htp: cleanup and fix test

pull/3370/head
Victor Julien 8 years ago
parent 08af5ddd88
commit 26b61bad90

@ -5864,13 +5864,8 @@ end:
/** \test Test really long request, this should result in HTTP_DECODER_EVENT_REQUEST_FIELD_TOO_LONG */
static int HTPParserTest14(void)
{
int result = 0;
Flow *f = NULL;
char *httpbuf = NULL;
size_t len = 18887;
TcpSession ssn;
HtpState *htp_state = NULL;
int r = 0;
char input[] = "\
%YAML 1.1\n\
---\n\
@ -5884,6 +5879,7 @@ libhtp:\n\
response-body-limit: 0\n\
";
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
FAIL_IF_NULL(alp_tctx);
memset(&ssn, 0, sizeof(ssn));
@ -5893,9 +5889,8 @@ libhtp:\n\
ConfYamlLoadString(input, strlen(input));
HTPConfigure();
httpbuf = SCMalloc(len);
if (unlikely(httpbuf == NULL))
goto end;
char *httpbuf = SCMalloc(len);
FAIL_IF_NULL(httpbuf);
memset(httpbuf, 0x00, len);
/* create the request with a longer than 18k cookie */
@ -5916,9 +5911,8 @@ libhtp:\n\
httpbuf[len - 2] = '\r';
httpbuf[len - 1] = '\n';
f = UTHBuildFlow(AF_INET, "1.2.3.4", "1.2.3.5", 1024, 80);
if (f == NULL)
goto end;
Flow *f = UTHBuildFlow(AF_INET, "1.2.3.4", "1.2.3.5", 1024, 80);
FAIL_IF_NULL(f);
f->protoctx = &ssn;
f->alproto = ALPROTO_HTTP;
f->proto = IPPROTO_TCP;
@ -5933,72 +5927,31 @@ libhtp:\n\
else if (u == (len - 1)) flags = STREAM_TOSERVER|STREAM_EOF;
else flags = STREAM_TOSERVER;
FLOWLOCK_WRLOCK(f);
r = AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, flags,
(void)AppLayerParserParse(NULL, alp_tctx, f, ALPROTO_HTTP, flags,
(uint8_t *)&httpbuf[u], 1);
if (u < 18294) { /* first 18294 bytes should result in 0 */
if (r != 0) {
printf("toserver chunk %" PRIu32 " returned %" PRId32 ", expected"
" 0: ", u, r);
FLOWLOCK_UNLOCK(f);
goto end;
}
} else if (u == 18294UL) { /* byte 18294 should result in error */
if (r != -1) {
printf("toserver chunk %" PRIu32 " returned %" PRId32 ", expected"
" -1: ", u, r);
FLOWLOCK_UNLOCK(f);
goto end;
}
/* break out, htp state is in error state now */
FLOWLOCK_UNLOCK(f);
break;
}
FLOWLOCK_UNLOCK(f);
}
htp_state = f->alstate;
if (htp_state == NULL) {
printf("no http state: ");
goto end;
}
HtpState *htp_state = f->alstate;
FAIL_IF_NULL(htp_state);
htp_tx_t *tx = HTPStateGetTx(htp_state, 0);
if (tx == NULL || tx->request_method_number != HTP_M_GET || tx->request_protocol_number != HTP_PROTOCOL_1_1)
{
printf("expected method M_GET and got %s: , expected protocol "
"HTTP/1.1 and got %s \n", bstr_util_strdup_to_c(tx->request_method),
bstr_util_strdup_to_c(tx->request_protocol));
goto end;
}
FAIL_IF_NULL(tx);
FAIL_IF(tx->request_method_number != HTP_M_GET);
FAIL_IF(tx->request_protocol_number != HTP_PROTOCOL_1_1);
FLOWLOCK_WRLOCK(f);
AppLayerDecoderEvents *decoder_events = AppLayerParserGetEventsByTx(IPPROTO_TCP, ALPROTO_HTTP,f->alstate, 0);
if (decoder_events == NULL) {
printf("no app events: ");
FLOWLOCK_UNLOCK(f);
goto end;
}
FLOWLOCK_UNLOCK(f);
FAIL_IF_NULL(decoder_events);
if (decoder_events->events[0] != HTTP_DECODER_EVENT_REQUEST_FIELD_TOO_LONG) {
printf("HTTP_DECODER_EVENT_REQUEST_FIELD_TOO_LONG not set: ");
goto end;
}
FAIL_IF(decoder_events->events[0] != HTTP_DECODER_EVENT_REQUEST_FIELD_TOO_LONG);
result = 1;
end:
if (alp_tctx != NULL)
AppLayerParserThreadCtxFree(alp_tctx);
AppLayerParserThreadCtxFree(alp_tctx);
StreamTcpFreeConfig(TRUE);
UTHFreeFlow(f);
if (httpbuf != NULL)
SCFree(httpbuf);
SCFree(httpbuf);
HTPFreeConfig();
ConfDeInit();
ConfRestoreContextBackup();
HtpConfigRestoreBackup();
return result;
PASS;
}
/** \test Test really long request (same as HTPParserTest14), now with config

Loading…
Cancel
Save