#include "Maat_rule.h" #include "stream_fuzzy_hash.h" #include "Maat_command.h" #include #include #include #include //inet_addr #include //inet_addr #include //inet_addr #include #include //fstat #include #include #include #include #include //fstat #include //fstat #include #include #include #include #include const char* test_maat_redis_ip="127.0.0.1"; unsigned short test_maat_redis_port=6379; const char* json_path="./maat_json.json"; const char* ful_cfg_dir="./rule/full/index/"; const char* inc_cfg_dir="./rule/inc/index/"; #define WAIT_FOR_EFFECTIVE_US 1*1000*1000 extern int my_scandir(const char *dir, struct dirent ***namelist, int(*filter)(const struct dirent *), int(*compar)(const void *, const void *)); extern char* md5_file(const char* filename, char* md5string); extern int system_cmd_cp(const char* src_file,const char*dst_file); Maat_feather_t g_feather=NULL; void *g_logger=NULL; int g_iThreadNum=4; const char* table_info_path="./table_info.conf"; int scan_interval_ms=500; int effective_interval_ms=0; void wait_for_cmd_effective(Maat_feather_t feather, long long version_before) { long long version_after=version_before; int is_updating=1; while(is_updating||version_before==version_after) { Maat_read_state(feather,MAAT_STATE_IN_UPDATING, &is_updating, sizeof(is_updating)); Maat_read_state(feather,MAAT_STATE_VERSION, &version_after, sizeof(version_after)); usleep(1000*100);//waiting for commands go into effect } } void scan_with_old_or_new_cfg(Maat_feather_t feather, int hit_old) { const char* hit_old_data="Hello world! I'm eve."; const char* hit_new_data="Maat was borned in MESA."; const char* table_name="HTTP_URL"; scan_status_t mid=NULL; int table_id=0, ret=0; struct Maat_rule_t result; table_id=Maat_table_register(feather,table_name); ASSERT_GT(table_id, 0); memset(&result, 0, sizeof(result)); ret=Maat_full_scan_string(feather, table_id,CHARSET_GBK, hit_old_data, strlen(hit_old_data), &result,NULL, 1, &mid, 0); if(hit_old) { EXPECT_EQ(ret, 1); EXPECT_TRUE(result.config_id==1); } else { EXPECT_EQ(ret, 0); } Maat_clean_status(&mid); memset(&result, 0, sizeof(result)); ret=Maat_full_scan_string(feather, table_id,CHARSET_GBK, hit_new_data, strlen(hit_new_data), &result,NULL, 1, &mid, 0); if(!hit_old) { EXPECT_EQ(ret, 1); EXPECT_TRUE(result.config_id==2); } else { EXPECT_EQ(ret, 0); } Maat_clean_status(&mid); } const char* watched_json="./json_update/maat.json"; const char* old_json="./json_update/old.json"; const char* new_json="./json_update/new.json"; const char* corrupted_json="./json_update/corrupted.json"; class JSONUpdate : public testing::Test { protected: static void SetUpTestCase() { system_cmd_cp(old_json, watched_json); _shared_feather_j=Maat_feather(g_iThreadNum, table_info_path, g_logger); Maat_set_feather_opt(_shared_feather_j, MAAT_OPT_JSON_FILE_PATH, watched_json, strlen(watched_json)+1); Maat_set_feather_opt(_shared_feather_j, MAAT_OPT_SCANDIR_INTERVAL_MS,&scan_interval_ms, sizeof(scan_interval_ms)); Maat_initiate_feather(_shared_feather_j); } static void TearDownTestCase() { Maat_burn_feather(_shared_feather_j); } // Some expensive resource shared by all tests. static Maat_feather_t _shared_feather_j; static void *logger; }; Maat_feather_t JSONUpdate::_shared_feather_j; TEST_F(JSONUpdate, OldCfg) { scan_with_old_or_new_cfg(JSONUpdate::_shared_feather_j, 1); } TEST_F(JSONUpdate, NewCfg) { system_cmd_cp(corrupted_json, watched_json); sleep(2); scan_with_old_or_new_cfg(JSONUpdate::_shared_feather_j, 1); system_cmd_cp(new_json, watched_json); sleep(2); scan_with_old_or_new_cfg(JSONUpdate::_shared_feather_j, 0); } void Maat_read_entry_start_cb(int update_type,void* u_para) { return; } void Maat_read_entry_cb(int table_id,const char* table_line,void* u_para) { char ip_str[16]={0}; int entry_id=-1,seq=-1; unsigned int ip_uint=0; int is_valid=0; unsigned int local_ip_nr=16820416;//192.168.0.1 sscanf(table_line,"%d\t%s\t%d\t%d",&seq,ip_str,&entry_id,&is_valid); inet_pton(AF_INET,ip_str,&ip_uint); if(local_ip_nr==ip_uint) { if(is_valid==1) { //printf("Load entry id %d success.\n",entry_id); EXPECT_EQ(entry_id, 101); } else { //printf("Offload entry id %d success.\n",entry_id); } } return; } void Maat_read_entry_finish_cb(void* u_para) { Maat_feather_t feather=u_para; long long version=0; int ret=0,is_last_updating_table=0; ret=Maat_read_state(feather,MAAT_STATE_VERSION, &version, sizeof(version)); EXPECT_EQ(ret, 0); ret=Maat_read_state(feather,MAAT_STATE_LAST_UPDATING_TABLE, &is_last_updating_table, sizeof(is_last_updating_table)); EXPECT_EQ(ret, 0); //printf("Maat Version %lld at plugin finish callback, is_last_update=%d.\n",version,is_last_updating_table); return; } void test_plugin_table(Maat_feather_t feather,const char* table_name, Maat_start_callback_t *start,Maat_update_callback_t *update,Maat_finish_callback_t *finish, void *u_para, void* logger) { int table_id=0,ret=0; table_id=Maat_table_register(feather,table_name); ASSERT_GT(table_id, 0); ret=Maat_table_callback_register(feather, table_id, start, update, finish, u_para); ASSERT_GT(ret, 0); } TEST(PluginTable, Callback) { test_plugin_table(g_feather, "QD_ENTRY_INFO", Maat_read_entry_start_cb, Maat_read_entry_cb, Maat_read_entry_finish_cb, g_feather, g_logger); } TEST(StringScan, Full) { int ret=0; int table_id=0; struct Maat_rule_t result[4]; int found_pos[4]; const char* table_name="HTTP_URL"; scan_status_t mid=NULL; const char* scan_data="http://www.cyberessays.com/search_results.php?action=search&query=yulingjing,abckkk,1234567"; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, scan_data, strlen(scan_data), result,found_pos, 4, &mid, 0); EXPECT_GE(ret, 1); Maat_clean_status(&mid); } TEST(StringScan, Regex) { int ret=0; int table_id=0; struct Maat_rule_t result[4]; int found_pos[4]; const char* table_name="HTTP_URL"; scan_status_t mid=NULL; const char* cookie="Cookie: Txa123aheadBCAxd"; const char* sni_should_not_hit[]={"instagram.fbcdn.net","a.instagram.fbcdn.net"}; const char* sni_should_hit[]={"xx.fbcdn.net","ainstagram.fbcdn.net"}; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); ret=Maat_full_scan_string(g_feather, table_id, CHARSET_GBK, cookie, strlen(cookie), result,found_pos, 4, &mid, 0); EXPECT_GE(ret, 1); EXPECT_EQ(result[0].config_id, 146); Maat_clean_status(&mid); size_t i=0; for(i=0; i< sizeof(sni_should_not_hit)/sizeof(const char*); i++) { ret=Maat_full_scan_string(g_feather, table_id, CHARSET_GBK, sni_should_not_hit[i], strlen(sni_should_not_hit[i]), result,found_pos, 4, &mid, 0); EXPECT_EQ(ret, 0); Maat_clean_status(&mid); } for(i=0; i0) { hit_cnt++; } } fclose(fp); Maat_stream_scan_digest_end(&sp); EXPECT_GE(hit_cnt, 1); Maat_clean_status(&mid); return; } TEST(StringScan, GBKEncodedURL) { const char* url_gb2312="www.baidu.com/?wd=C%23%D6%D0%B9%FA"; int table_id=0,ret=0; struct Maat_rule_t result[4]; int found_pos[4]; const char* table_name="HTTP_URL"; scan_status_t mid=NULL; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, url_gb2312, strlen(url_gb2312), result,found_pos, 4, &mid, 0); EXPECT_GE(ret, 1); Maat_clean_status(&mid); return; } TEST(StringScan, UTF8EncodedURL) { const char* url_utf8="www.google.com/?q=C%23%E4%B8%AD%E5%9B%BD"; const char* url_utf8_qs="googlevideo.com/qs?nh=%2CIgpwcjA0LnN2bzAzKgkxMjcuMC4wLjE"; const char* url_utf8_long="https://r1---sn-35153iuxa-5a56.googlevideo.com/videoplayback?clen=14143675&sparams=clen%2Cdur%2Cei%2Cgir%2Cid%2Cinitcwndbps%2Cip%2Cipbits%2Citag%2Ckeepalive%2Clmt%2Cmime%2Cmm%2Cmn%2Cms%2Cmv%2Cpl%2Crequiressl%2Csource%2Cexpire&initcwndbps=11060000&ipbits=0&c=WEB&lmt=1545866423716040&source=youtube&dur=995.221&requiressl=yes&txp=5511222&mime=audio%2Fwebm&gir=yes&signature=D1BAE8D85C01B7761609D5143FEC67B33EA35A3E.BDBFB0F6E657EC8D5E9D42015378B885CA87364E&key=yt6&itag=251&expire=1548352912&fvip=1&ei=MKlJXJjUMY6p7QSx2p3gDA&ms=au%2Crdu&mt=1548331263&mv=m&pl=24&ip=178.89.4.220&keepalive=yes&id=o-AMlnrhwQnnM19Tz8lVnzpUT7bbAsrbPPZBl9M1Sx2sw2&mm=31%2C29&mn=sn-35153iuxa-5a56%2Csn-n8v7znz7&alr=yes&cpn=nCaBFGicSajzXMjH&cver=2.20190119&range=266995-528469&rn=17&rbuf=16106"; int table_id=0,ret=0; struct Maat_rule_t result[4]; int found_pos[4]; const char* table_name="HTTP_URL"; scan_status_t mid=NULL; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); memset(result, 0, sizeof(result)); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, url_utf8, strlen(url_utf8), result,found_pos, 4, &mid, 0); EXPECT_EQ(ret, 1); EXPECT_EQ(result[0].config_id, 129); Maat_clean_status(&mid); memset(result, 0, sizeof(result)); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, url_utf8_qs, strlen(url_utf8_qs), result,found_pos, 4, &mid, 0); EXPECT_GT(ret, 1); EXPECT_EQ(result[0].config_id, 142); Maat_clean_status(&mid); memset(result, 0, sizeof(result)); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, url_utf8_long, strlen(url_utf8_long), result,found_pos, 4, &mid, 0); EXPECT_EQ(ret, 1); EXPECT_EQ(result[0].config_id, 147); Maat_clean_status(&mid); return; } TEST(StringScan, UnicodeEscape) { const char* test_data_dir="./testdata_uni2ascii"; struct dirent **namelist; FILE* fp=NULL; char file_path[256]={0}; char buff[4096]; size_t read_len=0; int table_id=0,ret=0; struct Maat_rule_t result[4]; stream_para_t sp=NULL; int n=0,i=0, hit_cnt=0; const char* table_name="KEYWORDS_TABLE"; scan_status_t mid=NULL; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); n = my_scandir(test_data_dir, &namelist, NULL, (int (*)(const void*, const void*))alphasort); ASSERT_GT(n, 0); for(i=0;id_name, ".") == 0) || (strcmp(namelist[i]->d_name, "..") == 0)) { continue; } snprintf(file_path,sizeof(file_path),"%s/%s",test_data_dir,namelist[i]->d_name); fp=fopen(file_path,"rb"); if(fp==NULL) { printf("fopen %s error.\n",file_path);; continue; } sp=Maat_stream_scan_string_start(g_feather,table_id,0); ASSERT_FALSE(sp==NULL); read_len=fread(buff,1,sizeof(buff),fp); while(read_len>0) { ret=Maat_stream_scan_string(&sp,CHARSET_NONE,buff,read_len ,result, NULL, 4, &mid); read_len=fread(buff,1,sizeof(buff),fp); if(ret>0) { hit_cnt++; } } Maat_stream_scan_string_end(&sp); fclose(fp); EXPECT_GT(hit_cnt, 0); EXPECT_GE(result[0].config_id, 130);//130, 131 Maat_clean_status(&mid); } for(i=0;i0) { pass_flag=1; break; } } EXPECT_EQ(pass_flag, 1); EXPECT_EQ(result[0].config_id, 136); Maat_stream_scan_string_end(&sp); free(hit_detail); fclose(fp); Maat_clean_status(&mid); return; } TEST(StringScan, OffsetChunk64) { test_offset_str_scan_with_chunk(64); return; } TEST(StringScan, OffsetChunk1460) { test_offset_str_scan_with_chunk(1460); return; } void accept_tags_entry_cb(int table_id,const char* table_line,void* u_para) { int* callback_times=(int*)u_para; char status[32]={0}; int entry_id=-1,seq=-1; int is_valid=0; sscanf(table_line,"%d\t%s\t%d\t%d",&seq,status,&entry_id,&is_valid); EXPECT_STREQ(status ,"SUCCESS"); (*callback_times)++; return; } TEST(Policy, PluginRuleTags1) { #define RuleTags_Plugin int ret=0; int table_id=Maat_table_register(g_feather,"TEST_EFFECTIVE_RANGE_TABLE"); ASSERT_GT(table_id, 0); int callback_times=0; ret=Maat_table_callback_register(g_feather, table_id, NULL, accept_tags_entry_cb, NULL, &callback_times); ASSERT_GE(ret, 0); EXPECT_EQ(callback_times, 5); return; } void accept_tags_entry2_cb(int table_id,const char* table_line,void* u_para) { int* callback_times=(int*)u_para; (*callback_times)++; return; } TEST(Policy, PluginRuleTags2) { #define RuleTags_Plugin2 int ret=0; int table_id=Maat_table_register(g_feather,"IR_INTERCEPT_IP"); ASSERT_GT(table_id, 0); int callback_times=0; ret=Maat_table_callback_register(g_feather, table_id, NULL, accept_tags_entry2_cb, NULL, &callback_times); ASSERT_GE(ret, 0); EXPECT_EQ(callback_times, 2); return; } TEST(Policy, CompileRuleTags) { #define RuleTags_Compile int ret=0; int table_id=0; scan_status_t mid=NULL; struct Maat_rule_t result[4]; const char* should_hit="string bbb should hit"; const char* should_not_hit="string aaa should not hit"; const char* table_name="HTTP_URL"; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, should_not_hit, strlen(should_not_hit), result,NULL, 4, &mid, 0); EXPECT_EQ(ret, -2); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, should_hit, strlen(should_hit), result,NULL, 4, &mid, 0); EXPECT_EQ(ret, 1); Maat_clean_status(&mid); return; } struct rule_ex_param { int ref_cnt; char name[128]; int id; pthread_mutex_t lock; }; void compile_ex_param_new(int idx, const struct Maat_rule_t* rule, const char* srv_def_large, MAAT_RULE_EX_DATA* ad, long argl, void *argp) { int *counter=(int*)argp; *ad=NULL; ASSERT_GT(rule->serv_def_len, 4); struct rule_ex_param* param=(struct rule_ex_param*)calloc(sizeof(struct rule_ex_param), 1); param->ref_cnt=1; pthread_mutex_init(&(param->lock), NULL); sscanf(srv_def_large,"%*[^:]:%[^,],%d",param->name,&(param->id)); (*counter)++; *ad=param; return; } void compile_ex_param_free(int idx, const struct Maat_rule_t* rule, const char* srv_def_large, MAAT_RULE_EX_DATA* ad, long argl, void *argp) { if(*ad==NULL) { return; } struct rule_ex_param* param=(struct rule_ex_param*)*ad; pthread_mutex_lock(&(param->lock)); param->ref_cnt--; if(param->ref_cnt>0) { pthread_mutex_unlock(&(param->lock)); return; } free(param); return; } void compile_ex_param_dup(int idx, MAAT_RULE_EX_DATA *to, MAAT_RULE_EX_DATA *from, long argl, void *argp) { struct rule_ex_param* from_param=*((struct rule_ex_param**)from); pthread_mutex_lock(&(from_param->lock)); from_param->ref_cnt++; pthread_mutex_unlock(&(from_param->lock)); *((struct rule_ex_param**)to)=from_param; return; } TEST(Policy, CompileEXData) { #define rule_EX_data_index int ret=0; int table_id=0, ex_data_counter=0; scan_status_t mid=NULL; struct Maat_rule_t result[4]; const char* url="i.ytimg.com/vi/OtCNcustg_I/hqdefault.jpg?sqp=-oaymwEZCNACELwBSFXyq4qpAwsIARUAAIhCGAFwAQ==&rs=AOn4CLDOp_5fHMaCA9XZuJdCRv4DNDorMg"; const char* table_name="HTTP_URL"; const char* expect_name="I have a name"; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); int ex_param_idx=Maat_rule_get_ex_new_index(g_feather, "COMPILE_ALIAS", compile_ex_param_new, compile_ex_param_free, compile_ex_param_dup, 0, &ex_data_counter); ASSERT_TRUE(ex_param_idx>=0); EXPECT_EQ(ex_data_counter, 1); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, url, strlen(url), result,NULL, 4, &mid, 0); EXPECT_EQ(ret, 1); void *ex_data=Maat_rule_get_ex_data(g_feather, result, ex_param_idx); ASSERT_TRUE(ex_data!=NULL); struct rule_ex_param* param=(struct rule_ex_param*)ex_data; EXPECT_EQ(param->id, 7799); EXPECT_EQ(strcmp(param->name, expect_name),0); compile_ex_param_free(0, NULL, NULL, &ex_data, 0, NULL); Maat_clean_status(&mid); return; } TEST(Policy, SubGroup) { #define TestSubGroup int ret=0, table_id=0; const char* scan_string="ceshi3@mailhost.cn"; struct Maat_rule_t result[4]; memset(result, 0, sizeof(result)); scan_status_t mid=NULL; struct ipaddr ipv4_addr; struct stream_tuple4_v4 v4_addr; ipv4_addr.addrtype=ADDR_TYPE_IPV4; inet_pton(AF_INET,"10.0.6.205",&(v4_addr.saddr)); v4_addr.source=htons(50001); inet_pton(AF_INET,"10.0.6.201",&(v4_addr.daddr)); v4_addr.dest=htons(80); ipv4_addr.v4=&v4_addr; table_id=Maat_table_register(g_feather,"MAIL_ADDR"); ASSERT_GT(table_id, 0); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, scan_string, strlen(scan_string), result,NULL, 4, &mid, 0); EXPECT_EQ(ret, -2); table_id=Maat_table_register(g_feather, "IP_CONFIG"); ASSERT_GT(table_id, 0); ret=Maat_scan_proto_addr(g_feather,table_id,&ipv4_addr,6,result,4, &mid,0); EXPECT_EQ(ret, 1); EXPECT_EQ(result[0].config_id, 153); Maat_clean_status(&mid); return; } TEST(StreamFuzzyHash, Pure) { #define StreamFuzzyHash_Pure const size_t FILE_CHUNK_SIZE=4096; char * file_buff=NULL,*sfh_ordered=NULL,*sfh_unorder=NULL; int read_size=0,ret=0,chunk_num=0,i=0,idx=0; unsigned long long *offset=NULL; unsigned long long file_size=0,tmp=0,hash_length=0; const char* filename="./testdata/digest_test.data"; FILE* fp=fopen(filename,"r"); sfh_instance_t * fhandle = NULL; struct stat file_info; ret=stat(filename, &file_info); ASSERT_TRUE(ret==0); file_size=file_info.st_size; file_buff=(char*)malloc(file_size); ret=fread(file_buff,1,file_size,fp); ASSERT_TRUE((unsigned long long)ret==file_size); chunk_num=file_size/FILE_CHUNK_SIZE; if(file_size%FILE_CHUNK_SIZE==0) { chunk_num=file_size/FILE_CHUNK_SIZE; } else { chunk_num=file_size/FILE_CHUNK_SIZE+1; } offset=(unsigned long long*)malloc(sizeof(unsigned long long)*chunk_num); for(i=0;ifile_size) { read_size=file_size-offset[i]; } else { read_size=FILE_CHUNK_SIZE; } SFH_feed(fhandle,file_buff+offset[i],read_size,offset[i]); } hash_length = SFH_status(fhandle, HASH_LENGTH); sfh_unorder=(char*)malloc(hash_length); SFH_digest(fhandle, sfh_unorder, hash_length); //printf("%s %u %lf %s\n",path,digest_fstat.st_size,file_entropy,digest_result_buff); SFH_release(fhandle); EXPECT_STREQ(sfh_ordered, sfh_unorder); fclose(fp); free(file_buff); free(sfh_ordered); free(sfh_unorder); free(offset); return; } TEST(ScanResult, LongerServiceDefine) { int ret=0; int table_id=0; scan_status_t mid=NULL; struct Maat_rule_t result[4]; const char* scan_data="soq is using table conjunction function.http://www.3300av.com/novel/27122.txt"; const char* table_name="HTTP_URL"; table_id=Maat_table_register(g_feather,table_name); ASSERT_GT(table_id, 0); ret=Maat_full_scan_string(g_feather, table_id,CHARSET_GBK, scan_data, strlen(scan_data), result, NULL, 4, &mid, 0); EXPECT_EQ(ret, 2); EXPECT_EQ(result[1].config_id, 133); EXPECT_GT(result[1].serv_def_len, 128); char* buff=(char*)malloc(sizeof(char)*result[1].serv_def_len); ret=Maat_read_rule(g_feather, result+1, MAAT_RULE_SERV_DEFINE, buff, result[1].serv_def_len); EXPECT_EQ(ret, result[1].serv_def_len); Maat_clean_status(&mid); free(buff); return; } class MaatFileTest : public testing::Test { protected: static void SetUpTestCase() { const char* rule_folder="./ntcrule/full/index"; logger=MESA_create_runtime_log_handle("test_maat_file.log",0); const char* table_info="./t2_tableinfo.conf"; _shared_feather_f=Maat_feather(g_iThreadNum, table_info, logger); Maat_set_feather_opt(_shared_feather_f,MAAT_OPT_INSTANCE_NAME,"files", strlen("files")+1); Maat_set_feather_opt(_shared_feather_f, MAAT_OPT_FULL_CFG_DIR, rule_folder, strlen(rule_folder)+1); Maat_set_feather_opt(_shared_feather_f, MAAT_OPT_INC_CFG_DIR, rule_folder, strlen(rule_folder)+1); Maat_set_feather_opt(_shared_feather_f, MAAT_OPT_SCANDIR_INTERVAL_MS,&scan_interval_ms, sizeof(scan_interval_ms)); //Set a short intevral for testing. Maat_set_feather_opt(_shared_feather_f, MAAT_OPT_EFFECT_INVERVAL_MS,&effective_interval_ms, sizeof(effective_interval_ms)); Maat_initiate_feather(_shared_feather_f); } static void TearDownTestCase() { Maat_burn_feather(_shared_feather_f); MESA_destroy_runtime_log_handle(logger); } // Some expensive resource shared by all tests. static Maat_feather_t _shared_feather_f; static void *logger; }; Maat_feather_t MaatFileTest::_shared_feather_f; void* MaatFileTest::logger; TEST_F(MaatFileTest, StreamFiles) { #define StreamScan_StreamFiles Maat_feather_t feather=MaatFileTest::_shared_feather_f; const char* test_data_dir="./test_streamfiles"; struct dirent **namelist; FILE* fp=NULL; char file_path[256]={0}; char *buff; size_t read_len=0; int table_id=0,ret=0; struct Maat_rule_t result[4]; stream_para_t sp=NULL; int n=0,i=0, hit_cnt=0; const char* table_name="NTC_HTTP_REQ_BODY"; scan_status_t mid=NULL; table_id=Maat_table_register(feather,table_name); ASSERT_GT(table_id, 0); n = my_scandir(test_data_dir, &namelist, NULL, (int (*)(const void*, const void*))alphasort); ASSERT_GT(n, 0); sp=Maat_stream_scan_string_start(feather,table_id,0); ASSERT_FALSE(sp==NULL); struct stat file_info; size_t file_size=0; for(i=0;id_name, ".") == 0) || (strcmp(namelist[i]->d_name, "..") == 0)) { continue; } snprintf(file_path,sizeof(file_path),"%s/%s",test_data_dir,namelist[i]->d_name); ret=stat(file_path, &file_info); ASSERT_TRUE(ret==0); file_size=file_info.st_size; buff=(char*)malloc(file_size); fp=fopen(file_path,"rb"); if(fp==NULL) { printf("fopen %s error.\n",file_path); continue; } read_len=fread(buff,1,file_size,fp); ret=Maat_stream_scan_string(&sp,CHARSET_NONE,buff,read_len ,result, NULL, 4, &mid); read_len=fread(buff,1,sizeof(buff),fp); if(ret>0) { hit_cnt++; } fclose(fp); free(buff); buff=NULL; } Maat_clean_status(&mid); Maat_stream_scan_string_end(&sp); EXPECT_GT(hit_cnt, 0); for(i=0;i