/** Copyright (c) 2009 Open Information Security Foundation * * \author Breno Silva */ #ifndef __DETECT_DECODE_EVENT_H__ #define __DETECT_DECODE_EVENT_H__ typedef struct DetectDecodeEventData_ { u_int8_t event; } DetectDecodeEventData; /* prototypes */ void DetectDecodeEventRegister (void); /* suppoted decoder events */ struct DetectDecodeEvents_ { char *event_name; u_int8_t code; } DEvents[] = { "ipv4.pkt_too_small", IPV4_PKT_TOO_SMALL, "ipv4.hlen_too_small", IPV4_HLEN_TOO_SMALL, "ipv4.iplen_smaller_than_hlen", IPV4_IPLEN_SMALLER_THAN_HLEN, "ipv6.pkt_too_small", IPV6_PKT_TOO_SMALL, "ipv6.trunc_exthdr", IPV6_TRUNC_EXTHDR, "ipv6.exthdr_dupl_fh", IPV6_EXTHDR_DUPL_FH, "ipv6.exthdr_dupl_rh", IPV6_EXTHDR_DUPL_RH, "ipv6.exthdr_dupl_hh", IPV6_EXTHDR_DUPL_HH, "ipv6.exthdr_dupl_dh", IPV6_EXTHDR_DUPL_DH, "ipv6.exthdr_dupl_ah", IPV6_EXTHDR_DUPL_AH, "ipv6.exthdr_dupl_eh", IPV6_EXTHDR_DUPL_EH, "ipv6.exthdr_invalid_optlen", IPV6_EXTHDR_INVALID_OPTLEN, "tcp.pkt_too_small", TCP_PKT_TOO_SMALL, "tcp.hlen_too_small", TCP_HLEN_TOO_SMALL, "tcp.invalid_optlen", TCP_INVALID_OPTLEN, "tcp.opt_invalid_len", TCP_OPT_INVALID_LEN, "tcp.opt_duplicate", TCP_OPT_DUPLICATE, "udp.pkt_too_small", UDP_PKT_TOO_SMALL, "udp.hlen_too_small", UDP_HLEN_TOO_SMALL, "udp.hlen_invalid", UDP_HLEN_INVALID, "sll.pkt_too_small", SLL_PKT_TOO_SMALL, "ethernet.pkt_too_small", ETHERNET_PKT_TOO_SMALL, "ppp.pkt_too_small", PPP_PKT_TOO_SMALL, "ppp.ju_pkt_too_small", PPPVJU_PKT_TOO_SMALL, "ppp.ip4_pkt_too_small", PPPIPV4_PKT_TOO_SMALL, "ppp.ip6_pkt_too_small", PPPIPV6_PKT_TOO_SMALL, "ppp.wrong_type", PPP_WRONG_TYPE, NULL, 0 }; #endif /*__DETECT_DECODE_EVENT_H__ */