From 90827ea990b74ad13db5731a4e1b54172986f157 Mon Sep 17 00:00:00 2001 From: Anoop Saldanha Date: Sat, 19 Oct 2013 18:30:05 +0530 Subject: [PATCH] Remove the obsolete DetectFtpBounceMatch() function. --- src/detect-ftpbounce.c | 42 ------------------------------------------ 1 file changed, 42 deletions(-) diff --git a/src/detect-ftpbounce.c b/src/detect-ftpbounce.c index 1840ae9b07..ee1837aaca 100644 --- a/src/detect-ftpbounce.c +++ b/src/detect-ftpbounce.c @@ -191,48 +191,6 @@ int DetectFtpbounceALMatch(ThreadVars *t, DetectEngineThreadCtx *det_ctx, SCReturnInt(ret); } -/** - * \brief This function is used to match ftpbounce attacks - * - * \param t pointer to thread vars - * \param det_ctx pointer to the pattern matcher thread - * \param p pointer to the current packet - * \param m pointer to the sigmatch but we don't use it since ftpbounce - * has no options - * \retval 0 no match, 1 if match - */ -int DetectFtpbounceMatch(ThreadVars *t, DetectEngineThreadCtx *det_ctx, - Packet *p, Signature *s, SigMatch *m) -{ -/** \todo VJ broken and no longer used */ -#if 0 - SCEnter(); - uint16_t offset = 0; - if (!(PKT_IS_TCP(p))) - return 0; - - SigMatch *sm = SigMatchGetLastSMFromLists(s, 2, - DETECT_CONTENT, s->sm_lists_tail[DETECT_SM_LIST_PMATCH]); - if (sm == NULL) - return 0; - - DetectContentData *co = sm->ctx; - if (co == NULL) - return 0; - - MpmMatch *mm = det_ctx->mtc.match[co->id].top; - SCLogDebug("Starting Offset: %u",mm->offset + co->content_len); - - offset = mm->offset + co->content_len; - SCLogDebug("Payload: \"%s\"\nLen: %u Offset: %u\n", p->payload, - p->payload_len, offset); - - return DetectFtpbounceMatchArgs(p->payload, p->payload_len, - p->src.addr_data32[0], offset); -#endif - return 0; -} - /** * \brief this function is used to add the parsed ftpbounce *