
81

82
    void *(*StateAlloc)(void *, AppProto);
83
    void (*StateFree)(void *);
84
    void (*StateTransactionFree)(void *, uint64_t);
85
    void *(*LocalStorageAlloc)(void);
86
    void (*LocalStorageFree)(void *);
87

88
    /** get FileContainer reference from the TX. MUST return a non-NULL reference if the TX
89
     *  has or may have files in the requested direction at some point. */
90
    AppLayerGetFileState (*GetTxFiles)(void *, uint8_t);
91

92
    int (*StateGetProgress)(void *alstate, uint8_t direction);
93
    uint64_t (*StateGetTxCnt)(void *alstate);
94
    void *(*StateGetTx)(void *alstate, uint64_t tx_id);
95
    AppLayerGetTxIteratorFunc StateGetTxIterator;
96
    int complete_ts;
97
    int complete_tc;
98
    int (*StateGetEventInfoById)(
99
            uint8_t event_id, const char **event_name, AppLayerEventType *event_type);
100
    int (*StateGetEventInfo)(
101
            const char *event_name, uint8_t *event_id, AppLayerEventType *event_type);
102

103
    AppLayerStateData *(*GetStateData)(void *state);
104
    AppLayerTxData *(*GetTxData)(void *tx);
105
    void (*ApplyTxConfig)(void *state, void *tx, int mode, AppLayerTxConfig);
106

107
    void (*SetStreamDepthFlag)(void *tx, uint8_t flags);
108

109
    AppLayerParserGetFrameIdByNameFn GetFrameIdByName;
110
    AppLayerParserGetFrameNameByIdFn GetFrameNameById;
111

112
    AppLayerParserGetStateIdByNameFn GetStateIdByName;
113
    AppLayerParserGetStateNameByIdFn GetStateNameById;
114

115
    /* each app-layer has its own value */
116
    uint32_t stream_depth;
117

118
    /* Option flags such as supporting gaps or not. */
119
    uint32_t option_flags;
120
    /* coccinelle: AppLayerParserProtoCtx:option_flags:APP_LAYER_PARSER_OPT_ */
121

122
    uint32_t internal_flags;
123
    /* coccinelle: AppLayerParserProtoCtx:internal_flags:APP_LAYER_PARSER_INT_ */
124

125
#ifdef UNITTESTS
126
    void (*RegisterUnittests)(void);
127
#endif
128
} AppLayerParserProtoCtx;
129

130
typedef struct AppLayerParserCtx_ {
131
    AppLayerParserProtoCtx (*ctxs)[FLOW_PROTO_MAX];
132
    size_t ctxs_len;
133
} AppLayerParserCtx;
134

135
struct AppLayerParserState_ {
136
    /* coccinelle: AppLayerParserState:flags:APP_LAYER_PARSER_ */
137
    uint16_t flags;
138

139
    /* Indicates the current transaction that is being inspected.
140
     * We have a var per direction. */
141
    uint64_t inspect_id[2];
142
    /* Indicates the current transaction being logged.  Unlike inspect_id,
143
     * we don't need a var per direction since we don't log a transaction
144
     * unless we have the entire transaction. */
145
    uint64_t log_id;
146

147
    uint64_t min_id;
148

149
    /* Used to store decoder events. */
150
    AppLayerDecoderEvents *decoder_events;
151

152
    FramesContainer *frames;
153
};
154

155
enum ExceptionPolicy g_applayerparser_error_policy = EXCEPTION_POLICY_NOT_SET;
156

157
static void AppLayerConfig(void)
158
{
4✔
159
    g_applayerparser_error_policy = ExceptionPolicyParse("app-layer.error-policy", true);
4✔
160
}
4✔
161

162
enum ExceptionPolicy AppLayerErrorGetExceptionPolicy(void)
163
{
340✔
164
    return g_applayerparser_error_policy;
340✔
165
}
340✔
166

167
static void AppLayerParserFramesFreeContainer(FramesContainer *frames)
168
{
35,806✔
169
    if (frames != NULL) {
35,806✔
170
        FramesFree(&frames->toserver);
27,614✔
171
        FramesFree(&frames->toclient);
27,614✔
172
        SCFree(frames);
27,614✔
173
    }
27,614✔
174
}
35,806✔
175

176
void AppLayerFramesFreeContainer(Flow *f)
177
{
1,855✔
178
    if (f == NULL || f->alparser == NULL || f->alparser->frames == NULL)
1,855✔
179
        return;
×
180
    AppLayerParserFramesFreeContainer(f->alparser->frames);
1,855✔
181
    f->alparser->frames = NULL;
1,855✔
182
}
1,855✔
183

184
FramesContainer *AppLayerFramesGetContainer(const Flow *f)
185
{
2,704,454✔
186
    if (f == NULL || f->alparser == NULL)
2,704,454✔
187
        return NULL;
154,192✔
188
    return f->alparser->frames;
2,550,262✔
189
}
2,704,454✔
190

191
FramesContainer *AppLayerFramesSetupContainer(Flow *f)
192
{
1,242,023✔
193
#ifdef UNITTESTS
194
    if (f == NULL || f->alparser == NULL || (f->proto == IPPROTO_TCP && f->protoctx == NULL))
195
        return NULL;
196
#endif
197
    DEBUG_VALIDATE_BUG_ON(f == NULL || f->alparser == NULL);
1,242,023✔
198
    if (f->alparser->frames == NULL) {
1,242,023✔
199
        f->alparser->frames = SCCalloc(1, sizeof(FramesContainer));
27,614✔
200
        if (f->alparser->frames == NULL) {
27,614✔
201
            return NULL;
×
202
        }
×
203
#ifdef DEBUG
204
        f->alparser->frames->toserver.ipproto = f->proto;
205
        f->alparser->frames->toserver.alproto = f->alproto;
206
        f->alparser->frames->toclient.ipproto = f->proto;
207
        f->alparser->frames->toclient.alproto = f->alproto;
208
#endif
209
    }
27,614✔
210
    return f->alparser->frames;
1,242,023✔
211
}
1,242,023✔
212

213
#ifdef UNITTESTS
214
void UTHAppLayerParserStateGetIds(void *ptr, uint64_t *i1, uint64_t *i2, uint64_t *log, uint64_t *min)
215
{
216
    struct AppLayerParserState_ *s = ptr;
217
    *i1 = s->inspect_id[0];
218
    *i2 = s->inspect_id[1];
219
    *log = s->log_id;
220
    *min = s->min_id;
221
}
222
#endif
223

224
/* Static global version of the parser context.
225
 * Post 2.0 let's look at changing this to move it out to app-layer.c. */
226
static AppLayerParserCtx alp_ctx;
227

228
int AppLayerParserProtoIsRegistered(uint8_t ipproto, AppProto alproto)
229
{
70✔
230
    uint8_t ipproto_map = FlowGetProtoMapping(ipproto);
70✔
231

232
    return (alp_ctx.ctxs[alproto][ipproto_map].StateAlloc != NULL) ? 1 : 0;
70✔
233
}
70✔
234

235
AppLayerParserState *AppLayerParserStateAlloc(void)
236
{
33,951✔
237
    SCEnter();
33,951✔
238

239
    AppLayerParserState *pstate = (AppLayerParserState *)SCCalloc(1, sizeof(*pstate));
33,951✔
240
    if (pstate == NULL)
33,951✔
241
        goto end;
×
242

243
 end:
33,951✔
244
    SCReturnPtr(pstate, "AppLayerParserState");
33,951✔
245
}
33,951✔
246

247
void AppLayerParserStateFree(AppLayerParserState *pstate)
248
{
33,951✔
249
    SCEnter();
33,951✔
250

251
    if (pstate->decoder_events != NULL)
33,951✔
252
        SCAppLayerDecoderEventsFreeEvents(&pstate->decoder_events);
×
253
    AppLayerParserFramesFreeContainer(pstate->frames);
33,951✔
254
    SCFree(pstate);
33,951✔
255

256
    SCReturn;
33,951✔
257
}
33,951✔
258

259
int AppLayerParserSetup(void)
260
{
4✔
261
    SCEnter();
4✔
262
    // initial allocation that will later be grown using realloc,
263
    // when new protocols register themselves and make g_alproto_max grow
264
    alp_ctx.ctxs = SCCalloc(g_alproto_max, sizeof(AppLayerParserProtoCtx[FLOW_PROTO_MAX]));
4✔
265
    if (unlikely(alp_ctx.ctxs == NULL)) {
4✔
266
        FatalError("Unable to alloc alp_ctx.ctxs.");
×
267
    }
×
268
    alp_ctx.ctxs_len = g_alproto_max;
4✔
269
    SCReturnInt(0);
4✔
270
}
4✔
271

272
void AppLayerParserPostStreamSetup(void)
273
{
2✔
274
    /* lets set a default value for stream_depth */
275
    for (int flow_proto = 0; flow_proto < FLOW_PROTO_DEFAULT; flow_proto++) {
8✔
276
        for (AppProto alproto = 0; alproto < g_alproto_max; alproto++) {
246✔
277
            if (!(alp_ctx.ctxs[alproto][flow_proto].internal_flags &
240✔
278
                        APP_LAYER_PARSER_INT_STREAM_DEPTH_SET)) {
240✔
279
                alp_ctx.ctxs[alproto][flow_proto].stream_depth = stream_config.reassembly_depth;
238✔
280
            }
238✔
281
        }
240✔
282
    }
6✔
283
}
2✔
284

285
int AppLayerParserDeSetup(void)
UNCOV
286
{
×
UNCOV
287
    SCEnter();
×
288

UNCOV
289
    SCFree(alp_ctx.ctxs);
×
290

UNCOV
291
    FTPParserCleanup();
×
UNCOV
292
    SMTPParserCleanup();
×
293

UNCOV
294
    SCReturnInt(0);
×
UNCOV
295
}
×
296

297
AppLayerParserThreadCtx *AppLayerParserThreadCtxAlloc(void)
298
{
4✔
299
    SCEnter();
4✔
300

301
    AppLayerParserThreadCtx *tctx = SCCalloc(1, sizeof(*tctx));
4✔
302
    if (tctx == NULL)
4✔
303
        goto end;
×
304

305
    tctx->alproto_local_storage = SCCalloc(g_alproto_max, sizeof(void *[FLOW_PROTO_MAX]));
4✔
306
    if (unlikely(tctx->alproto_local_storage == NULL)) {
4✔
307
        SCFree(tctx);
×
308
        tctx = NULL;
×
309
        goto end;
×
310
    }
×
311
    for (uint8_t flow_proto = 0; flow_proto < FLOW_PROTO_DEFAULT; flow_proto++) {
16✔
312
        for (AppProto alproto = 0; alproto < g_alproto_max; alproto++) {
492✔
313
            uint8_t ipproto = FlowGetReverseProtoMapping(flow_proto);
480✔
314

315
            tctx->alproto_local_storage[alproto][flow_proto] =
480✔
316
                    AppLayerParserGetProtocolParserLocalStorage(ipproto, alproto);
480✔
317
        }
480✔
318
    }
12✔
319

320
 end:
4✔
321
    SCReturnPtr(tctx, "void *");
4✔
322
}
4✔
323

324
void AppLayerParserThreadCtxFree(AppLayerParserThreadCtx *tctx)
UNCOV
325
{
×
UNCOV
326
    SCEnter();
×
327

UNCOV
328
    for (uint8_t flow_proto = 0; flow_proto < FLOW_PROTO_DEFAULT; flow_proto++) {
×
UNCOV
329
        for (AppProto alproto = 0; alproto < g_alproto_max; alproto++) {
×
UNCOV
330
            uint8_t ipproto = FlowGetReverseProtoMapping(flow_proto);
×
331

UNCOV
332
            AppLayerParserDestroyProtocolParserLocalStorage(
×
UNCOV
333
                    ipproto, alproto, tctx->alproto_local_storage[alproto][flow_proto]);
×
UNCOV
334
        }
×
UNCOV
335
    }
×
336

UNCOV
337
    SCFree(tctx->alproto_local_storage);
×
UNCOV
338
    SCFree(tctx);
×
UNCOV
339
    SCReturn;
×
UNCOV
340
}
×
341

342
/** \brief check if a parser is enabled in the config
343
 *  Returns enabled always if: were running unittests
344
 */
345
int SCAppLayerParserConfParserEnabled(const char *ipproto, const char *alproto_name)
346
{
160✔
347
    SCEnter();
160✔
348

349
    char param[100];
160✔
350
    SCConfNode *g_proto, *i_proto;
160✔
351
    bool g_enabled = false;
160✔
352
    bool i_enabled = false;
160✔
353
    int r;
160✔
354

355
    if (RunmodeIsUnittests())
160✔
UNCOV
356
        SCReturnInt(1);
×
357

358
    r = snprintf(param, sizeof(param), "%s%s%s%s%s", "app-layer.protocols.", alproto_name, ".",
160✔
359
            ipproto, ".enabled");
160✔
360
    if (r < 0) {
160✔
361
        FatalError("snprintf failure.");
×
362
    } else if (r > (int)sizeof(param)) {
160✔
363
        FatalError("buffer not big enough to write param.");
×
364
    }
×
365
    SCLogDebug("Looking for %s", param);
160✔
366

367
    i_proto = SCConfGetNode(param);
160✔
368
    if (i_proto && i_proto->val) {
160✔
UNCOV
369
        if (SCConfValIsTrue(i_proto->val)) {
×
UNCOV
370
            i_enabled = true;
×
UNCOV
371
        } else if (SCConfValIsFalse(i_proto->val)) {
×
372
            i_enabled = false;
×
373
        } else if (strcasecmp(i_proto->val, "detection-only") == 0) {
×
374
            i_enabled = false;
×
375
        } else {
×
376
            FatalError("Invalid value found for %s.", param);
×
377
        }
×
UNCOV
378
    }
×
379

380
    r = snprintf(param, sizeof(param), "%s%s%s", "app-layer.protocols.", alproto_name, ".enabled");
160✔
381
    if (r < 0) {
160✔
382
        FatalError("snprintf failure.");
×
383
    } else if (r > (int)sizeof(param)) {
160✔
384
        FatalError("buffer not big enough to write param.");
×
385
    }
×
386

387
    SCLogDebug("Looking for %s", param);
160✔
388
    g_proto = SCConfGetNode(param);
160✔
389
    if (g_proto && g_proto->val) {
160✔
390
        if (SCConfValIsTrue(g_proto->val)) {
28✔
391
            g_enabled = true;
28✔
392
        } else if (SCConfValIsFalse(g_proto->val)) {
28✔
UNCOV
393
            g_enabled = false;
×
UNCOV
394
        } else if (strcasecmp(g_proto->val, "detection-only") == 0) {
×
UNCOV
395
            g_enabled = false;
×
UNCOV
396
        } else {
×
397
            FatalError("Invalid value found for %s", param);
×
398
        }
×
399
    }
28✔
400

401
    if ((i_proto && g_proto) && (i_enabled ^ g_enabled)) {
160✔
402
        /* these checks are also performed for detection-only, no need to issue double warning */
UNCOV
403
        SCLogDebug("Inconsistent global (%s) and respective ipproto (%s) settings found for "
×
UNCOV
404
                   "alproto %s and ipproto %s",
×
UNCOV
405
                g_enabled ? "TRUE" : "FALSE", i_enabled ? "TRUE" : "FALSE", alproto_name, ipproto);
×
UNCOV
406
    }
×
407

408
    if (i_proto) {
160✔
UNCOV
409
        SCReturnInt(i_enabled);
×
UNCOV
410
    }
×
411
    if (g_proto) {
160✔
412
        SCReturnInt(g_enabled);
28✔
413
    }
28✔
414

415
    SCReturnInt(1);
160✔
416
}
160✔
417

418
/***** Parser related registration *****/
419

420
int AppLayerParserRegisterParser(uint8_t ipproto, AppProto alproto,
421
                      uint8_t direction,
422
                      AppLayerParserFPtr Parser)
423
{
328✔
424
    SCEnter();
328✔
425

426
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)]
328✔
427
            .Parser[(direction & STREAM_TOSERVER) ? 0 : 1] = Parser;
328✔
428

429
    SCReturnInt(0);
328✔
430
}
328✔
431

432
void SCAppLayerParserRegisterParserAcceptableDataDirection(
433
        uint8_t ipproto, AppProto alproto, uint8_t direction)
434
{
24✔
435
    SCEnter();
24✔
436

437
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].first_data_dir |=
24✔
438
            (direction & (STREAM_TOSERVER | STREAM_TOCLIENT));
24✔
439

440
    SCReturn;
24✔
441
}
24✔
442

443
void AppLayerParserRegisterOptionFlags(uint8_t ipproto, AppProto alproto,
444
        uint32_t flags)
445
{
42✔
446
    SCEnter();
42✔
447

448
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].option_flags |= flags;
42✔
449

450
    SCReturn;
42✔
451
}
42✔
452

453
void AppLayerParserRegisterStateFuncs(uint8_t ipproto, AppProto alproto,
454
        void *(*StateAlloc)(void *, AppProto), void (*StateFree)(void *))
455
{
164✔
456
    SCEnter();
164✔
457

458
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateAlloc = StateAlloc;
164✔
459
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateFree = StateFree;
164✔
460

461
    SCReturn;
164✔
462
}
164✔
463

464
void AppLayerParserRegisterLocalStorageFunc(uint8_t ipproto, AppProto alproto,
465
                                 void *(*LocalStorageAlloc)(void),
466
                                 void (*LocalStorageFree)(void *))
467
{
8✔
468
    SCEnter();
8✔
469

470
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].LocalStorageAlloc = LocalStorageAlloc;
8✔
471
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].LocalStorageFree = LocalStorageFree;
8✔
472

473
    SCReturn;
8✔
474
}
8✔
475

476
void AppLayerParserRegisterGetTxFilesFunc(
477
        uint8_t ipproto, AppProto alproto, AppLayerGetFileState (*GetTxFiles)(void *, uint8_t))
478
{
32✔
479
    SCEnter();
32✔
480

481
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetTxFiles = GetTxFiles;
32✔
482

483
    SCReturn;
32✔
484
}
32✔
485

486
void AppLayerParserRegisterLoggerBits(uint8_t ipproto, AppProto alproto, LoggerId bits)
487
{
44✔
488
    SCEnter();
44✔
489

490
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].logger_bits = bits;
44✔
491

492
    SCReturn;
44✔
493
}
44✔
494

495
void SCAppLayerParserRegisterLogger(uint8_t ipproto, AppProto alproto)
496
{
105✔
497
    SCEnter();
105✔
498

499
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].logger = true;
105✔
500

501
    SCReturn;
105✔
502
}
105✔
503

504
void AppLayerParserRegisterGetStateProgressFunc(uint8_t ipproto, AppProto alproto,
505
    int (*StateGetProgress)(void *alstate, uint8_t direction))
506
{
164✔
507
    SCEnter();
164✔
508

509
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetProgress = StateGetProgress;
164✔
510

511
    SCReturn;
164✔
512
}
164✔
513

514
void AppLayerParserRegisterTxFreeFunc(uint8_t ipproto, AppProto alproto,
515
                           void (*StateTransactionFree)(void *, uint64_t))
516
{
164✔
517
    SCEnter();
164✔
518

519
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateTransactionFree = StateTransactionFree;
164✔
520

521
    SCReturn;
164✔
522
}
164✔
523

524
void AppLayerParserRegisterGetTxCnt(uint8_t ipproto, AppProto alproto,
525
                         uint64_t (*StateGetTxCnt)(void *alstate))
526
{
164✔
527
    SCEnter();
164✔
528

529
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetTxCnt = StateGetTxCnt;
164✔
530

531
    SCReturn;
164✔
532
}
164✔
533

534
void AppLayerParserRegisterGetTx(uint8_t ipproto, AppProto alproto,
535
                      void *(StateGetTx)(void *alstate, uint64_t tx_id))
536
{
164✔
537
    SCEnter();
164✔
538

539
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetTx = StateGetTx;
164✔
540

541
    SCReturn;
164✔
542
}
164✔
543

544
void AppLayerParserRegisterGetTxIterator(uint8_t ipproto, AppProto alproto,
545
                      AppLayerGetTxIteratorFunc Func)
546
{
148✔
547
    SCEnter();
148✔
548
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetTxIterator = Func;
148✔
549
    SCReturn;
148✔
550
}
148✔
551

552
void AppLayerParserRegisterStateProgressCompletionStatus(
553
        AppProto alproto, const int ts, const int tc)
554
{
164✔
555
    BUG_ON(ts == 0);
164✔
556
    BUG_ON(tc == 0);
164✔
557
    BUG_ON(!AppProtoIsValid(alproto));
164✔
558
    BUG_ON(alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_ts != 0 &&
164✔
559
            alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_ts != ts);
164✔
560
    BUG_ON(alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_tc != 0 &&
164✔
561
            alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_tc != tc);
164✔
562

563
    alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_ts = ts;
164✔
564
    alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_tc = tc;
164✔
565
}
164✔
566

567
void AppLayerParserRegisterGetEventInfoById(uint8_t ipproto, AppProto alproto,
568
        int (*StateGetEventInfoById)(
569
                uint8_t event_id, const char **event_name, AppLayerEventType *event_type))
570
{
144✔
571
    SCEnter();
144✔
572

573
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetEventInfoById =
144✔
574
            StateGetEventInfoById;
144✔
575

576
    SCReturn;
144✔
577
}
144✔
578

579
void AppLayerParserRegisterGetStateFuncs(uint8_t ipproto, AppProto alproto,
580
        AppLayerParserGetStateIdByNameFn GetIdByNameFunc,
581
        AppLayerParserGetStateNameByIdFn GetNameByIdFunc)
582
{
12✔
583
    SCEnter();
12✔
584
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateIdByName = GetIdByNameFunc;
12✔
585
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateNameById = GetNameByIdFunc;
12✔
586
    SCReturn;
12✔
587
}
12✔
588

589
void AppLayerParserRegisterGetFrameFuncs(uint8_t ipproto, AppProto alproto,
590
        AppLayerParserGetFrameIdByNameFn GetIdByNameFunc,
591
        AppLayerParserGetFrameNameByIdFn GetNameByIdFunc)
592
{
92✔
593
    SCEnter();
92✔
594
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetFrameIdByName = GetIdByNameFunc;
92✔
595
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetFrameNameById = GetNameByIdFunc;
92✔
596
    SCReturn;
92✔
597
}
92✔
598

599
void AppLayerParserRegisterGetEventInfo(uint8_t ipproto, AppProto alproto,
600
        int (*StateGetEventInfo)(
601
                const char *event_name, uint8_t *event_id, AppLayerEventType *event_type))
602
{
148✔
603
    SCEnter();
148✔
604

605
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetEventInfo = StateGetEventInfo;
148✔
606

607
    SCReturn;
148✔
608
}
148✔
609

610
void AppLayerParserRegisterTxDataFunc(uint8_t ipproto, AppProto alproto,
611
        AppLayerTxData *(*GetTxData)(void *tx))
612
{
164✔
613
    SCEnter();
164✔
614

615
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetTxData = GetTxData;
164✔
616

617
    SCReturn;
164✔
618
}
164✔
619

620
void AppLayerParserRegisterStateDataFunc(
621
        uint8_t ipproto, AppProto alproto, AppLayerStateData *(*GetStateData)(void *state))
622
{
164✔
623
    SCEnter();
164✔
624

625
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateData = GetStateData;
164✔
626

627
    SCReturn;
164✔
628
}
164✔
629

630
void AppLayerParserRegisterApplyTxConfigFunc(uint8_t ipproto, AppProto alproto,
631
        void (*ApplyTxConfig)(void *state, void *tx, int mode, AppLayerTxConfig))
632
{
8✔
633
    SCEnter();
8✔
634

635
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].ApplyTxConfig = ApplyTxConfig;
8✔
636

637
    SCReturn;
8✔
638
}
8✔
639

640
void AppLayerParserRegisterSetStreamDepthFlag(uint8_t ipproto, AppProto alproto,
641
        void (*SetStreamDepthFlag)(void *tx, uint8_t flags))
642
{
4✔
643
    SCEnter();
4✔
644

645
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].SetStreamDepthFlag = SetStreamDepthFlag;
4✔
646

647
    SCReturn;
4✔
648
}
4✔
649

650
/***** Get and transaction functions *****/
651

652
void *AppLayerParserGetProtocolParserLocalStorage(uint8_t ipproto, AppProto alproto)
653
{
480✔
654
    SCEnter();
480✔
655
    void * r = NULL;
480✔
656

657
    if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].LocalStorageAlloc != NULL) {
480✔
658
        r = alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].LocalStorageAlloc();
8✔
659
    }
8✔
660

661
    SCReturnPtr(r, "void *");
480✔
662
}
480✔
663

664
void AppLayerParserDestroyProtocolParserLocalStorage(uint8_t ipproto, AppProto alproto,
665
                                          void *local_data)
UNCOV
666
{
×
UNCOV
667
    SCEnter();
×
668

UNCOV
669
    if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].LocalStorageFree != NULL) {
×
UNCOV
670
        alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].LocalStorageFree(local_data);
×
UNCOV
671
    }
×
672

UNCOV
673
    SCReturn;
×
UNCOV
674
}
×
675

676
/** \brief default tx iterator
677
 *
678
 *  Used if the app layer parser doesn't register its own iterator.
679
 *  Simply walks the tx_id space until it finds a tx. Uses 'state' to
680
 *  keep track of where it left off.
681
 *
682
 *  \retval txptr or NULL if no more txs in list
683
 */
684
static AppLayerGetTxIterTuple AppLayerDefaultGetTxIterator(
685
        const uint8_t ipproto, const AppProto alproto,
686
        void *alstate, uint64_t min_tx_id, uint64_t max_tx_id,
687
        AppLayerGetTxIterState *state)
688
{
132,611✔
689
    uint64_t ustate = *(uint64_t *)state;
132,611✔
690
    uint64_t tx_id = MAX(min_tx_id, ustate);
132,611✔
691
    for ( ; tx_id < max_tx_id; tx_id++) {
132,611✔
692
        void *tx_ptr = AppLayerParserGetTx(ipproto, alproto, alstate, tx_id);
124,004✔
693
        if (tx_ptr != NULL) {
124,004✔
694
            ustate = tx_id + 1;
124,004✔
695
            *state = *(AppLayerGetTxIterState *)&ustate;
124,004✔
696
            AppLayerGetTxIterTuple tuple = {
124,004✔
697
                .tx_ptr = tx_ptr,
124,004✔
698
                .tx_id = tx_id,
124,004✔
699
                .has_next = (tx_id + 1 < max_tx_id),
124,004✔
700
            };
124,004✔
701
            SCLogDebug("tuple: %p/%"PRIu64"/%s", tuple.tx_ptr, tuple.tx_id,
124,004✔
702
                    tuple.has_next ? "true" : "false");
124,004✔
703
            return tuple;
124,004✔
704
        }
124,004✔
705
    }
124,004✔
706

707
    AppLayerGetTxIterTuple no_tuple = { NULL, 0, false };
8,607✔
708
    return no_tuple;
8,607✔
709
}
132,611✔
710

711
AppLayerGetTxIteratorFunc AppLayerGetTxIterator(const uint8_t ipproto,
712
        const AppProto alproto)
713
{
2,448,750✔
714
    AppLayerGetTxIteratorFunc Func =
2,448,750✔
715
            alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetTxIterator;
2,448,750✔
716
    return Func ? Func : AppLayerDefaultGetTxIterator;
2,448,750✔
717
}
2,448,750✔
718

719
uint64_t AppLayerParserGetTransactionLogId(AppLayerParserState *pstate)
720
{
730,374✔
721
    SCEnter();
730,374✔
722

723
    SCReturnCT((pstate == NULL) ? 0 : pstate->log_id, "uint64_t");
730,374✔
724
}
730,374✔
725

726
uint64_t AppLayerParserGetMinId(AppLayerParserState *pstate)
727
{
8,942✔
728
    SCEnter();
8,942✔
729

730
    SCReturnCT((pstate == NULL) ? 0 : pstate->min_id, "uint64_t");
8,942✔
731
}
8,942✔
732

733
void AppLayerParserSetTransactionLogId(AppLayerParserState *pstate, uint64_t tx_id)
734
{
75,647✔
735
    SCEnter();
75,647✔
736

737
    if (pstate != NULL)
75,647✔
738
        pstate->log_id = tx_id;
75,647✔
739

740
    SCReturn;
75,647✔
741
}
75,647✔
742

743
uint64_t AppLayerParserGetTransactionInspectId(AppLayerParserState *pstate, uint8_t direction)
744
{
1,019,773✔
745
    SCEnter();
1,019,773✔
746

747
    if (pstate != NULL)
1,019,773✔
748
        SCReturnCT(pstate->inspect_id[(direction & STREAM_TOSERVER) ? 0 : 1], "uint64_t");
1,019,773✔
749

UNCOV
750
    DEBUG_VALIDATE_BUG_ON(1);
×
UNCOV
751
    SCReturnCT(0ULL, "uint64_t");
×
752
}
1,019,773✔
753

754
inline uint8_t AppLayerParserGetTxDetectProgress(AppLayerTxData *txd, const uint8_t dir)
755
{
×
756
    uint8_t p = (dir & STREAM_TOSERVER) ? txd->detect_progress_ts : txd->detect_progress_tc;
×
757
    return p;
×
758
}
×
759

760
static inline uint32_t GetTxLogged(AppLayerTxData *txd)
761
{
173,217✔
762
    return txd->logged;
173,217✔
763
}
173,217✔
764

765
void SCAppLayerTxDataCleanup(AppLayerTxData *txd)
766
{
276,118✔
767
    if (txd->de_state) {
276,118✔
768
        SCDetectEngineStateFree(txd->de_state);
16,870✔
769
    }
16,870✔
770
    if (txd->events) {
276,118✔
771
        SCAppLayerDecoderEventsFreeEvents(&txd->events);
15,517✔
772
    }
15,517✔
773
    if (txd->txbits) {
276,118✔
UNCOV
774
        SCGenericVarFree(txd->txbits);
×
UNCOV
775
    }
×
776
}
276,118✔
777

778
void AppLayerParserSetTransactionInspectId(const Flow *f, AppLayerParserState *pstate,
779
                                           void *alstate, const uint8_t flags,
780
                                           bool tag_txs_as_inspected)
781
{
493,205✔
782
    SCEnter();
493,205✔
783

784
    const int direction = (flags & STREAM_TOSERVER) ? 0 : 1;
493,205✔
785
    const uint64_t total_txs = AppLayerParserGetTxCnt(f, alstate);
493,205✔
786
    uint64_t idx = AppLayerParserGetTransactionInspectId(pstate, flags);
493,205✔
787
    const int state_done_progress = AppLayerParserGetStateProgressCompletionStatus(f->alproto, flags);
493,205✔
788
    const uint8_t ipproto = f->proto;
493,205✔
789
    const AppProto alproto = f->alproto;
493,205✔
790

791
    AppLayerGetTxIteratorFunc IterFunc = AppLayerGetTxIterator(ipproto, alproto);
493,205✔
792
    AppLayerGetTxIterState state = { 0 };
493,205✔
793

794
    SCLogDebug("called: %s, tag_txs_as_inspected %s",direction==0?"toserver":"toclient",
493,205✔
795
            tag_txs_as_inspected?"true":"false");
493,205✔
796

797
    /* mark all txs as inspected if the applayer progress is
798
     * at the 'end state'. */
799
    while (1) {
537,643✔
800
        AppLayerGetTxIterTuple ires = IterFunc(ipproto, alproto, alstate, idx, total_txs, &state);
537,643✔
801
        if (ires.tx_ptr == NULL)
537,643✔
802
            break;
80,485✔
803

804
        void *tx = ires.tx_ptr;
457,158✔
805
        idx = ires.tx_id;
457,158✔
806

807
        int state_progress = AppLayerParserGetStateProgress(ipproto, alproto, tx, flags);
457,158✔
808
        if (state_progress < state_done_progress)
457,158✔
809
            break;
343,271✔
810

811
        AppLayerTxData *txd = AppLayerParserGetTxData(ipproto, alproto, tx);
113,887✔
812
        if (tag_txs_as_inspected) {
113,887✔
813
            const uint8_t inspected_flag = (flags & STREAM_TOSERVER) ? APP_LAYER_TX_INSPECTED_TS
2,423✔
814
                                                                     : APP_LAYER_TX_INSPECTED_TC;
2,423✔
815
            if (txd->flags & inspected_flag) {
2,423✔
816
                txd->flags |= inspected_flag;
×
817
                SCLogDebug("%p/%" PRIu64 " in-order tx is done for direction %s. Flags %02x", tx,
×
818
                        idx, flags & STREAM_TOSERVER ? "toserver" : "toclient", txd->flags);
×
819
            }
×
820
        }
2,423✔
821
        idx++;
113,887✔
822
        if (!ires.has_next)
113,887✔
823
            break;
69,449✔
824
    }
113,887✔
825
    pstate->inspect_id[direction] = idx;
493,205✔
826
    SCLogDebug("inspect_id now %"PRIu64, pstate->inspect_id[direction]);
493,205✔
827

828
    /* if necessary we flag all txs that are complete as 'inspected'
829
     * also move inspect_id forward. */
830
    if (tag_txs_as_inspected) {
493,205✔
831
        /* continue at idx */
832
        while (1) {
8,971✔
833
            AppLayerGetTxIterTuple ires = IterFunc(ipproto, alproto, alstate, idx, total_txs, &state);
8,971✔
834
            if (ires.tx_ptr == NULL)
8,971✔
835
                break;
6,117✔
836

837
            void *tx = ires.tx_ptr;
2,854✔
838
            /* if we got a higher id than the minimum we requested, we
839
             * skipped a bunch of 'null-txs'. Lets see if we can up the
840
             * inspect tracker */
841
            if (ires.tx_id > idx && pstate->inspect_id[direction] == idx) {
2,854✔
842
                pstate->inspect_id[direction] = ires.tx_id;
3✔
843
            }
3✔
844
            idx = ires.tx_id;
2,854✔
845

846
            const int state_progress = AppLayerParserGetStateProgress(ipproto, alproto, tx, flags);
2,854✔
847
            if (state_progress < state_done_progress)
2,854✔
848
                break;
2,850✔
849

850
            /* txd can be NULL for HTTP sessions where the user data alloc failed */
851
            AppLayerTxData *txd = AppLayerParserGetTxData(ipproto, alproto, tx);
4✔
852
            const uint8_t inspected_flag = (flags & STREAM_TOSERVER) ? APP_LAYER_TX_INSPECTED_TS
4✔
853
                                                                     : APP_LAYER_TX_INSPECTED_TC;
4✔
854
            if (txd->flags & inspected_flag) {
4✔
855
                txd->flags |= inspected_flag;
×
856
                SCLogDebug("%p/%" PRIu64 " out of order tx is done for direction %s. Flag %02x", tx,
×
857
                        idx, flags & STREAM_TOSERVER ? "toserver" : "toclient", txd->flags);
×
858

859
                SCLogDebug("%p/%" PRIu64 " out of order tx. Update inspect_id? %" PRIu64, tx, idx,
×
860
                        pstate->inspect_id[direction]);
×
861
                if (pstate->inspect_id[direction] + 1 == idx)
×
862
                    pstate->inspect_id[direction] = idx;
×
863
            }
×
864
            if (!ires.has_next)
4✔
865
                break;
2✔
866
            idx++;
2✔
867
        }
2✔
868
    }
8,969✔
869

870
    SCReturn;
493,205✔
871
}
493,205✔
872

873
AppLayerDecoderEvents *AppLayerParserGetDecoderEvents(AppLayerParserState *pstate)
874
{
1,964,809✔
875
    SCEnter();
1,964,809✔
876

877
    SCReturnPtr(pstate->decoder_events,
1,964,809✔
878
                "AppLayerDecoderEvents *");
1,964,809✔
879
}
1,964,809✔
880

881
AppLayerDecoderEvents *AppLayerParserGetEventsByTx(uint8_t ipproto, AppProto alproto,
882
                                        void *tx)
883
{
2,101,505✔
884
    SCEnter();
2,101,505✔
885

886
    AppLayerDecoderEvents *ptr = NULL;
2,101,505✔
887

888
    /* Access events via the tx_data. */
889
    AppLayerTxData *txd = AppLayerParserGetTxData(ipproto, alproto, tx);
2,101,505✔
890
    if (txd->events != NULL) {
2,101,505✔
891
        ptr = txd->events;
99,919✔
892
    }
99,919✔
893

894
    SCReturnPtr(ptr, "AppLayerDecoderEvents *");
2,101,505✔
895
}
2,101,505✔
896

897
AppLayerGetFileState AppLayerParserGetTxFiles(const Flow *f, void *tx, const uint8_t direction)
898
{
909,652✔
899
    SCEnter();
909,652✔
900

901
    if (alp_ctx.ctxs[f->alproto][f->protomap].GetTxFiles != NULL) {
909,652✔
902
        return alp_ctx.ctxs[f->alproto][f->protomap].GetTxFiles(tx, direction);
893,328✔
903
    }
893,328✔
904

905
    AppLayerGetFileState files = { .fc = NULL, .cfg = NULL };
16,324✔
906
    return files;
16,324✔
907
}
909,652✔
908

909
static void AppLayerParserFileTxHousekeeping(
910
        const Flow *f, void *tx, const uint8_t pkt_dir, const bool trunc)
911
{
135,233✔
912
    AppLayerGetFileState files = AppLayerParserGetTxFiles(f, tx, pkt_dir);
135,233✔
913
    if (files.fc) {
135,233✔
914
        FilesPrune(files.fc, files.cfg, trunc);
135,233✔
915
    }
135,233✔
916
}
135,233✔
917

918
#define IS_DISRUPTED(flags) ((flags) & (STREAM_DEPTH | STREAM_GAP))
6,733,081✔
919

920
extern int g_detect_disabled;
921
extern bool g_file_logger_enabled;
922
extern bool g_filedata_logger_enabled;
923

924
/**
925
 * \brief remove obsolete (inspected and logged) transactions
926
 */
927
void AppLayerParserTransactionsCleanup(Flow *f, const uint8_t pkt_dir)
928
{
746,756✔
929
    SCEnter();
746,756✔
930
    DEBUG_ASSERT_FLOW_LOCKED(f);
746,756✔
931

932
    AppLayerParserProtoCtx *p = &alp_ctx.ctxs[f->alproto][f->protomap];
746,756✔
933
    if (unlikely(p->StateTransactionFree == NULL))
746,756✔
934
        SCReturn;
14,759✔
935

936
    const bool has_tx_detect_flags = !g_detect_disabled;
731,997✔
937
    const uint8_t ipproto = f->proto;
731,997✔
938
    const AppProto alproto = f->alproto;
731,997✔
939
    void * const alstate = f->alstate;
731,997✔
940
    AppLayerParserState * const alparser = f->alparser;
731,997✔
941

942
    if (alstate == NULL || alparser == NULL)
731,997✔
943
        SCReturn;
4✔
944

945
    const uint64_t min = alparser->min_id;
731,993✔
946
    const uint64_t total_txs = AppLayerParserGetTxCnt(f, alstate);
731,993✔
947
    const LoggerId logger_expectation = AppLayerParserProtocolGetLoggerBits(ipproto, alproto);
731,993✔
948
    const int tx_end_state_ts = AppLayerParserGetStateProgressCompletionStatus(alproto, STREAM_TOSERVER);
731,993✔
949
    const int tx_end_state_tc = AppLayerParserGetStateProgressCompletionStatus(alproto, STREAM_TOCLIENT);
731,993✔
950
    const uint8_t ts_disrupt_flags = FlowGetDisruptionFlags(f, STREAM_TOSERVER);
731,993✔
951
    const uint8_t tc_disrupt_flags = FlowGetDisruptionFlags(f, STREAM_TOCLIENT);
731,993✔
952

953
    int pkt_dir_trunc = -1;
731,993✔
954

955
    AppLayerGetTxIteratorFunc IterFunc = AppLayerGetTxIterator(ipproto, alproto);
731,993✔
956
    AppLayerGetTxIterState state;
731,993✔
957
    memset(&state, 0, sizeof(state));
731,993✔
958
    uint64_t i = min;
731,993✔
959
    uint64_t new_min = min;
731,993✔
960
    SCLogDebug("start min %"PRIu64, min);
731,993✔
961
    bool skipped = false;
731,993✔
962
    // const bool support_files = AppLayerParserSupportsFiles(f->proto, f->alproto);
963

964
    while (1) {
4,121,144✔
965
        AppLayerGetTxIterTuple ires = IterFunc(ipproto, alproto, alstate, i, total_txs, &state);
4,121,144✔
966
        if (ires.tx_ptr == NULL)
4,121,144✔
967
            break;
236,253✔
968

969
        bool tx_skipped = false;
4,121,144✔
970
        void *tx = ires.tx_ptr;
3,884,891✔
971
        i = ires.tx_id; // actual tx id for the tx the IterFunc returned
3,884,891✔
972

973
        SCLogDebug("%p/%"PRIu64" checking", tx, i);
3,884,891✔
974
        AppLayerTxData *txd = AppLayerParserGetTxData(ipproto, alproto, tx);
3,884,891✔
975
        if (AppLayerParserHasFilesInDir(txd, pkt_dir)) {
3,884,891✔
976
            if (pkt_dir_trunc == -1)
135,233✔
977
                pkt_dir_trunc = IS_DISRUPTED(
114,737✔
978
                        (pkt_dir == STREAM_TOSERVER) ? ts_disrupt_flags : tc_disrupt_flags);
135,233✔
979
            AppLayerParserFileTxHousekeeping(f, tx, pkt_dir, (bool)pkt_dir_trunc);
135,233✔
980
        }
135,233✔
981
        // should be reset by parser next time it updates the tx
982
        if (pkt_dir & STREAM_TOSERVER) {
3,884,891✔
983
            txd->updated_ts = false;
2,546,812✔
984
        } else {
2,546,812✔
985
            txd->updated_tc = false;
1,338,079✔
986
        }
1,338,079✔
987
        const int tx_progress_tc =
3,884,891✔
988
                AppLayerParserGetStateProgress(ipproto, alproto, tx, tc_disrupt_flags);
3,884,891✔
989
        if (tx_progress_tc < tx_end_state_tc) {
3,884,891✔
990
            SCLogDebug("%p/%"PRIu64" skipping: tc parser not done", tx, i);
1,998,147✔
991
            skipped = true;
1,998,147✔
992
            goto next;
1,998,147✔
993
        }
1,998,147✔
994
        const int tx_progress_ts =
1,886,744✔
995
                AppLayerParserGetStateProgress(ipproto, alproto, tx, ts_disrupt_flags);
1,886,744✔
996
        if (tx_progress_ts < tx_end_state_ts) {
1,886,744✔
997
            SCLogDebug("%p/%"PRIu64" skipping: ts parser not done", tx, i);
232,158✔
998
            skipped = true;
232,158✔
999
            goto next;
232,158✔
1000
        }
232,158✔
1001

1002
        if (has_tx_detect_flags) {
1,654,586✔
1003
            if (!IS_DISRUPTED(ts_disrupt_flags) &&
1,654,586✔
1004
                    (f->sgh_toserver != NULL || (f->flags & FLOW_SGH_TOSERVER) == 0)) {
1,654,586✔
1005
                if ((txd->flags & (APP_LAYER_TX_INSPECTED_TS | APP_LAYER_TX_SKIP_INSPECT_TS)) ==
1,561,745✔
1006
                        0) {
1,561,745✔
1007
                    SCLogDebug("%p/%" PRIu64 " skipping: TS inspect not done: ts:%02x", tx, i,
80,412✔
1008
                            txd->flags);
80,412✔
1009
                    tx_skipped = true;
80,412✔
1010
                }
80,412✔
1011
            }
1,561,745✔
1012
            if (!IS_DISRUPTED(tc_disrupt_flags) &&
1,654,586✔
1013
                    (f->sgh_toclient != NULL || (f->flags & FLOW_SGH_TOCLIENT) == 0)) {
1,654,586✔
1014
                if ((txd->flags & (APP_LAYER_TX_INSPECTED_TC | APP_LAYER_TX_SKIP_INSPECT_TC)) ==
1,572,960✔
1015
                        0) {
1,572,960✔
1016
                    SCLogDebug("%p/%" PRIu64 " skipping: TC inspect not done: ts:%02x", tx, i,
1,453,841✔
1017
                            txd->flags);
1,453,841✔
1018
                    tx_skipped = true;
1,453,841✔
1019
                }
1,453,841✔
1020
            }
1,572,960✔
1021
        }
1,654,586✔
1022

1023
        if (tx_skipped) {
1,654,586✔
1024
            SCLogDebug("%p/%" PRIu64 " tx_skipped", tx, i);
1,465,097✔
1025
            skipped = true;
1,465,097✔
1026
            goto next;
1,465,097✔
1027
        }
1,465,097✔
1028

1029
        if (logger_expectation != 0) {
189,489✔
1030
            LoggerId tx_logged = GetTxLogged(txd);
173,217✔
1031
            if (tx_logged != logger_expectation) {
173,217✔
1032
                SCLogDebug("%p/%"PRIu64" skipping: logging not done: want:%"PRIx32", have:%"PRIx32,
4,181✔
1033
                        tx, i, logger_expectation, tx_logged);
4,181✔
1034
                skipped = true;
4,181✔
1035
                goto next;
4,181✔
1036
            }
4,181✔
1037
        }
173,217✔
1038

1039
        /* if file logging is enabled, we keep a tx active while some of the files aren't
1040
         * logged yet. */
1041
        SCLogDebug("files_opened %u files_logged %u files_stored %u", txd->files_opened,
185,308✔
1042
                txd->files_logged, txd->files_stored);
185,308✔
1043

1044
        if (txd->files_opened) {
185,308✔
1045
            if (g_file_logger_enabled && txd->files_opened != txd->files_logged) {
11,388✔
1046
                skipped = true;
142✔
1047
                goto next;
142✔
1048
            }
142✔
1049
            if (g_filedata_logger_enabled && txd->files_opened != txd->files_stored) {
11,246✔
UNCOV
1050
                skipped = true;
×
UNCOV
1051
                goto next;
×
UNCOV
1052
            }
×
1053
        }
11,246✔
1054

1055
        /* if we are here, the tx can be freed. */
1056
        p->StateTransactionFree(alstate, i);
185,166✔
1057
        SCLogDebug("%p/%"PRIu64" freed", tx, i);
185,166✔
1058

1059
        /* if we didn't skip any tx so far, up the minimum */
1060
        SCLogDebug("skipped? %s i %"PRIu64", new_min %"PRIu64, skipped ? "true" : "false", i, new_min);
185,166✔
1061
        if (!skipped)
185,166✔
1062
            new_min = i + 1;
88,438✔
1063
        SCLogDebug("final i %"PRIu64", new_min %"PRIu64, i, new_min);
185,166✔
1064

1065
next:
3,884,891✔
1066
        if (!ires.has_next) {
3,884,891✔
1067
            /* this was the last tx. See if we skipped any. If not
1068
             * we removed all and can update the minimum to the max
1069
             * id. */
1070
            SCLogDebug("no next: cur tx i %"PRIu64", total %"PRIu64, i, total_txs);
495,740✔
1071
            if (!skipped) {
495,740✔
1072
                new_min = total_txs;
55,404✔
1073
                SCLogDebug("no next: cur tx i %"PRIu64", total %"PRIu64": "
55,404✔
1074
                        "new_min updated to %"PRIu64, i, total_txs, new_min);
55,404✔
1075
            }
55,404✔
1076
            break;
495,740✔
1077
        }
495,740✔
1078
        i++;
3,389,151✔
1079
    }
3,389,151✔
1080

1081
    /* see if we need to bring all trackers up to date. */
1082
    SCLogDebug("update f->alparser->min_id? %"PRIu64" vs %"PRIu64, new_min, alparser->min_id);
731,993✔
1083
    if (new_min > alparser->min_id) {
731,993✔
1084
        const uint64_t next_id = new_min;
81,153✔
1085
        alparser->min_id = next_id;
81,153✔
1086
        alparser->inspect_id[0] = MAX(alparser->inspect_id[0], next_id);
81,153✔
1087
        alparser->inspect_id[1] = MAX(alparser->inspect_id[1], next_id);
81,153✔
1088
        alparser->log_id = MAX(alparser->log_id, next_id);
81,153✔
1089
        SCLogDebug("updated f->alparser->min_id %"PRIu64, alparser->min_id);
81,153✔
1090
    }
81,153✔
1091
    SCReturn;
731,993✔
1092
}
731,993✔
1093

1094
static inline int StateGetProgressCompletionStatus(const AppProto alproto, const uint8_t flags)
1095
{
3,916,825✔
1096
    if (flags & STREAM_TOSERVER) {
3,916,825✔
1097
        return alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_ts;
1,978,342✔
1098
    } else if (flags & STREAM_TOCLIENT) {
1,978,342✔
1099
        return alp_ctx.ctxs[alproto][FLOW_PROTO_DEFAULT].complete_tc;
1,938,483✔
1100
    } else {
1,938,483✔
UNCOV
1101
        DEBUG_VALIDATE_BUG_ON(1);
×
UNCOV
1102
        return 0;
×
UNCOV
1103
    }
×
1104
}
3,916,825✔
1105

1106
/**
1107
 *  \brief get the progress value for a tx/protocol
1108
 *
1109
 *  If the stream is disrupted, we return the 'completion' value.
1110
 */
1111
int AppLayerParserGetStateProgress(uint8_t ipproto, AppProto alproto,
1112
                        void *alstate, uint8_t flags)
1113
{
19,829,344✔
1114
    SCEnter();
19,829,344✔
1115
    int r;
19,829,344✔
1116
    if (unlikely(IS_DISRUPTED(flags))) {
19,829,344✔
1117
        r = StateGetProgressCompletionStatus(alproto, flags);
389✔
1118
    } else {
19,828,955✔
1119
        uint8_t direction = flags & (STREAM_TOCLIENT | STREAM_TOSERVER);
19,828,955✔
1120
        r = alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetProgress(
19,828,955✔
1121
                alstate, direction);
19,828,955✔
1122
    }
19,828,955✔
1123
    SCReturnInt(r);
19,829,344✔
1124
}
19,829,344✔
1125

1126
uint64_t AppLayerParserGetTxCnt(const Flow *f, void *alstate)
1127
{
3,553,743✔
1128
    SCEnter();
3,553,743✔
1129
    uint64_t r = alp_ctx.ctxs[f->alproto][f->protomap].StateGetTxCnt(alstate);
3,553,743✔
1130
    SCReturnCT(r, "uint64_t");
3,553,743✔
1131
}
3,553,743✔
1132

1133
void *AppLayerParserGetTx(uint8_t ipproto, AppProto alproto, void *alstate, uint64_t tx_id)
1134
{
250,860✔
1135
    SCEnter();
250,860✔
1136
    void *r = alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].StateGetTx(alstate, tx_id);
250,860✔
1137
    SCReturnPtr(r, "void *");
250,860✔
1138
}
250,860✔
1139

1140
int AppLayerParserGetStateProgressCompletionStatus(AppProto alproto,
1141
                                                   uint8_t direction)
1142
{
3,916,436✔
1143
    SCEnter();
3,916,436✔
1144
    int r = StateGetProgressCompletionStatus(alproto, direction);
3,916,436✔
1145
    SCReturnInt(r);
3,916,436✔
1146
}
3,916,436✔
1147

1148
int AppLayerParserGetEventInfo(uint8_t ipproto, AppProto alproto, const char *event_name,
1149
        uint8_t *event_id, AppLayerEventType *event_type)
1150
{
88,864✔
1151
    SCEnter();
88,864✔
1152
    const int ipproto_map = FlowGetProtoMapping(ipproto);
88,864✔
1153
    int r = (alp_ctx.ctxs[alproto][ipproto_map].StateGetEventInfo == NULL)
88,864✔
1154
                    ? -1
88,864✔
1155
                    : alp_ctx.ctxs[alproto][ipproto_map].StateGetEventInfo(
88,864✔
1156
                              event_name, event_id, event_type);
87,914✔
1157
    SCReturnInt(r);
88,864✔
1158
}
88,864✔
1159

1160
int AppLayerParserGetEventInfoById(uint8_t ipproto, AppProto alproto, uint8_t event_id,
1161
        const char **event_name, AppLayerEventType *event_type)
1162
{
31,948✔
1163
    SCEnter();
31,948✔
1164
    const int ipproto_map = FlowGetProtoMapping(ipproto);
31,948✔
1165
    *event_name = (const char *)NULL;
31,948✔
1166
    int r = (alp_ctx.ctxs[alproto][ipproto_map].StateGetEventInfoById == NULL)
31,948✔
1167
                    ? -1
31,948✔
1168
                    : alp_ctx.ctxs[alproto][ipproto_map].StateGetEventInfoById(
31,948✔
1169
                              event_id, event_name, event_type);
31,948✔
1170
    SCReturnInt(r);
31,948✔
1171
}
31,948✔
1172

1173
uint8_t AppLayerParserGetFirstDataDir(uint8_t ipproto, AppProto alproto)
1174
{
27,539✔
1175
    SCEnter();
27,539✔
1176
    uint8_t r = alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].first_data_dir;
27,539✔
1177
    SCReturnCT(r, "uint8_t");
27,539✔
1178
}
27,539✔
1179

1180
uint64_t AppLayerParserGetTransactionActive(const Flow *f,
1181
        AppLayerParserState *pstate, uint8_t direction)
1182
{
6,436✔
1183
    SCEnter();
6,436✔
1184

1185
    uint64_t active_id;
6,436✔
1186
    uint64_t log_id = pstate->log_id;
6,436✔
1187
    uint64_t inspect_id = pstate->inspect_id[(direction & STREAM_TOSERVER) ? 0 : 1];
6,436✔
1188
    if (alp_ctx.ctxs[f->alproto][f->protomap].logger) {
6,436✔
1189
        active_id = MIN(log_id, inspect_id);
6,250✔
1190
    } else {
6,250✔
1191
        active_id = inspect_id;
186✔
1192
    }
186✔
1193

1194
    SCReturnCT(active_id, "uint64_t");
6,436✔
1195
}
6,436✔
1196

1197
bool AppLayerParserSupportsFiles(uint8_t ipproto, AppProto alproto)
1198
{
768,583✔
1199
    // Custom case for only signature-only protocol so far
1200
    if (alproto == ALPROTO_HTTP) {
768,583✔
1201
        return AppLayerParserSupportsFiles(ipproto, ALPROTO_HTTP1) ||
13,873✔
1202
               AppLayerParserSupportsFiles(ipproto, ALPROTO_HTTP2);
13,873✔
1203
    }
13,873✔
1204
    return alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetTxFiles != NULL;
754,710✔
1205
}
768,583✔
1206

1207
AppLayerTxData *AppLayerParserGetTxData(uint8_t ipproto, AppProto alproto, void *tx)
1208
{
17,285,756✔
1209
    SCEnter();
17,285,756✔
1210
    AppLayerTxData *d = alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetTxData(tx);
17,285,756✔
1211
    SCReturnPtr(d, "AppLayerTxData");
17,285,756✔
1212
}
17,285,756✔
1213

1214
AppLayerStateData *AppLayerParserGetStateData(uint8_t ipproto, AppProto alproto, void *state)
1215
{
43,954✔
1216
    SCEnter();
43,954✔
1217
    if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateData) {
43,954✔
1218
        AppLayerStateData *d =
43,954✔
1219
                alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateData(state);
43,954✔
1220
        SCReturnPtr(d, "AppLayerStateData");
43,954✔
1221
    }
43,954✔
1222
    SCReturnPtr(NULL, "AppLayerStateData");
43,954✔
1223
}
43,954✔
1224

1225
void AppLayerParserApplyTxConfig(uint8_t ipproto, AppProto alproto,
1226
        void *state, void *tx, enum ConfigAction mode, AppLayerTxConfig config)
1227
{
4✔
1228
    SCEnter();
4✔
1229
    const int ipproto_map = FlowGetProtoMapping(ipproto);
4✔
1230
    if (alp_ctx.ctxs[alproto][ipproto_map].ApplyTxConfig) {
4✔
1231
        alp_ctx.ctxs[alproto][ipproto_map].ApplyTxConfig(state, tx, mode, config);
4✔
1232
    }
4✔
1233
    SCReturn;
4✔
1234
}
4✔
1235

1236
/***** General *****/
1237

1238
static inline void SetEOFFlags(AppLayerParserState *pstate, const uint8_t flags)
1239
{
536,262✔
1240
    if ((flags & (STREAM_EOF|STREAM_TOSERVER)) == (STREAM_EOF|STREAM_TOSERVER)) {
536,262✔
1241
        SCLogDebug("setting APP_LAYER_PARSER_EOF_TS");
7,470✔
1242
        SCAppLayerParserStateSetFlag(pstate, APP_LAYER_PARSER_EOF_TS);
7,470✔
1243
    } else if ((flags & (STREAM_EOF|STREAM_TOCLIENT)) == (STREAM_EOF|STREAM_TOCLIENT)) {
528,792✔
1244
        SCLogDebug("setting APP_LAYER_PARSER_EOF_TC");
7,215✔
1245
        SCAppLayerParserStateSetFlag(pstate, APP_LAYER_PARSER_EOF_TC);
7,215✔
1246
    }
7,215✔
1247
}
536,262✔
1248

1249
/** \internal
1250
 *  \brief create/close stream frames
1251
 *  On first invocation of TCP parser in a direction, create a <alproto>.stream frame.
1252
 *  On STREAM_EOF, set the final length. */
1253
static void HandleStreamFrames(Flow *f, StreamSlice stream_slice, const uint8_t *input,
1254
        const uint32_t input_len, const uint8_t flags)
1255
{
536,251✔
1256
    const uint8_t direction = (flags & STREAM_TOSERVER) ? 0 : 1;
536,251✔
1257
    AppLayerParserState *pstate = f->alparser;
536,251✔
1258

1259
    /* setup the generic stream frame */
1260
    if (((direction == 0 && (pstate->flags & APP_LAYER_PARSER_SFRAME_TS) == 0) ||
536,251✔
1261
                (direction == 1 && (pstate->flags & APP_LAYER_PARSER_SFRAME_TC) == 0)) &&
536,251✔
1262
            input != NULL && f->proto == IPPROTO_TCP) {
536,251✔
1263
        Frame *frame = AppLayerFrameGetLastOpenByType(f, direction, FRAME_STREAM_TYPE);
42,788✔
1264
        if (frame == NULL) {
42,788✔
1265
            int64_t frame_len = -1;
42,788✔
1266
            if (flags & STREAM_EOF)
42,788✔
1267
                frame_len = input_len;
1,328✔
1268

1269
            frame = AppLayerFrameNewByAbsoluteOffset(
42,788✔
1270
                    f, &stream_slice, stream_slice.offset, frame_len, direction, FRAME_STREAM_TYPE);
42,788✔
1271
            if (frame) {
42,788✔
1272
                SCLogDebug("opened: frame %p id %" PRIi64, frame, frame->id);
20,127✔
1273
                frame->flags = FRAME_FLAG_ENDS_AT_EOF; // TODO logic is not yet implemented
20,127✔
1274
                DEBUG_VALIDATE_BUG_ON(
20,127✔
1275
                        frame->id != 1); // should always be the first frame that is created
20,127✔
1276
            }
20,127✔
1277
            if (direction == 0) {
42,788✔
1278
                pstate->flags |= APP_LAYER_PARSER_SFRAME_TS;
22,728✔
1279
            } else {
22,728✔
1280
                pstate->flags |= APP_LAYER_PARSER_SFRAME_TC;
20,060✔
1281
            }
20,060✔
1282
        }
42,788✔
1283
    } else if (flags & STREAM_EOF) {
493,463✔
1284
        Frame *frame = AppLayerFrameGetLastOpenByType(f, direction, FRAME_STREAM_TYPE);
13,357✔
1285
        SCLogDebug("EOF closing: frame %p", frame);
13,357✔
1286
        if (frame) {
13,357✔
1287
            /* calculate final frame length */
1288
            int64_t slice_o = (int64_t)stream_slice.offset - (int64_t)frame->offset;
7,384✔
1289
            int64_t frame_len = slice_o + (int64_t)input_len;
7,384✔
1290
            SCLogDebug("%s: EOF frame->offset %" PRIu64 " -> %" PRIi64 ": o %" PRIi64,
7,384✔
1291
                    AppProtoToString(f->alproto), frame->offset, frame_len, slice_o);
7,384✔
1292
            frame->len = frame_len;
7,384✔
1293
        }
7,384✔
1294
    }
13,357✔
1295
}
536,251✔
1296

1297
static void Setup(Flow *f, const uint8_t direction, const uint8_t *input, uint32_t input_len,
1298
        const uint8_t flags, StreamSlice *as)
1299
{
536,251✔
1300
    memset(as, 0, sizeof(*as));
536,251✔
1301
    as->input = input;
536,251✔
1302
    as->input_len = input_len;
536,251✔
1303
    as->flags = flags;
536,251✔
1304

1305
    if (f->proto == IPPROTO_TCP && f->protoctx != NULL) {
536,251✔
1306
        TcpSession *ssn = f->protoctx;
490,068✔
1307
        TcpStream *stream = (direction & STREAM_TOSERVER) ? &ssn->client : &ssn->server;
490,068✔
1308
        as->offset = STREAM_APP_PROGRESS(stream);
490,068✔
1309
    }
490,068✔
1310
}
536,251✔
1311

1312
/** \retval int -1 in case of unrecoverable error. App-layer tracking stops for this flow.
1313
 *  \retval int 0 ok: we did not update app_progress
1314
 *  \retval int 1 ok: we updated app_progress */
1315
int AppLayerParserParse(ThreadVars *tv, AppLayerParserThreadCtx *alp_tctx, Flow *f, AppProto alproto,
1316
                        uint8_t flags, const uint8_t *input, uint32_t input_len)
1317
{
548,419✔
1318
    SCEnter();
548,419✔
1319
#ifdef DEBUG_VALIDATION
1320
    BUG_ON(f->protomap != FlowGetProtoMapping(f->proto));
1321
#endif
1322
    AppLayerParserState *pstate = f->alparser;
548,419✔
1323
    AppLayerParserProtoCtx *p = &alp_ctx.ctxs[alproto][f->protomap];
548,419✔
1324
    StreamSlice stream_slice;
548,419✔
1325
    void *alstate = NULL;
548,419✔
1326
    uint64_t p_tx_cnt = 0;
548,419✔
1327
    uint32_t consumed = input_len;
548,419✔
1328
    const uint8_t direction = (flags & STREAM_TOSERVER) ? 0 : 1;
548,419✔
1329

1330
    /* we don't have the parser registered for this protocol */
1331
    if (p->StateAlloc == NULL) {
548,419✔
1332
        if (f->proto == IPPROTO_TCP) {
11,361✔
1333
            StreamTcpDisableAppLayer(f);
4✔
1334
        }
4✔
1335
        goto end;
11,361✔
1336
    }
11,361✔
1337

1338
    if (flags & STREAM_GAP) {
537,058✔
1339
        if (!(p->option_flags & APP_LAYER_PARSER_OPT_ACCEPT_GAPS)) {
9,190✔
1340
            SCLogDebug("app-layer parser does not accept gaps");
796✔
1341
            if (f->alstate != NULL && !FlowChangeProto(f)) {
796✔
1342
                SCAppLayerParserTriggerRawStreamInspection(f, direction);
789✔
1343
            }
789✔
1344
            AppLayerIncGapErrorCounter(tv, f);
796✔
1345
            goto error;
796✔
1346
        }
796✔
1347
    }
9,190✔
1348

1349
    /* Get the parser state (if any) */
1350
    if (pstate == NULL) {
536,262✔
1351
        f->alparser = pstate = AppLayerParserStateAlloc();
33,951✔
1352
        if (pstate == NULL) {
33,951✔
1353
            AppLayerIncAllocErrorCounter(tv, f);
×
1354
            goto error;
×
1355
        }
×
1356
    }
33,951✔
1357

1358
    SetEOFFlags(pstate, flags);
536,262✔
1359

1360
    alstate = f->alstate;
536,262✔
1361
    if (alstate == NULL || FlowChangeProto(f)) {
536,262✔
1362
        f->alstate = alstate = p->StateAlloc(alstate, f->alproto_orig);
33,951✔
1363
        if (alstate == NULL) {
33,951✔
1364
            AppLayerIncAllocErrorCounter(tv, f);
×
1365
            goto error;
×
1366
        }
×
1367
        SCLogDebug("alloced new app layer state %p (name %s)",
33,951✔
1368
                   alstate, AppLayerGetProtoName(f->alproto));
33,951✔
1369

1370
        /* set flow flags to state */
1371
        if (f->file_flags != 0) {
33,951✔
1372
            AppLayerStateData *sd = AppLayerParserGetStateData(f->proto, f->alproto, f->alstate);
24,335✔
1373
            if (sd != NULL) {
24,335✔
1374
                if ((sd->file_flags & f->file_flags) != f->file_flags) {
24,335✔
1375
                    SCLogDebug("state data: updating file_flags %04x with flow file_flags %04x",
24,335✔
1376
                            sd->file_flags, f->file_flags);
24,335✔
1377
                    sd->file_flags |= f->file_flags;
24,335✔
1378
                }
24,335✔
1379
            }
24,335✔
1380
        }
24,335✔
1381
    } else {
502,311✔
1382
        SCLogDebug("using existing app layer state %p (name %s))",
502,311✔
1383
                   alstate, AppLayerGetProtoName(f->alproto));
502,311✔
1384
    }
502,311✔
1385

1386
    p_tx_cnt = AppLayerParserGetTxCnt(f, f->alstate);
536,262✔
1387

1388
    /* invoke the recursive parser, but only on data. We may get empty msgs on EOF */
1389
    if (input_len > 0 || (flags & STREAM_EOF)) {
536,262✔
1390
        Setup(f, flags & (STREAM_TOSERVER | STREAM_TOCLIENT), input, input_len, flags,
536,251✔
1391
                &stream_slice);
536,251✔
1392
        HandleStreamFrames(f, stream_slice, input, input_len, flags);
536,251✔
1393

1394
#ifdef QA_SIMULATION
1395
        if (((stream_slice.flags & STREAM_TOSERVER) &&
1396
                    stream_slice.offset >= g_eps_applayer_error_offset_ts)) {
1397
            SCLogNotice("putting parser %s into an error state from toserver offset %" PRIu64,
1398
                    AppProtoToString(alproto), g_eps_applayer_error_offset_ts);
1399
            AppLayerIncParserErrorCounter(tv, f);
1400
            goto error;
1401
        }
1402
        if (((stream_slice.flags & STREAM_TOCLIENT) &&
1403
                    stream_slice.offset >= g_eps_applayer_error_offset_tc)) {
1404
            SCLogNotice("putting parser %s into an error state from toclient offset %" PRIu64,
1405
                    AppProtoToString(alproto), g_eps_applayer_error_offset_tc);
1406
            AppLayerIncParserErrorCounter(tv, f);
1407
            goto error;
1408
        }
1409
#endif
1410
        /* invoke the parser */
1411
        AppLayerResult res = p->Parser[direction](f, alstate, pstate, stream_slice,
536,251✔
1412
                alp_tctx->alproto_local_storage[alproto][f->protomap]);
536,251✔
1413
        if (res.status < 0) {
536,251✔
1414
            AppLayerIncParserErrorCounter(tv, f);
4,254✔
1415
            goto error;
4,254✔
1416
        } else if (res.status > 0) {
531,997✔
1417
            DEBUG_VALIDATE_BUG_ON(res.consumed > input_len);
9,022✔
1418
            DEBUG_VALIDATE_BUG_ON(res.needed < input_len - res.consumed);
9,022✔
1419
            DEBUG_VALIDATE_BUG_ON(res.needed == 0);
9,022✔
1420
            /* incomplete is only supported for TCP */
1421
            DEBUG_VALIDATE_BUG_ON(f->proto != IPPROTO_TCP);
9,022✔
1422

1423
            /* put protocol in error state on improper use of the
1424
             * return codes. */
1425
            if (res.consumed > input_len || res.needed + res.consumed < input_len) {
9,022✔
1426
                AppLayerIncInternalErrorCounter(tv, f);
×
1427
                goto error;
×
1428
            }
×
1429

1430
            if (f->proto == IPPROTO_TCP && f->protoctx != NULL) {
9,022✔
1431
                TcpSession *ssn = f->protoctx;
9,022✔
1432
                SCLogDebug("direction %d/%s", direction,
9,022✔
1433
                        (flags & STREAM_TOSERVER) ? "toserver" : "toclient");
9,022✔
1434
                if (direction == 0) {
9,022✔
1435
                    /* parser told us how much data it needs on top of what it
1436
                     * consumed. So we need tell stream engine how much we need
1437
                     * before the next call */
1438
                    ssn->client.data_required = res.needed;
3,732✔
1439
                    SCLogDebug("setting data_required %u", ssn->client.data_required);
3,732✔
1440
                } else {
5,290✔
1441
                    /* parser told us how much data it needs on top of what it
1442
                     * consumed. So we need tell stream engine how much we need
1443
                     * before the next call */
1444
                    ssn->server.data_required = res.needed;
5,290✔
1445
                    SCLogDebug("setting data_required %u", ssn->server.data_required);
5,290✔
1446
                }
5,290✔
1447
            }
9,022✔
1448
            consumed = res.consumed;
9,022✔
1449
        }
9,022✔
1450
    }
536,251✔
1451

1452
    /* set the packets to no inspection and reassembly if required */
1453
    if (pstate->flags & APP_LAYER_PARSER_NO_INSPECTION) {
532,008✔
1454
        AppLayerParserSetEOF(pstate);
609✔
1455

1456
        if (f->proto == IPPROTO_TCP) {
609✔
1457
            StreamTcpDisableAppLayer(f);
34✔
1458

1459
            /* Set the no reassembly flag for both the stream in this TcpSession */
1460
            if (pstate->flags & APP_LAYER_PARSER_NO_REASSEMBLY) {
34✔
1461
                /* Used only if it's TCP */
UNCOV
1462
                TcpSession *ssn = f->protoctx;
×
UNCOV
1463
                if (ssn != NULL) {
×
UNCOV
1464
                    StreamTcpSetSessionNoReassemblyFlag(ssn, 0);
×
UNCOV
1465
                    StreamTcpSetSessionNoReassemblyFlag(ssn, 1);
×
UNCOV
1466
                }
×
UNCOV
1467
            }
×
1468
            /* Set the bypass flag for both the stream in this TcpSession */
1469
            if (pstate->flags & APP_LAYER_PARSER_BYPASS_READY) {
34✔
1470
                /* Used only if it's TCP */
UNCOV
1471
                TcpSession *ssn = f->protoctx;
×
UNCOV
1472
                if (ssn != NULL) {
×
UNCOV
1473
                    StreamTcpSetSessionBypassFlag(ssn);
×
UNCOV
1474
                }
×
UNCOV
1475
            }
×
1476
        } else {
575✔
1477
            // for TCP, this is set after flushing
1478
            FlowSetNoPayloadInspectionFlag(f);
575✔
1479
        }
575✔
1480
    }
609✔
1481

1482
    /* In cases like HeartBleed for TLS we need to inspect AppLayer but not Payload */
1483
    if (!(f->flags & FLOW_NOPAYLOAD_INSPECTION) && pstate->flags & APP_LAYER_PARSER_NO_INSPECTION_PAYLOAD) {
532,008✔
1484
        FlowSetNoPayloadInspectionFlag(f);
1,482✔
1485
        /* Set the no reassembly flag for both the stream in this TcpSession */
1486
        if (f->proto == IPPROTO_TCP) {
1,482✔
1487
            /* Used only if it's TCP */
1488
            TcpSession *ssn = f->protoctx;
1,482✔
1489
            if (ssn != NULL) {
1,482✔
1490
                StreamTcpSetDisableRawReassemblyFlag(ssn, 0);
1,482✔
1491
                StreamTcpSetDisableRawReassemblyFlag(ssn, 1);
1,482✔
1492
            }
1,482✔
1493
        }
1,482✔
1494
    }
1,482✔
1495

1496
    /* get the diff in tx cnt for stats keeping */
1497
    uint64_t cur_tx_cnt = AppLayerParserGetTxCnt(f, f->alstate);
532,008✔
1498
    if (cur_tx_cnt > p_tx_cnt && tv) {
532,008✔
1499
        AppLayerIncTxCounter(tv, f, cur_tx_cnt - p_tx_cnt);
186,298✔
1500
    }
186,298✔
1501

1502
 end:
543,369✔
1503
    /* update app progress */
1504
    if (consumed != input_len && f->proto == IPPROTO_TCP && f->protoctx != NULL) {
543,369✔
1505
        TcpSession *ssn = f->protoctx;
9,012✔
1506
        StreamTcpUpdateAppLayerProgress(ssn, direction, consumed);
9,012✔
1507
        SCReturnInt(1);
9,012✔
1508
    }
9,012✔
1509

1510
    SCReturnInt(0);
543,369✔
1511
 error:
5,050✔
1512
    /* Set the no app layer inspection flag for both
1513
     * the stream in this Flow */
1514
    if (f->proto == IPPROTO_TCP) {
5,050✔
1515
        StreamTcpDisableAppLayer(f);
2,470✔
1516
    }
2,470✔
1517
    AppLayerParserSetEOF(pstate);
5,050✔
1518
    SCReturnInt(-1);
5,050✔
1519
}
543,369✔
1520

1521
void AppLayerParserSetEOF(AppLayerParserState *pstate)
1522
{
5,659✔
1523
    SCEnter();
5,659✔
1524

1525
    if (pstate == NULL)
5,659✔
1526
        goto end;
7✔
1527

1528
    SCLogDebug("setting APP_LAYER_PARSER_EOF_TC and APP_LAYER_PARSER_EOF_TS");
5,652✔
1529
    SCAppLayerParserStateSetFlag(pstate, (APP_LAYER_PARSER_EOF_TS | APP_LAYER_PARSER_EOF_TC));
5,652✔
1530

1531
 end:
5,659✔
1532
    SCReturn;
5,659✔
1533
}
5,652✔
1534

1535
/* return true if there are app parser decoder events. These are
1536
 * only the ones that are set during protocol detection. */
1537
bool AppLayerParserHasDecoderEvents(AppLayerParserState *pstate)
1538
{
2,252,877✔
1539
    SCEnter();
2,252,877✔
1540

1541
    if (pstate == NULL)
2,252,877✔
1542
        return false;
288,068✔
1543

1544
    const AppLayerDecoderEvents *decoder_events = AppLayerParserGetDecoderEvents(pstate);
1,964,809✔
1545
    if (decoder_events && decoder_events->cnt)
1,964,809✔
1546
        return true;
×
1547

1548
    /* if we have reached here, we don't have events */
1549
    return false;
1,964,809✔
1550
}
1,964,809✔
1551

1552
/** \brief simple way to globally test if a alproto is registered
1553
 *         and fully enabled in the configuration.
1554
 */
1555
int AppLayerParserIsEnabled(AppProto alproto)
1556
{
21✔
1557
    for (int i = 0; i < FLOW_PROTO_APPLAYER_MAX; i++) {
25✔
1558
        if (alp_ctx.ctxs[alproto][i].StateGetProgress != NULL) {
25✔
1559
            return 1;
21✔
1560
        }
21✔
1561
    }
25✔
UNCOV
1562
    return 0;
×
1563
}
21✔
1564

1565
int AppLayerParserProtocolHasLogger(uint8_t ipproto, AppProto alproto)
1566
{
44✔
1567
    SCEnter();
44✔
1568
    int ipproto_map = FlowGetProtoMapping(ipproto);
44✔
1569
    int r = (!alp_ctx.ctxs[alproto][ipproto_map].logger) ? 0 : 1;
44✔
1570
    SCReturnInt(r);
44✔
1571
}
44✔
1572

1573
LoggerId AppLayerParserProtocolGetLoggerBits(uint8_t ipproto, AppProto alproto)
1574
{
1,505,910✔
1575
    SCEnter();
1,505,910✔
1576
    const int ipproto_map = FlowGetProtoMapping(ipproto);
1,505,910✔
1577
    LoggerId r = alp_ctx.ctxs[alproto][ipproto_map].logger_bits;
1,505,910✔
1578
    SCReturnUInt(r);
1,505,910✔
1579
}
1,505,910✔
1580

1581
void SCAppLayerParserTriggerRawStreamInspection(Flow *f, int direction)
1582
{
154,286✔
1583
    SCEnter();
154,286✔
1584

1585
    SCLogDebug("f %p tcp %p direction %d", f, f ? f->protoctx : NULL, direction);
154,286✔
1586
    if (f != NULL && f->protoctx != NULL)
154,286✔
1587
        StreamTcpReassembleTriggerRawInspection(f->protoctx, direction);
150,438✔
1588

1589
    SCReturn;
154,286✔
1590
}
154,286✔
1591

1592
void SCAppLayerParserSetStreamDepth(uint8_t ipproto, AppProto alproto, uint32_t stream_depth)
1593
{
4✔
1594
    SCEnter();
4✔
1595

1596
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].stream_depth = stream_depth;
4✔
1597
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].internal_flags |=
4✔
1598
            APP_LAYER_PARSER_INT_STREAM_DEPTH_SET;
4✔
1599

1600
    SCReturn;
4✔
1601
}
4✔
1602

1603
uint32_t AppLayerParserGetStreamDepth(const Flow *f)
1604
{
41,725✔
1605
    SCReturnInt(alp_ctx.ctxs[f->alproto][f->protomap].stream_depth);
41,725✔
1606
}
41,725✔
1607

1608
void AppLayerParserSetStreamDepthFlag(uint8_t ipproto, AppProto alproto, void *state, uint64_t tx_id, uint8_t flags)
1609
{
710✔
1610
    SCEnter();
710✔
1611
    void *tx = NULL;
710✔
1612
    if (state != NULL) {
710✔
1613
        if ((tx = AppLayerParserGetTx(ipproto, alproto, state, tx_id)) != NULL) {
710✔
1614
            if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].SetStreamDepthFlag != NULL) {
710✔
1615
                alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].SetStreamDepthFlag(tx, flags);
152✔
1616
            }
152✔
1617
        }
710✔
1618
    }
710✔
1619
    SCReturn;
710✔
1620
}
710✔
1621

1622
/**
1623
 *  \param id progress value id to get the name for
1624
 *  \param direction STREAM_TOSERVER/STREAM_TOCLIENT
1625
 */
1626
int AppLayerParserGetStateIdByName(
1627
        uint8_t ipproto, AppProto alproto, const char *name, const uint8_t direction)
1628
{
447✔
1629
    if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateIdByName != NULL) {
447✔
1630
        return alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateIdByName(
357✔
1631
                name, direction);
357✔
1632
    } else {
357✔
1633
        return -1;
90✔
1634
    }
90✔
1635
}
447✔
1636

1637
/**
1638
 *  \param id progress value id to get the name for
1639
 *  \param direction STREAM_TOSERVER/STREAM_TOCLIENT
1640
 */
1641
const char *AppLayerParserGetStateNameById(
1642
        uint8_t ipproto, AppProto alproto, const int id, const uint8_t direction)
1643
{
62,380✔
1644
    if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateNameById != NULL) {
62,380✔
1645
        return alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetStateNameById(id, direction);
5,654✔
1646
    } else {
56,726✔
1647
        return NULL;
56,726✔
1648
    }
56,726✔
1649
}
62,380✔
1650

1651
int AppLayerParserGetFrameIdByName(uint8_t ipproto, AppProto alproto, const char *name)
1652
{
42,750✔
1653
    if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetFrameIdByName != NULL) {
42,750✔
1654
        return alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetFrameIdByName(name);
42,124✔
1655
    } else {
42,124✔
1656
        return -1;
626✔
1657
    }
626✔
1658
}
42,750✔
1659

1660
const char *AppLayerParserGetFrameNameById(uint8_t ipproto, AppProto alproto, const uint8_t id)
1661
{
1,702✔
1662
    if (alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetFrameNameById != NULL) {
1,702✔
1663
        return alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].GetFrameNameById(id);
1,702✔
1664
    } else {
1,702✔
UNCOV
1665
        return NULL;
×
UNCOV
1666
    }
×
1667
}
1,702✔
1668

1669
/***** Cleanup *****/
1670

1671
void AppLayerParserStateProtoCleanup(
1672
        uint8_t protomap, AppProto alproto, void *alstate, AppLayerParserState *pstate)
1673
{
77,378✔
1674
    SCEnter();
77,378✔
1675

1676
    AppLayerParserProtoCtx *ctx = &alp_ctx.ctxs[alproto][protomap];
77,378✔
1677

1678
    if (ctx->StateFree != NULL && alstate != NULL)
77,378✔
1679
        ctx->StateFree(alstate);
33,951✔
1680

1681
    /* free the app layer parser api state */
1682
    if (pstate != NULL)
77,378✔
1683
        AppLayerParserStateFree(pstate);
33,951✔
1684

1685
    SCReturn;
77,378✔
1686
}
77,378✔
1687

1688
void AppLayerParserStateCleanup(const Flow *f, void *alstate, AppLayerParserState *pstate)
1689
{
76,350✔
1690
    AppLayerParserStateProtoCleanup(f->protomap, f->alproto, alstate, pstate);
76,350✔
1691
}
76,350✔
1692

1693
static void ValidateParserProtoDump(AppProto alproto, uint8_t ipproto)
1694
{
×
1695
    uint8_t map = FlowGetProtoMapping(ipproto);
×
1696
    const AppLayerParserProtoCtx *ctx = &alp_ctx.ctxs[alproto][map];
×
1697
    printf("ERROR: incomplete app-layer registration\n");
×
1698
    printf("AppLayer protocol %s ipproto %u\n", AppProtoToString(alproto), ipproto);
×
1699
    printf("- option flags %"PRIx32"\n", ctx->option_flags);
×
1700
    printf("- first_data_dir %"PRIx8"\n", ctx->first_data_dir);
×
1701
    printf("Mandatory:\n");
×
1702
    printf("- Parser[0] %p Parser[1] %p\n", ctx->Parser[0], ctx->Parser[1]);
×
1703
    printf("- StateAlloc %p StateFree %p\n", ctx->StateAlloc, ctx->StateFree);
×
1704
    printf("- StateGetTx %p StateGetTxCnt %p StateTransactionFree %p\n",
×
1705
            ctx->StateGetTx, ctx->StateGetTxCnt, ctx->StateTransactionFree);
×
1706
    printf("- GetTxData %p\n", ctx->GetTxData);
×
1707
    printf("- GetStateData %p\n", ctx->GetStateData);
×
1708
    printf("- StateGetProgress %p\n", ctx->StateGetProgress);
×
1709
    printf("Optional:\n");
×
1710
    printf("- LocalStorageAlloc %p LocalStorageFree %p\n", ctx->LocalStorageAlloc, ctx->LocalStorageFree);
×
1711
    printf("- StateGetEventInfo %p StateGetEventInfoById %p\n", ctx->StateGetEventInfo,
×
1712
            ctx->StateGetEventInfoById);
×
1713
}
×
1714

1715
#define BOTH_SET(a, b) ((a) != NULL && (b) != NULL)
320✔
1716
#define BOTH_SET_OR_BOTH_UNSET(a, b) (((a) == NULL && (b) == NULL) || ((a) != NULL && (b) != NULL))
160✔
1717
#define THREE_SET(a, b, c) ((a) != NULL && (b) != NULL && (c) != NULL)
160✔
1718

1719
static void ValidateParserProto(AppProto alproto, uint8_t ipproto)
1720
{
320✔
1721
    uint8_t map = FlowGetProtoMapping(ipproto);
320✔
1722
    const AppLayerParserProtoCtx *ctx = &alp_ctx.ctxs[alproto][map];
320✔
1723

1724
    if (ctx->Parser[0] == NULL && ctx->Parser[1] == NULL)
320✔
1725
        return;
160✔
1726

1727
    if (!(BOTH_SET(ctx->Parser[0], ctx->Parser[1]))) {
160✔
1728
        goto bad;
×
1729
    }
×
1730
    if (!(BOTH_SET(ctx->StateFree, ctx->StateAlloc))) {
160✔
1731
        goto bad;
×
1732
    }
×
1733
    if (!(THREE_SET(ctx->StateGetTx, ctx->StateGetTxCnt, ctx->StateTransactionFree))) {
160✔
1734
        goto bad;
×
1735
    }
×
1736
    if (ctx->StateGetProgress == NULL) {
160✔
1737
        goto bad;
×
1738
    }
×
1739
    /* local storage is optional, but needs both set if used */
1740
    if (!(BOTH_SET_OR_BOTH_UNSET(ctx->LocalStorageAlloc, ctx->LocalStorageFree))) {
160✔
1741
        goto bad;
×
1742
    }
×
1743
    if (ctx->GetTxData == NULL) {
160✔
1744
        goto bad;
×
1745
    }
×
1746
    if (ctx->GetStateData == NULL) {
160✔
1747
        goto bad;
×
1748
    }
×
1749
    return;
160✔
1750
bad:
160✔
1751
    ValidateParserProtoDump(alproto, ipproto);
×
1752
    exit(EXIT_FAILURE);
×
1753
}
160✔
1754
#undef BOTH_SET
1755
#undef BOTH_SET_OR_BOTH_UNSET
1756
#undef THREE_SET
1757

1758
static void ValidateParser(AppProto alproto)
1759
{
160✔
1760
    ValidateParserProto(alproto, IPPROTO_TCP);
160✔
1761
    ValidateParserProto(alproto, IPPROTO_UDP);
160✔
1762
}
160✔
1763

1764
static void ValidateParsers(void)
1765
{
4✔
1766
    AppProto p = 0;
4✔
1767
    for (; p < g_alproto_max; p++) {
164✔
1768
        ValidateParser(p);
160✔
1769
    }
160✔
1770
}
4✔
1771

1772
#define ARRAY_CAP_STEP 16
8✔
1773
static void (**PreRegisteredCallbacks)(void) = NULL;
1774
static size_t preregistered_callbacks_nb = 0;
1775
static size_t preregistered_callbacks_cap = 0;
1776

1777
int SCAppLayerParserReallocCtx(AppProto alproto)
1778
{
4✔
1779
    if (alp_ctx.ctxs_len <= alproto && alproto < g_alproto_max) {
4✔
1780
        /* Realloc alp_ctx.ctxs, so that dynamic alproto can be treated as real/normal ones.
1781
         * In case we need to turn off dynamic alproto. */
1782
        void *tmp = SCRealloc(alp_ctx.ctxs, sizeof(AppLayerParserProtoCtx[FLOW_PROTO_MAX]) *
4✔
1783
                                                    (alp_ctx.ctxs_len + ARRAY_CAP_STEP));
4✔
1784
        if (unlikely(tmp == NULL)) {
4✔
1785
            FatalError("Unable to realloc alp_ctx.ctxs.");
×
1786
        }
×
1787
        alp_ctx.ctxs = tmp;
4✔
1788
        memset(&alp_ctx.ctxs[alp_ctx.ctxs_len], 0,
4✔
1789
                sizeof(AppLayerParserProtoCtx[FLOW_PROTO_MAX]) * ARRAY_CAP_STEP);
4✔
1790
        alp_ctx.ctxs_len += ARRAY_CAP_STEP;
4✔
1791
    }
4✔
1792
    return 0;
4✔
1793
}
4✔
1794

1795
int AppLayerParserPreRegister(void (*Register)(void))
1796
{
×
1797
    if (preregistered_callbacks_nb == preregistered_callbacks_cap) {
×
1798
        void *tmp = SCRealloc(PreRegisteredCallbacks,
×
1799
                sizeof(void *) * (preregistered_callbacks_cap + ARRAY_CAP_STEP));
×
1800
        if (tmp == NULL) {
×
1801
            return 1;
×
1802
        }
×
1803
        preregistered_callbacks_cap += ARRAY_CAP_STEP;
×
1804
        PreRegisteredCallbacks = tmp;
×
1805
    }
×
1806
    PreRegisteredCallbacks[preregistered_callbacks_nb] = Register;
×
1807
    preregistered_callbacks_nb++;
×
1808
    return 0;
×
1809
}
×
1810

1811
void AppLayerParserRegisterProtocolParsers(void)
1812
{
4✔
1813
    SCEnter();
4✔
1814

1815
    AppLayerConfig();
4✔
1816

1817
    RegisterHTPParsers();
4✔
1818
    RegisterSSLParsers();
4✔
1819
    SCRegisterDcerpcParser();
4✔
1820
    SCRegisterDcerpcUdpParser();
4✔
1821
    RegisterSMBParsers();
4✔
1822
    RegisterFTPParsers();
4✔
1823
    RegisterSSHParsers();
4✔
1824
    RegisterSMTPParsers();
4✔
1825
    SCRegisterDnsUdpParser();
4✔
1826
    SCRegisterDnsTcpParser();
4✔
1827
    SCRegisterBittorrentDhtUdpParser();
4✔
1828
    RegisterModbusParsers();
4✔
1829
    SCEnipRegisterParsers();
4✔
1830
    RegisterDNP3Parsers();
4✔
1831
    RegisterNFSTCPParsers();
4✔
1832
    RegisterNFSUDPParsers();
4✔
1833
    SCRegisterNtpParser();
4✔
1834
    RegisterTFTPParsers();
4✔
1835
    RegisterIKEParsers();
4✔
1836
    SCRegisterKrb5Parser();
4✔
1837
    SCRegisterDhcpParser();
4✔
1838
    SCRegisterSnmpParser();
4✔
1839
    SCRegisterSipParser();
4✔
1840
    SCRegisterQuicParser();
4✔
1841
    SCRegisterWebSocketParser();
4✔
1842
    SCRegisterLdapTcpParser();
4✔
1843
    SCRegisterLdapUdpParser();
4✔
1844
    SCRegisterMdnsParser();
4✔
1845
    SCRegisterTemplateParser();
4✔
1846
    SCRfbRegisterParser();
4✔
1847
    SCMqttRegisterParser();
4✔
1848
    SCRegisterPgsqlParser();
4✔
1849
    SCRegisterPop3Parser();
4✔
1850
    SCRegisterRdpParser();
4✔
1851
    RegisterHTTP2Parsers();
4✔
1852
    SCRegisterTelnetParser();
4✔
1853
    RegisterIMAPParsers();
4✔
1854

1855
    for (size_t i = 0; i < preregistered_callbacks_nb; i++) {
4✔
1856
        PreRegisteredCallbacks[i]();
×
1857
    }
×
1858

1859
    ValidateParsers();
4✔
1860
}
4✔
1861

1862
/* coccinelle: SCAppLayerParserStateSetFlag():2,2:APP_LAYER_PARSER_ */
1863
void SCAppLayerParserStateSetFlag(AppLayerParserState *pstate, uint16_t flag)
1864
{
52,470✔
1865
    SCEnter();
52,470✔
1866
    pstate->flags |= flag;
52,470✔
1867
    SCReturn;
52,470✔
1868
}
52,470✔
1869

1870
/* coccinelle: SCAppLayerParserStateIssetFlag():2,2:APP_LAYER_PARSER_ */
1871
uint16_t SCAppLayerParserStateIssetFlag(AppLayerParserState *pstate, uint16_t flag)
1872
{
3,132,746✔
1873
    SCEnter();
3,132,746✔
1874
    SCReturnUInt(pstate->flags & flag);
3,132,746✔
1875
}
3,132,746✔
1876

1877
/***** Unittests *****/
1878

1879
#ifdef UNITTESTS
1880
#include "util-unittest-helper.h"
1881

1882
void AppLayerParserRegisterProtocolUnittests(uint8_t ipproto, AppProto alproto,
1883
                                  void (*RegisterUnittests)(void))
1884
{
1885
    SCEnter();
1886
    alp_ctx.ctxs[alproto][FlowGetProtoMapping(ipproto)].RegisterUnittests = RegisterUnittests;
1887
    SCReturn;
1888
}
1889

1890
void AppLayerParserRegisterUnittests(void)
1891
{
1892
    SCEnter();
1893

1894
    int ip;
1895
    AppProto alproto;
1896
    AppLayerParserProtoCtx *ctx;
1897

1898
    for (ip = 0; ip < FLOW_PROTO_DEFAULT; ip++) {
1899
        for (alproto = 0; alproto < g_alproto_max; alproto++) {
1900
            ctx = &alp_ctx.ctxs[alproto][ip];
1901
            if (ctx->RegisterUnittests == NULL)
1902
                continue;
1903
            ctx->RegisterUnittests();
1904
        }
1905
    }
1906

1907
    SCReturn;
1908
}
1909

1910
#endif
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc