mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 14:48:21 +00:00

This will now be always on. As such, uses of the USE_INT64 preprocessor definition have been cleaned out.
255 lines
6.2 KiB
C++
255 lines
6.2 KiB
C++
// $Id: TCP_Endpoint.cc 6219 2008-10-01 05:39:07Z vern $
|
|
//
|
|
// See the file "COPYING" in the main distribution directory for copyright.
|
|
|
|
#include "Net.h"
|
|
#include "NetVar.h"
|
|
#include "TCP.h"
|
|
#include "TCP_Rewriter.h"
|
|
#include "TCP_Reassembler.h"
|
|
#include "Sessions.h"
|
|
#include "Event.h"
|
|
#include "File.h"
|
|
#include "Val.h"
|
|
|
|
TCP_Endpoint::TCP_Endpoint(TCP_Analyzer* arg_analyzer, int arg_is_orig)
|
|
{
|
|
contents_processor = 0;
|
|
prev_state = state = TCP_ENDPOINT_INACTIVE;
|
|
peer = 0;
|
|
start_time = last_time = 0.0;
|
|
start_seq = last_seq = ack_seq = 0;
|
|
last_seq_high = ack_seq_high = 0;
|
|
window = 0;
|
|
window_scale = 0;
|
|
window_seq = window_ack_seq = 0;
|
|
contents_start_seq = 0;
|
|
SYN_cnt = FIN_cnt = RST_cnt = 0;
|
|
did_close = 0;
|
|
contents_file = 0;
|
|
tcp_analyzer = arg_analyzer;
|
|
is_orig = arg_is_orig;
|
|
|
|
src_addr = is_orig ? tcp_analyzer->Conn()->RespAddr() :
|
|
tcp_analyzer->Conn()->OrigAddr();
|
|
dst_addr = is_orig ? tcp_analyzer->Conn()->OrigAddr() :
|
|
tcp_analyzer->Conn()->RespAddr();
|
|
|
|
#ifdef BROv6
|
|
checksum_base = ones_complement_checksum((void*) src_addr, 16, 0);
|
|
checksum_base = ones_complement_checksum((void*) dst_addr, 16, checksum_base);
|
|
#else
|
|
checksum_base = ones_complement_checksum((void*) src_addr, 4, 0);
|
|
checksum_base = ones_complement_checksum((void*) dst_addr, 4, checksum_base);
|
|
#endif
|
|
// Note, for IPv6, strictly speaking this field is 32 bits
|
|
// rather than 16 bits. But because the upper bits are all zero,
|
|
// we get the same checksum either way. The same applies to
|
|
// later when we add in the data length in ValidChecksum().
|
|
checksum_base += htons(IPPROTO_TCP);
|
|
}
|
|
|
|
TCP_Endpoint::~TCP_Endpoint()
|
|
{
|
|
delete contents_processor;
|
|
Unref(contents_file);
|
|
}
|
|
|
|
void TCP_Endpoint::Done()
|
|
{
|
|
if ( contents_processor )
|
|
contents_processor->Done();
|
|
}
|
|
|
|
void TCP_Endpoint::SetPeer(TCP_Endpoint* p)
|
|
{
|
|
peer = p;
|
|
if ( IsOrig() )
|
|
// Only one Endpoint adds the initial state to the counter.
|
|
sessions->tcp_stats.StateEntered(state, peer->state);
|
|
}
|
|
|
|
int TCP_Endpoint::HadGap() const
|
|
{
|
|
return contents_processor && contents_processor->HadGap();
|
|
}
|
|
|
|
void TCP_Endpoint::AddReassembler(TCP_Reassembler* arg_contents_processor)
|
|
{
|
|
if ( contents_processor != arg_contents_processor )
|
|
delete contents_processor;
|
|
contents_processor = arg_contents_processor;
|
|
|
|
if ( contents_file )
|
|
contents_processor->SetContentsFile(contents_file);
|
|
}
|
|
|
|
int TCP_Endpoint::DataPending() const
|
|
{
|
|
if ( contents_processor )
|
|
return contents_processor->DataPending();
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
int TCP_Endpoint::HasUndeliveredData() const
|
|
{
|
|
if ( contents_processor )
|
|
return contents_processor->HasUndeliveredData();
|
|
else
|
|
return 0;
|
|
}
|
|
|
|
void TCP_Endpoint::CheckEOF()
|
|
{
|
|
if ( contents_processor )
|
|
contents_processor->CheckEOF();
|
|
}
|
|
|
|
void TCP_Endpoint::SizeBufferedData(int& waiting_on_hole, int& waiting_on_ack)
|
|
{
|
|
if ( contents_processor )
|
|
contents_processor->SizeBufferedData(waiting_on_hole, waiting_on_ack);
|
|
else
|
|
waiting_on_hole = waiting_on_ack = 0;
|
|
}
|
|
|
|
int TCP_Endpoint::ValidChecksum(const struct tcphdr* tp, int len) const
|
|
{
|
|
uint32 sum = checksum_base;
|
|
int tcp_len = tp->th_off * 4 + len;
|
|
|
|
if ( len % 2 == 1 )
|
|
// Add in pad byte.
|
|
sum += htons(((const u_char*) tp)[tcp_len - 1] << 8);
|
|
|
|
sum += htons((unsigned short) tcp_len); // fill out pseudo header
|
|
sum = ones_complement_checksum((void*) tp, tcp_len, sum);
|
|
|
|
return sum == 0xffff;
|
|
}
|
|
|
|
static inline bool is_handshake(EndpointState state)
|
|
{
|
|
return state == TCP_ENDPOINT_INACTIVE ||
|
|
state == TCP_ENDPOINT_SYN_SENT ||
|
|
state == TCP_ENDPOINT_SYN_ACK_SENT;
|
|
}
|
|
|
|
void TCP_Endpoint::SetState(EndpointState new_state)
|
|
{
|
|
if ( new_state != state )
|
|
{
|
|
// Activate inactivity timer if this transition finishes the
|
|
// handshake.
|
|
if ( ! is_handshake(new_state) )
|
|
if ( is_handshake(state) && is_handshake(peer->state) )
|
|
tcp_analyzer->Conn()->SetInactivityTimeout(tcp_inactivity_timeout);
|
|
|
|
prev_state = state;
|
|
state = new_state;
|
|
if ( IsOrig() )
|
|
sessions->tcp_stats.ChangeState(prev_state, state,
|
|
peer->state, peer->state);
|
|
else
|
|
sessions->tcp_stats.ChangeState(peer->state, peer->state,
|
|
prev_state, state);
|
|
}
|
|
}
|
|
|
|
bro_int_t TCP_Endpoint::Size() const
|
|
{
|
|
bro_int_t size;
|
|
|
|
uint64 last_seq_64 = (uint64(last_seq_high) << 32) | last_seq;
|
|
uint64 ack_seq_64 = (uint64(ack_seq_high) << 32) | ack_seq;
|
|
if ( last_seq_64 > ack_seq_64 )
|
|
size = last_seq_64 - start_seq;
|
|
else
|
|
size = ack_seq_64 - start_seq;
|
|
|
|
// Don't include SYN octet in sequence space. For partial connections
|
|
// (no SYN seen), we're still careful to adjust start_seq as though
|
|
// there was an initial SYN octet, because if we don't then the
|
|
// packet reassembly code gets confused.
|
|
if ( size != 0 )
|
|
--size;
|
|
|
|
if ( FIN_cnt > 0 && size != 0 )
|
|
--size; // don't include FIN octet.
|
|
|
|
return size;
|
|
}
|
|
|
|
int TCP_Endpoint::DataSent(double t, int seq, int len, int caplen,
|
|
const u_char* data,
|
|
const IP_Hdr* ip, const struct tcphdr* tp)
|
|
{
|
|
int status = 0;
|
|
|
|
if ( contents_processor && caplen >= len )
|
|
status = contents_processor->DataSent(t, seq, len, data);
|
|
|
|
if ( caplen <= 0 )
|
|
return status;
|
|
|
|
if ( contents_file && ! contents_processor &&
|
|
seq + len > contents_start_seq )
|
|
{
|
|
int under_seq = contents_start_seq - seq;
|
|
if ( under_seq > 0 )
|
|
{
|
|
seq += under_seq;
|
|
data += under_seq;
|
|
len -= under_seq;
|
|
}
|
|
|
|
// DEBUG_MSG("%d: seek %d, data=%02x len=%d\n", IsOrig(), seq - contents_start_seq, *data, len);
|
|
FILE* f = contents_file->Seek(seq - contents_start_seq);
|
|
|
|
if ( fwrite(data, 1, len, f) < unsigned(len) )
|
|
// ### this should really generate an event
|
|
internal_error("contents write failed");
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
void TCP_Endpoint::AckReceived(int seq)
|
|
{
|
|
if ( contents_processor )
|
|
contents_processor->AckReceived(seq);
|
|
}
|
|
|
|
void TCP_Endpoint::SetContentsFile(BroFile* f)
|
|
{
|
|
Ref(f);
|
|
contents_file = f;
|
|
contents_start_seq = last_seq - start_seq;
|
|
|
|
if ( contents_start_seq == 0 )
|
|
contents_start_seq = 1; // skip SYN
|
|
|
|
if ( contents_processor )
|
|
contents_processor->SetContentsFile(contents_file);
|
|
}
|
|
|
|
int TCP_Endpoint::CheckHistory(uint32 mask, char code)
|
|
{
|
|
if ( ! IsOrig() )
|
|
{
|
|
mask <<= 16;
|
|
code = tolower(code);
|
|
}
|
|
|
|
return tcp_analyzer->Conn()->CheckHistory(mask, code);
|
|
}
|
|
|
|
void TCP_Endpoint::AddHistory(char code)
|
|
{
|
|
if ( ! IsOrig() )
|
|
code = tolower(code);
|
|
|
|
tcp_analyzer->Conn()->AddHistory(code);
|
|
}
|
|
|