Go to the documentation of this file.
71 Flow *f,
const uint8_t flow_flags,
72 void *txv,
const int list_id);
75 static bool DetectTlsJa3HashValidateCallback(
const Signature *s,
76 const char **sigerror);
77 static int g_tls_ja3_hash_buffer_id = 0;
113 DetectTlsJa3HashSetupCallback);
116 DetectTlsJa3HashValidateCallback);
140 SCLogError(
"rule contains conflicting protocols.");
161 const uint8_t flow_flags,
void *txv,
const int list_id)
181 static bool DetectTlsJa3HashValidateCallback(
const Signature *s,
182 const char **sigerror)
188 for (; sm != NULL; sm = sm->
next) {
195 *sigerror =
"ja3.hash should not be used together with "
196 "nocase, since the rule is automatically "
197 "lowercased anyway which makes nocase redundant.";
204 *sigerror =
"Invalid length of the specified JA3 hash (should "
205 "be 32 characters long). This rule will therefore "
221 for (; sm != NULL; sm = sm->
next) {
227 bool changed =
false;
#define DETECT_CONTENT_NOCASE
SSLv[2.0|3.[0|1|2|3]] state structure.
void DetectTlsJa3HashRegister(void)
Registration function for keyword: ja3_hash.
#define SIGMATCH_INFO_STICKY_BUFFER
SigTableElmt * sigmatch_table
uint8_t DetectEngineInspectBufferGeneric(DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx, const DetectEngineAppInspectionEngine *engine, const Signature *s, Flow *f, uint8_t flags, void *alstate, void *txv, uint64_t tx_id)
Do the content inspection & validation for a signature.
SSLStateConnp client_connp
int DetectBufferSetActiveList(DetectEngineCtx *de_ctx, Signature *s, const int list)
void DetectBufferTypeRegisterSetupCallback(const char *name, void(*SetupCallback)(const DetectEngineCtx *, Signature *))
main detection engine ctx
int(* Setup)(DetectEngineCtx *, Signature *, const char *)
InspectionBuffer * InspectionBufferGet(DetectEngineThreadCtx *det_ctx, const int list_id)
int DetectBufferTypeGetByName(const char *name)
int Ja3IsDisabled(const char *type)
#define SIG_FLAG_TOSERVER
void DetectBufferTypeRegisterValidateCallback(const char *name, bool(*ValidateCallback)(const Signature *, const char **sigerror))
int PrefilterGenericMpmRegister(DetectEngineCtx *de_ctx, SigGroupHead *sgh, MpmCtx *mpm_ctx, const DetectBufferMpmRegistry *mpm_reg, int list_id)
#define SCLogWarning(...)
Macro used to log WARNING messages.
void DetectAppLayerMpmRegister(const char *name, int direction, int priority, PrefilterRegisterFunc PrefilterRegister, InspectionBufferGetDataPtr GetData, AppProto alproto, int tx_min_progress)
register an app layer keyword for mpm
void SSLEnableJA3(void)
if not explicitly disabled in config, enable ja3 support
SignatureInitData * init_data
int RunmodeIsUnittests(void)
bool SigMatchSilentErrorEnabled(const DetectEngineCtx *de_ctx, const enum DetectKeywordId id)
void InspectionBufferApplyTransforms(InspectionBuffer *buffer, const DetectEngineTransforms *transforms)
SignatureInitDataBuffer * buffers
#define SCLogError(...)
Macro used to log ERROR messages.
void InspectionBufferSetup(DetectEngineThreadCtx *det_ctx, const int list_id, InspectionBuffer *buffer, const uint8_t *data, const uint32_t data_len)
setup the buffer with our initial data
a single match condition for a signature
void DetectAppLayerInspectEngineRegister(const char *name, AppProto alproto, uint32_t dir, int progress, InspectEngineFuncPtr Callback, InspectionBufferGetDataPtr GetData)
Registers an app inspection engine.
SpmGlobalThreadCtx * spm_global_thread_ctx
void DetectBufferTypeSetDescriptionByName(const char *name, const char *desc)
void SpmDestroyCtx(SpmCtx *ctx)
SpmCtx * SpmInitCtx(const uint8_t *needle, uint16_t needle_len, int nocase, SpmGlobalThreadCtx *global_thread_ctx)