mirror of https://github.com/OISF/suricata
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
631 lines
18 KiB
C
631 lines
18 KiB
C
/* Copyright (C) 2017-2020 Open Information Security Foundation
|
|
*
|
|
* You can copy, redistribute or modify this Program under the terms of
|
|
* the GNU General Public License version 2 as published by the Free
|
|
* Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* version 2 along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
* 02110-1301, USA.
|
|
*/
|
|
|
|
/**
|
|
* \file
|
|
*
|
|
* \author Victor Julien <victor@inliniac.net>
|
|
*/
|
|
|
|
#include "suricata-common.h"
|
|
#include "threads.h"
|
|
#include "debug.h"
|
|
#include "decode.h"
|
|
#include "detect.h"
|
|
|
|
#include "detect-parse.h"
|
|
#include "detect-engine.h"
|
|
#include "detect-engine-mpm.h"
|
|
#include "detect-content.h"
|
|
#include "detect-pcre.h"
|
|
#include "detect-nfs-procedure.h"
|
|
|
|
#include "app-layer-parser.h"
|
|
|
|
#include "flow.h"
|
|
#include "flow-util.h"
|
|
#include "flow-var.h"
|
|
|
|
#include "util-unittest.h"
|
|
#include "util-unittest-helper.h"
|
|
#include "util-byte.h"
|
|
|
|
#include "app-layer-nfs-tcp.h"
|
|
#include "rust.h"
|
|
|
|
/**
|
|
* [nfs_procedure]:[<|>]<proc>[<><proc>];
|
|
*/
|
|
#define PARSE_REGEX "^\\s*(<=|>=|<|>)?\\s*([0-9]+)\\s*(?:(<>)\\s*([0-9]+))?\\s*$"
|
|
static DetectParseRegex parse_regex;
|
|
|
|
enum DetectNfsProcedureMode {
|
|
PROCEDURE_EQ = 1, /* equal */
|
|
PROCEDURE_LT, /* less than */
|
|
PROCEDURE_LE, /* less than */
|
|
PROCEDURE_GT, /* greater than */
|
|
PROCEDURE_GE, /* greater than */
|
|
PROCEDURE_RA, /* range */
|
|
};
|
|
|
|
typedef struct DetectNfsProcedureData_ {
|
|
uint32_t lo;
|
|
uint32_t hi;
|
|
enum DetectNfsProcedureMode mode;
|
|
} DetectNfsProcedureData;
|
|
|
|
static DetectNfsProcedureData *DetectNfsProcedureParse (const char *);
|
|
static int DetectNfsProcedureSetup (DetectEngineCtx *, Signature *s, const char *str);
|
|
static void DetectNfsProcedureFree(DetectEngineCtx *, void *);
|
|
#ifdef UNITTESTS
|
|
static void DetectNfsProcedureRegisterTests(void);
|
|
#endif
|
|
static int g_nfs_request_buffer_id = 0;
|
|
|
|
static int DetectEngineInspectNfsRequestGeneric(DetectEngineCtx *de_ctx,
|
|
DetectEngineThreadCtx *det_ctx, const struct DetectEngineAppInspectionEngine_ *engine,
|
|
const Signature *s, Flow *f, uint8_t flags, void *alstate, void *txv, uint64_t tx_id);
|
|
|
|
static int DetectNfsProcedureMatch (DetectEngineThreadCtx *, Flow *,
|
|
uint8_t, void *, void *, const Signature *,
|
|
const SigMatchCtx *);
|
|
|
|
/**
|
|
* \brief Registration function for nfs_procedure keyword.
|
|
*/
|
|
void DetectNfsProcedureRegister (void)
|
|
{
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].name = "nfs_procedure";
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].desc = "match NFS procedure";
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].url = "/rules/nfs-keywords.html#procedure";
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].Match = NULL;
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].AppLayerTxMatch = DetectNfsProcedureMatch;
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].Setup = DetectNfsProcedureSetup;
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].Free = DetectNfsProcedureFree;
|
|
#ifdef UNITTESTS
|
|
sigmatch_table[DETECT_AL_NFS_PROCEDURE].RegisterTests = DetectNfsProcedureRegisterTests;
|
|
#endif
|
|
|
|
DetectSetupParseRegexes(PARSE_REGEX, &parse_regex);
|
|
|
|
DetectAppLayerInspectEngineRegister2("nfs_request", ALPROTO_NFS, SIG_FLAG_TOSERVER, 0,
|
|
DetectEngineInspectNfsRequestGeneric, NULL);
|
|
|
|
g_nfs_request_buffer_id = DetectBufferTypeGetByName("nfs_request");
|
|
|
|
SCLogDebug("g_nfs_request_buffer_id %d", g_nfs_request_buffer_id);
|
|
}
|
|
|
|
static int DetectEngineInspectNfsRequestGeneric(DetectEngineCtx *de_ctx,
|
|
DetectEngineThreadCtx *det_ctx, const struct DetectEngineAppInspectionEngine_ *engine,
|
|
const Signature *s, Flow *f, uint8_t flags, void *alstate, void *txv, uint64_t tx_id)
|
|
{
|
|
return DetectEngineInspectGenericList(
|
|
de_ctx, det_ctx, s, engine->smd, f, flags, alstate, txv, tx_id);
|
|
}
|
|
|
|
static inline int
|
|
ProcedureMatch(const uint32_t procedure,
|
|
enum DetectNfsProcedureMode mode, uint32_t lo, uint32_t hi)
|
|
{
|
|
switch (mode) {
|
|
case PROCEDURE_EQ:
|
|
if (procedure == lo)
|
|
SCReturnInt(1);
|
|
break;
|
|
case PROCEDURE_LT:
|
|
if (procedure < lo)
|
|
SCReturnInt(1);
|
|
break;
|
|
case PROCEDURE_LE:
|
|
if (procedure <= lo)
|
|
SCReturnInt(1);
|
|
break;
|
|
case PROCEDURE_GT:
|
|
if (procedure > lo)
|
|
SCReturnInt(1);
|
|
break;
|
|
case PROCEDURE_GE:
|
|
if (procedure >= lo)
|
|
SCReturnInt(1);
|
|
break;
|
|
case PROCEDURE_RA:
|
|
if (procedure >= lo && procedure <= hi)
|
|
SCReturnInt(1);
|
|
break;
|
|
}
|
|
SCReturnInt(0);
|
|
}
|
|
|
|
/**
|
|
* \internal
|
|
* \brief Function to match procedure of a TX
|
|
*
|
|
* For 'file txs'
|
|
*
|
|
* \param t Pointer to thread vars.
|
|
* \param det_ctx Pointer to the pattern matcher thread.
|
|
* \param f Pointer to the current flow.
|
|
* \param flags Flags.
|
|
* \param state App layer state.
|
|
* \param s Pointer to the Signature.
|
|
* \param m Pointer to the sigmatch that we will cast into
|
|
* DetectNfsProcedureData.
|
|
*
|
|
* \retval 0 no match.
|
|
* \retval 1 match.
|
|
*/
|
|
static int DetectNfsProcedureMatch (DetectEngineThreadCtx *det_ctx,
|
|
Flow *f, uint8_t flags, void *state,
|
|
void *txv, const Signature *s,
|
|
const SigMatchCtx *ctx)
|
|
{
|
|
SCEnter();
|
|
|
|
const DetectNfsProcedureData *dd = (const DetectNfsProcedureData *)ctx;
|
|
uint16_t i;
|
|
for (i = 0; i < 256; i++) {
|
|
uint32_t procedure;
|
|
if (rs_nfs_tx_get_procedures(txv, i, &procedure) == 1) {
|
|
SCLogDebug("proc %u mode %u lo %u hi %u",
|
|
procedure, dd->mode, dd->lo, dd->hi);
|
|
if (ProcedureMatch(procedure, dd->mode, dd->lo, dd->hi))
|
|
SCReturnInt(1);
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
SCReturnInt(0);
|
|
}
|
|
|
|
/**
|
|
* \internal
|
|
* \brief Function to parse options passed via tls validity keywords.
|
|
*
|
|
* \param rawstr Pointer to the user provided options.
|
|
*
|
|
* \retval dd pointer to DetectNfsProcedureData on success.
|
|
* \retval NULL on failure.
|
|
*/
|
|
static DetectNfsProcedureData *DetectNfsProcedureParse (const char *rawstr)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
int ret = 0, res = 0;
|
|
int ov[MAX_SUBSTRINGS];
|
|
char mode[2] = "";
|
|
char value1[20] = "";
|
|
char value2[20] = "";
|
|
char range[3] = "";
|
|
|
|
ret = DetectParsePcreExec(&parse_regex, rawstr, 0, 0, ov, MAX_SUBSTRINGS);
|
|
if (ret < 3 || ret > 5) {
|
|
SCLogError(SC_ERR_PCRE_MATCH, "Parse error %s", rawstr);
|
|
goto error;
|
|
}
|
|
|
|
res = pcre_copy_substring((char *)rawstr, ov, MAX_SUBSTRINGS, 1, mode,
|
|
sizeof(mode));
|
|
if (res < 0) {
|
|
SCLogError(SC_ERR_PCRE_GET_SUBSTRING, "pcre_copy_substring failed");
|
|
goto error;
|
|
}
|
|
SCLogDebug("mode \"%s\"", mode);
|
|
|
|
res = pcre_copy_substring((char *)rawstr, ov, MAX_SUBSTRINGS, 2, value1,
|
|
sizeof(value1));
|
|
if (res < 0) {
|
|
SCLogError(SC_ERR_PCRE_GET_SUBSTRING, "pcre_copy_substring failed");
|
|
goto error;
|
|
}
|
|
SCLogDebug("value1 \"%s\"", value1);
|
|
|
|
if (ret > 3) {
|
|
res = pcre_copy_substring((char *)rawstr, ov, MAX_SUBSTRINGS, 3,
|
|
range, sizeof(range));
|
|
if (res < 0) {
|
|
SCLogError(SC_ERR_PCRE_GET_SUBSTRING, "pcre_copy_substring failed");
|
|
goto error;
|
|
}
|
|
SCLogDebug("range \"%s\"", range);
|
|
|
|
if (ret > 4) {
|
|
res = pcre_copy_substring((char *)rawstr, ov, MAX_SUBSTRINGS, 4,
|
|
value2, sizeof(value2));
|
|
if (res < 0) {
|
|
SCLogError(SC_ERR_PCRE_GET_SUBSTRING,
|
|
"pcre_copy_substring failed");
|
|
goto error;
|
|
}
|
|
SCLogDebug("value2 \"%s\"", value2);
|
|
}
|
|
}
|
|
|
|
dd = SCCalloc(1, sizeof(DetectNfsProcedureData));
|
|
if (unlikely(dd == NULL))
|
|
goto error;
|
|
|
|
if (strlen(mode) == 1) {
|
|
if (mode[0] == '<')
|
|
dd->mode = PROCEDURE_LT;
|
|
else if (mode[0] == '>')
|
|
dd->mode = PROCEDURE_GT;
|
|
} else if (strlen(mode) == 2) {
|
|
if (strcmp(mode, "<=") == 0)
|
|
dd->mode = PROCEDURE_LE;
|
|
if (strcmp(mode, ">=") == 0)
|
|
dd->mode = PROCEDURE_GE;
|
|
}
|
|
|
|
if (strlen(range) > 0) {
|
|
if (strcmp("<>", range) == 0)
|
|
dd->mode = PROCEDURE_RA;
|
|
}
|
|
|
|
if (strlen(range) != 0 && strlen(mode) != 0) {
|
|
SCLogError(SC_ERR_INVALID_ARGUMENT,
|
|
"Range specified but mode also set");
|
|
goto error;
|
|
}
|
|
|
|
if (dd->mode == 0) {
|
|
dd->mode = PROCEDURE_EQ;
|
|
}
|
|
|
|
/* set the first value */
|
|
if (StringParseUint32(&dd->lo, 10, 0, (const char *)value1) < 0) {
|
|
SCLogError(SC_ERR_INVALID_ARGUMENT, "Invalid first value: \"%s\"", value1);
|
|
goto error;
|
|
}
|
|
/* set the second value if specified */
|
|
if (strlen(value2) > 0) {
|
|
if (!(dd->mode == PROCEDURE_RA)) {
|
|
SCLogError(SC_ERR_INVALID_ARGUMENT,
|
|
"Multiple tls validity values specified but mode is not range");
|
|
goto error;
|
|
}
|
|
|
|
if (StringParseUint32(&dd->hi, 10, 0, (const char *)value2) < 0) {
|
|
SCLogError(SC_ERR_INVALID_ARGUMENT, "Invalid second value: \"%s\"", value2);
|
|
goto error;
|
|
}
|
|
|
|
if (dd->hi <= dd->lo) {
|
|
SCLogError(SC_ERR_INVALID_ARGUMENT,
|
|
"Second value in range must not be smaller than the first");
|
|
goto error;
|
|
}
|
|
}
|
|
return dd;
|
|
|
|
error:
|
|
if (dd)
|
|
SCFree(dd);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
* \brief Function to add the parsed tls validity field into the current signature.
|
|
*
|
|
* \param de_ctx Pointer to the Detection Engine Context.
|
|
* \param s Pointer to the Current Signature.
|
|
* \param rawstr Pointer to the user provided flags options.
|
|
* \param type Defines if this is notBefore or notAfter.
|
|
*
|
|
* \retval 0 on Success.
|
|
* \retval -1 on Failure.
|
|
*/
|
|
static int DetectNfsProcedureSetup (DetectEngineCtx *de_ctx, Signature *s,
|
|
const char *rawstr)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
SigMatch *sm = NULL;
|
|
|
|
SCLogDebug("\'%s\'", rawstr);
|
|
|
|
if (DetectSignatureSetAppProto(s, ALPROTO_NFS) != 0)
|
|
return -1;
|
|
|
|
dd = DetectNfsProcedureParse(rawstr);
|
|
if (dd == NULL) {
|
|
SCLogError(SC_ERR_INVALID_ARGUMENT,"Parsing \'%s\' failed", rawstr);
|
|
goto error;
|
|
}
|
|
|
|
/* okay so far so good, lets get this into a SigMatch
|
|
* and put it in the Signature. */
|
|
sm = SigMatchAlloc();
|
|
if (sm == NULL)
|
|
goto error;
|
|
|
|
sm->type = DETECT_AL_NFS_PROCEDURE;
|
|
sm->ctx = (void *)dd;
|
|
|
|
SCLogDebug("low %u hi %u", dd->lo, dd->hi);
|
|
SigMatchAppendSMToList(s, sm, g_nfs_request_buffer_id);
|
|
return 0;
|
|
|
|
error:
|
|
DetectNfsProcedureFree(de_ctx, dd);
|
|
return -1;
|
|
}
|
|
|
|
/**
|
|
* \internal
|
|
* \brief Function to free memory associated with DetectNfsProcedureData.
|
|
*
|
|
* \param de_ptr Pointer to DetectNfsProcedureData.
|
|
*/
|
|
void DetectNfsProcedureFree(DetectEngineCtx *de_ctx, void *ptr)
|
|
{
|
|
SCFree(ptr);
|
|
}
|
|
|
|
#ifdef UNITTESTS
|
|
|
|
/**
|
|
* \test This is a test for a valid value 1430000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse01 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("1430000000");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1430000000 && dd->mode == PROCEDURE_EQ);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a valid value >1430000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse02 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse(">1430000000");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1430000000 && dd->mode == PROCEDURE_GT);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a valid value <1430000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse03 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("<1430000000");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1430000000 && dd->mode == PROCEDURE_LT);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a valid value 1430000000<>1470000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse04 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("1430000000<>1470000000");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1430000000 && dd->hi == 1470000000 &&
|
|
dd->mode == PROCEDURE_RA);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a invalid value A.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse05 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("A");
|
|
FAIL_IF_NOT_NULL(dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a invalid value >1430000000<>1470000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse06 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse(">1430000000<>1470000000");
|
|
FAIL_IF_NOT_NULL(dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a invalid value 1430000000<>.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse07 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("1430000000<>");
|
|
FAIL_IF_NOT_NULL(dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a invalid value <>1430000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse08 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("<>1430000000");
|
|
FAIL_IF_NOT_NULL(dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a invalid value "".
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse09 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("");
|
|
FAIL_IF_NOT_NULL(dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a invalid value " ".
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse10 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse(" ");
|
|
FAIL_IF_NOT_NULL(dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a invalid value 1490000000<>1430000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse11 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("1490000000<>1430000000");
|
|
FAIL_IF_NOT_NULL(dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a valid value 1430000000 <> 1490000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse12 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("1430000000 <> 1490000000");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1430000000 && dd->hi == 1490000000 &&
|
|
dd->mode == PROCEDURE_RA);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a valid value > 1430000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse13 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("> 1430000000 ");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1430000000 && dd->mode == PROCEDURE_GT);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a valid value < 1490000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse14 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse("< 1490000000 ");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1490000000 && dd->mode == PROCEDURE_LT);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \test This is a test for a valid value 1490000000.
|
|
*
|
|
* \retval 1 on success.
|
|
* \retval 0 on failure.
|
|
*/
|
|
static int ValidityTestParse15 (void)
|
|
{
|
|
DetectNfsProcedureData *dd = NULL;
|
|
dd = DetectNfsProcedureParse(" 1490000000 ");
|
|
FAIL_IF_NULL(dd);
|
|
FAIL_IF_NOT(dd->lo == 1490000000 && dd->mode == PROCEDURE_EQ);
|
|
DetectNfsProcedureFree(NULL, dd);
|
|
PASS;
|
|
}
|
|
|
|
/**
|
|
* \brief Register unit tests for nfs_procedure.
|
|
*/
|
|
void DetectNfsProcedureRegisterTests(void)
|
|
{
|
|
UtRegisterTest("ValidityTestParse01", ValidityTestParse01);
|
|
UtRegisterTest("ValidityTestParse02", ValidityTestParse02);
|
|
UtRegisterTest("ValidityTestParse03", ValidityTestParse03);
|
|
UtRegisterTest("ValidityTestParse04", ValidityTestParse04);
|
|
UtRegisterTest("ValidityTestParse05", ValidityTestParse05);
|
|
UtRegisterTest("ValidityTestParse06", ValidityTestParse06);
|
|
UtRegisterTest("ValidityTestParse07", ValidityTestParse07);
|
|
UtRegisterTest("ValidityTestParse08", ValidityTestParse08);
|
|
UtRegisterTest("ValidityTestParse09", ValidityTestParse09);
|
|
UtRegisterTest("ValidityTestParse10", ValidityTestParse10);
|
|
UtRegisterTest("ValidityTestParse11", ValidityTestParse11);
|
|
UtRegisterTest("ValidityTestParse12", ValidityTestParse12);
|
|
UtRegisterTest("ValidityTestParse13", ValidityTestParse13);
|
|
UtRegisterTest("ValidityTestParse14", ValidityTestParse14);
|
|
UtRegisterTest("ValidityTestParse15", ValidityTestParse15);
|
|
}
|
|
#endif /* UNITTESTS */
|