mirror of
https://github.com/zeek/zeek.git
synced 2025-10-10 10:38:20 +00:00
Merge remote-tracking branch 'origin/topic/vladg/sip'
* origin/topic/vladg/sip: Update NEWS. Update baselines. Spruce up SIP events.bif documentation a bit. Register SIP analyzer to well known port. Fix indenting issue in main.bro Add SIP btests. Small update for the SIP logs and DPD sig. SIP: Fix up DPD and the TCP analyzer a bit. SIP: Move to the new string BIFs SIP: Move to new analyzer format. Move the SIP analyzer to uint64 sequences, and a number of other small SIP fixes. Rely on content inspection and not just is_orig to determine client/server. Enable SIP in CMakeLists.txt Merge topic/seth/faf-updates. BIT-1370 #merged
This commit is contained in:
commit
5b32791edb
30 changed files with 1355 additions and 364 deletions
68
src/analyzer/protocol/sip/SIP_TCP.cc
Normal file
68
src/analyzer/protocol/sip/SIP_TCP.cc
Normal file
|
@ -0,0 +1,68 @@
|
|||
// See the file "COPYING" in the main distribution directory for copyright.
|
||||
//
|
||||
// TODO: This is preliminary code that's not yet functional and not
|
||||
// activated. We don't yet support SIP-over-TCP.
|
||||
|
||||
#include "SIP_TCP.h"
|
||||
#include "analyzer/protocol/tcp/TCP_Reassembler.h"
|
||||
#include "events.bif.h"
|
||||
|
||||
using namespace analyzer::sip_tcp;
|
||||
|
||||
SIP_Analyzer::SIP_Analyzer(Connection* conn)
|
||||
: tcp::TCP_ApplicationAnalyzer("SIP_TCP", conn)
|
||||
{
|
||||
interp = new binpac::SIP_TCP::SIP_Conn(this);
|
||||
had_gap = false;
|
||||
}
|
||||
|
||||
SIP_Analyzer::~SIP_Analyzer()
|
||||
{
|
||||
delete interp;
|
||||
}
|
||||
|
||||
void SIP_Analyzer::Done()
|
||||
{
|
||||
tcp::TCP_ApplicationAnalyzer::Done();
|
||||
|
||||
interp->FlowEOF(true);
|
||||
interp->FlowEOF(false);
|
||||
}
|
||||
|
||||
void SIP_Analyzer::EndpointEOF(bool is_orig)
|
||||
{
|
||||
tcp::TCP_ApplicationAnalyzer::EndpointEOF(is_orig);
|
||||
interp->FlowEOF(is_orig);
|
||||
}
|
||||
|
||||
void SIP_Analyzer::DeliverStream(int len, const u_char* data, bool orig)
|
||||
{
|
||||
tcp::TCP_ApplicationAnalyzer::DeliverStream(len, data, orig);
|
||||
|
||||
assert(TCP());
|
||||
if ( TCP()->IsPartial() )
|
||||
return;
|
||||
|
||||
if ( had_gap )
|
||||
// If only one side had a content gap, we could still try to
|
||||
// deliver data to the other side if the script layer can
|
||||
// handle this.
|
||||
return;
|
||||
|
||||
try
|
||||
{
|
||||
interp->NewData(orig, data, data + len);
|
||||
}
|
||||
catch ( const binpac::Exception& e )
|
||||
{
|
||||
printf("BinPAC Exception: %s\n", e.c_msg());
|
||||
ProtocolViolation(e.c_msg());
|
||||
}
|
||||
}
|
||||
|
||||
void SIP_Analyzer::Undelivered(uint64 seq, int len, bool orig)
|
||||
{
|
||||
tcp::TCP_ApplicationAnalyzer::Undelivered(seq, len, orig);
|
||||
had_gap = true;
|
||||
interp->NewGap(orig, len);
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue