1131 lines
39 KiB
C
1131 lines
39 KiB
C
/*
|
|
* Copyright (C) 2013-2022 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
|
* Copyright (C) 2007-2013 Sourcefire, Inc.
|
|
*
|
|
* Authors: Tomasz Kojm
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
|
|
* MA 02110-1301, USA.
|
|
*/
|
|
|
|
#include "matcher.h"
|
|
|
|
#ifndef __OTHERS_H_LC
|
|
#define __OTHERS_H_LC
|
|
|
|
#if HAVE_CONFIG_H
|
|
#include "clamav-config.h"
|
|
#endif
|
|
|
|
#ifdef HAVE_UNISTD_H
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#if HAVE_PTHREAD_H
|
|
#include <pthread.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stdbool.h>
|
|
|
|
#ifdef HAVE_JSON
|
|
#include <json.h>
|
|
#endif
|
|
|
|
#include "clamav.h"
|
|
#include "dconf.h"
|
|
#include "filetypes.h"
|
|
#include "fmap.h"
|
|
#include "regex/regex.h"
|
|
#include "bytecode.h"
|
|
#include "bytecode_api.h"
|
|
#include "events.h"
|
|
#include "crtmgr.h"
|
|
|
|
#include "unrar_iface.h"
|
|
|
|
#ifdef HAVE_YARA
|
|
#include "yara_clam.h"
|
|
#endif
|
|
|
|
#if HAVE_LIBXML2
|
|
#define CLAMAV_MIN_XMLREADER_FLAGS (XML_PARSE_NOERROR | XML_PARSE_NONET)
|
|
#endif
|
|
|
|
/*
|
|
* CL_FLEVEL is the signature f-level specific to the current code and
|
|
* should never be modified
|
|
* CL_FLEVEL_DCONF is used in the dconf module and can be bumped by
|
|
* distribution packagers provided they fix *all* security issues found
|
|
* in the old versions of ClamAV. Updating CL_FLEVEL_DCONF will result
|
|
* in re-enabling affected modules.
|
|
*/
|
|
|
|
#define CL_FLEVEL 128
|
|
#define CL_FLEVEL_DCONF CL_FLEVEL
|
|
#define CL_FLEVEL_SIGTOOL CL_FLEVEL
|
|
|
|
extern uint8_t cli_debug_flag;
|
|
extern uint8_t cli_always_gen_section_hash;
|
|
|
|
/*
|
|
* CLI_ISCONTAINED(bb, bb_size, sb, sb_size) checks if sb (small buffer) is
|
|
* within bb (big buffer).
|
|
*
|
|
* bb and sb are pointers (or offsets) for the main buffer and the
|
|
* sub-buffer respectively, and bb_size and sb_size are their sizes
|
|
*
|
|
* The macro can be used to protect against wraps.
|
|
*/
|
|
#define CLI_ISCONTAINED(bb, bb_size, sb, sb_size) \
|
|
((size_t)(bb_size) > 0 && (size_t)(sb_size) > 0 && \
|
|
(size_t)(sb_size) <= (size_t)(bb_size) && \
|
|
(size_t)(sb) >= (size_t)(bb) && \
|
|
(size_t)(sb) + (size_t)(sb_size) <= (size_t)(bb) + (size_t)(bb_size) && \
|
|
(size_t)(sb) + (size_t)(sb_size) > (size_t)(bb) && \
|
|
(size_t)(sb) < (size_t)(bb) + (size_t)(bb_size))
|
|
|
|
/*
|
|
* CLI_ISCONTAINED_0_TO(bb_size, sb, sb_size) checks if sb (small offset) is
|
|
* within bb (big offset) where the big offset always starts at 0.
|
|
*
|
|
* bb and sb are offsets for the main buffer and the
|
|
* sub-buffer respectively, and bb_size and sb_size are their sizes
|
|
*
|
|
* The macro can be used to protect against wraps.
|
|
*
|
|
* CLI_ISCONTAINED_0_TO is the same as CLI_ISCONTAINED except that `bb` is gone
|
|
* and assumed ot be zero.
|
|
*/
|
|
#define CLI_ISCONTAINED_0_TO(bb_size, sb, sb_size) \
|
|
((size_t)(bb_size) > 0 && (size_t)(sb_size) > 0 && \
|
|
(size_t)(sb_size) <= (size_t)(bb_size) && \
|
|
(size_t)(sb) + (size_t)(sb_size) <= (size_t)(bb_size) && \
|
|
(size_t)(sb) < (size_t)(bb_size))
|
|
|
|
/*
|
|
* CLI_ISCONTAINED_2(bb, bb_size, sb, sb_size) checks if sb (small buffer) is
|
|
* within bb (big buffer).
|
|
*
|
|
* CLI_ISCONTAINED_2 is the same as CLI_ISCONTAINED except that it allows for
|
|
* small-buffers with sb_size == 0.
|
|
*/
|
|
#define CLI_ISCONTAINED_2(bb, bb_size, sb, sb_size) \
|
|
((size_t)(bb_size) > 0 && \
|
|
(size_t)(sb_size) <= (size_t)(bb_size) && \
|
|
(size_t)(sb) >= (size_t)(bb) && \
|
|
(size_t)(sb) + (size_t)(sb_size) <= (size_t)(bb) + (size_t)(bb_size) && \
|
|
(size_t)(sb) + (size_t)(sb_size) >= (size_t)(bb) && \
|
|
(size_t)(sb) <= (size_t)(bb) + (size_t)(bb_size))
|
|
|
|
/*
|
|
* CLI_ISCONTAINED_2(bb, bb_size, sb, sb_size) checks if sb (small buffer) is
|
|
* within bb (big buffer).
|
|
*
|
|
* CLI_ISCONTAINED_2 is the same as CLI_ISCONTAINED except that it allows for
|
|
* small-buffers with sb_size == 0.
|
|
*
|
|
* CLI_ISCONTAINED_2_0_TO is the same as CLI_ISCONTAINED_2 except that `bb` is gone
|
|
* and assumed ot be zero.
|
|
*/
|
|
#define CLI_ISCONTAINED_2_0_TO(bb_size, sb, sb_size) \
|
|
((size_t)(bb_size) > 0 && \
|
|
(size_t)(sb_size) <= (size_t)(bb_size) && \
|
|
(size_t)(sb) + (size_t)(sb_size) <= (size_t)(bb_size) && \
|
|
(size_t)(sb) <= (size_t)(bb_size))
|
|
|
|
#define CLI_MAX_ALLOCATION (182 * 1024 * 1024)
|
|
|
|
#ifdef HAVE_SYS_PARAM_H
|
|
#include <sys/param.h> /* for NAME_MAX */
|
|
#endif
|
|
|
|
/* Maximum filenames under various systems - njh */
|
|
#ifndef NAME_MAX /* e.g. Linux */
|
|
#ifdef MAXNAMELEN /* e.g. Solaris */
|
|
#define NAME_MAX MAXNAMELEN
|
|
#else
|
|
#ifdef FILENAME_MAX /* e.g. SCO */
|
|
#define NAME_MAX FILENAME_MAX
|
|
#else
|
|
#define NAME_MAX 256
|
|
#endif
|
|
#endif
|
|
#endif
|
|
|
|
#if NAME_MAX < 256
|
|
#undef NAME_MAX
|
|
#define NAME_MAX 256
|
|
#endif
|
|
|
|
typedef struct bitset_tag {
|
|
unsigned char *bitset;
|
|
unsigned long length;
|
|
} bitset_t;
|
|
|
|
typedef struct recursion_level_tag {
|
|
cli_file_t type;
|
|
size_t size;
|
|
cl_fmap_t *fmap; /* The fmap for this layer. This used to be in an array in the ctx. */
|
|
uint32_t recursion_level_buffer; /* Which buffer layer in scan recursion. */
|
|
uint32_t recursion_level_buffer_fmap; /* Which fmap layer in this buffer. */
|
|
bool is_normalized_layer; /* Indicates that the layer should be skipped when checking container and intermediate types. */
|
|
} recursion_level_t;
|
|
// #define CONTAINER_FLAG_VALID 0x01
|
|
|
|
/* internal clamav context */
|
|
typedef struct cli_ctx_tag {
|
|
char *target_filepath; /**< (optional) The filepath of the original scan target. */
|
|
const char *sub_filepath; /**< (optional) The filepath of the current file being parsed. May be a temp file. */
|
|
char *sub_tmpdir; /**< The directory to store tmp files at this recursion depth. */
|
|
const char **virname;
|
|
unsigned int num_viruses;
|
|
unsigned long int *scanned;
|
|
const struct cli_matcher *root;
|
|
const struct cl_engine *engine;
|
|
uint64_t scansize;
|
|
struct cl_scan_options *options;
|
|
unsigned int scannedfiles;
|
|
unsigned int found_possibly_unwanted;
|
|
unsigned int corrupted_input;
|
|
unsigned int img_validate;
|
|
recursion_level_t *recursion_stack; /* Array of recursion levels used as a stack. */
|
|
uint32_t recursion_stack_size; /* stack size must == engine->max_recursion_level */
|
|
uint32_t recursion_level; /* Index into recursion_stack; current fmap recursion level from start of scan. */
|
|
fmap_t *fmap; /* Pointer to current fmap in recursion_stack, varies with recursion depth. For convenience. */
|
|
bool next_layer_is_normalized; /* Indicate that the next fmap pushed to the stack is normalized and should be ignored when checking container/intermediate types */
|
|
unsigned char handlertype_hash[16];
|
|
struct cli_dconf *dconf;
|
|
bitset_t *hook_lsig_matches;
|
|
void *cb_ctx;
|
|
cli_events_t *perf;
|
|
#ifdef HAVE__INTERNAL__SHA_COLLECT
|
|
int sha_collect;
|
|
#endif
|
|
#ifdef HAVE_JSON
|
|
struct json_object *properties;
|
|
struct json_object *wrkproperty;
|
|
#endif
|
|
struct timeval time_limit;
|
|
bool limit_exceeded; /* To guard against alerting on limits exceeded more than once, or storing that in the JSON metadata more than once. */
|
|
bool abort_scan; /* So we can guarantee a scan is aborted, even if CL_ETIMEOUT/etc. status is lost in the scan recursion stack. */
|
|
} cli_ctx;
|
|
|
|
#define STATS_ANON_UUID "5b585e8f-3be5-11e3-bf0b-18037319526c"
|
|
#define STATS_MAX_SAMPLES 50
|
|
#define STATS_MAX_MEM 1024 * 1024
|
|
|
|
typedef struct cli_flagged_sample {
|
|
char **virus_name;
|
|
char md5[16];
|
|
uint32_t size; /* A size of zero means size is unavailable (why would this ever happen?) */
|
|
uint32_t hits;
|
|
stats_section_t *sections;
|
|
|
|
struct cli_flagged_sample *prev;
|
|
struct cli_flagged_sample *next;
|
|
} cli_flagged_sample_t;
|
|
|
|
typedef struct cli_clamav_intel {
|
|
char *hostid;
|
|
char *host_info;
|
|
cli_flagged_sample_t *samples;
|
|
uint32_t nsamples;
|
|
uint32_t maxsamples;
|
|
uint32_t maxmem;
|
|
uint32_t timeout;
|
|
time_t nextupdate;
|
|
struct cl_engine *engine;
|
|
#ifdef CL_THREAD_SAFE
|
|
pthread_mutex_t mutex;
|
|
#endif
|
|
} cli_intel_t;
|
|
|
|
typedef struct {
|
|
uint64_t v[2][4];
|
|
} icon_groupset;
|
|
|
|
struct icomtr {
|
|
unsigned int group[2];
|
|
unsigned int color_avg[3];
|
|
unsigned int color_x[3];
|
|
unsigned int color_y[3];
|
|
unsigned int gray_avg[3];
|
|
unsigned int gray_x[3];
|
|
unsigned int gray_y[3];
|
|
unsigned int bright_avg[3];
|
|
unsigned int bright_x[3];
|
|
unsigned int bright_y[3];
|
|
unsigned int dark_avg[3];
|
|
unsigned int dark_x[3];
|
|
unsigned int dark_y[3];
|
|
unsigned int edge_avg[3];
|
|
unsigned int edge_x[3];
|
|
unsigned int edge_y[3];
|
|
unsigned int noedge_avg[3];
|
|
unsigned int noedge_x[3];
|
|
unsigned int noedge_y[3];
|
|
unsigned int rsum;
|
|
unsigned int gsum;
|
|
unsigned int bsum;
|
|
unsigned int ccount;
|
|
char *name;
|
|
};
|
|
|
|
struct icon_matcher {
|
|
char **group_names[2];
|
|
unsigned int group_counts[2];
|
|
struct icomtr *icons[3];
|
|
unsigned int icon_counts[3];
|
|
};
|
|
|
|
struct cli_dbinfo {
|
|
char *name;
|
|
char *hash;
|
|
size_t size;
|
|
struct cl_cvd *cvd;
|
|
struct cli_dbinfo *next;
|
|
};
|
|
|
|
#define CLI_PWDB_COUNT 3
|
|
typedef enum {
|
|
CLI_PWDB_ANY = 0,
|
|
CLI_PWDB_ZIP = 1,
|
|
CLI_PWDB_RAR = 2
|
|
} cl_pwdb_t;
|
|
|
|
struct cli_pwdb {
|
|
char *name;
|
|
char *passwd;
|
|
uint16_t length;
|
|
struct cli_pwdb *next;
|
|
};
|
|
|
|
struct cl_engine {
|
|
uint32_t refcount; /* reference counter */
|
|
uint32_t sdb;
|
|
uint32_t dboptions;
|
|
uint32_t dbversion[2];
|
|
uint32_t ac_only;
|
|
uint32_t ac_mindepth;
|
|
uint32_t ac_maxdepth;
|
|
char *tmpdir;
|
|
uint32_t keeptmp;
|
|
uint64_t engine_options;
|
|
|
|
/* Limits */
|
|
uint32_t maxscantime; /* Time limit (in milliseconds) */
|
|
uint64_t maxscansize; /* during the scanning of archives this size
|
|
* will never be exceeded
|
|
*/
|
|
uint64_t maxfilesize; /* compressed files will only be decompressed
|
|
* and scanned up to this size
|
|
*/
|
|
uint32_t max_recursion_level; /* maximum recursion level for archives */
|
|
uint32_t maxfiles; /* maximum number of files to be scanned
|
|
* within a single archive
|
|
*/
|
|
/* This is for structured data detection. You can set the minimum
|
|
* number of occurrences of an CC# or SSN before the system will
|
|
* generate a notification.
|
|
*/
|
|
uint32_t min_cc_count;
|
|
uint32_t min_ssn_count;
|
|
|
|
/* Roots table */
|
|
struct cli_matcher **root;
|
|
|
|
/* hash matcher for standard MD5 sigs */
|
|
struct cli_matcher *hm_hdb;
|
|
/* hash matcher for MD5 sigs for PE sections */
|
|
struct cli_matcher *hm_mdb;
|
|
/* hash matcher for MD5 sigs for PE import tables */
|
|
struct cli_matcher *hm_imp;
|
|
/* hash matcher for whitelist db */
|
|
struct cli_matcher *hm_fp;
|
|
|
|
/* Container metadata */
|
|
struct cli_cdb *cdb;
|
|
|
|
/* Phishing .pdb and .wdb databases*/
|
|
struct regex_matcher *whitelist_matcher;
|
|
struct regex_matcher *domainlist_matcher;
|
|
struct phishcheck *phishcheck;
|
|
|
|
/* Dynamic configuration */
|
|
struct cli_dconf *dconf;
|
|
|
|
/* Filetype definitions */
|
|
struct cli_ftype *ftypes;
|
|
struct cli_ftype *ptypes;
|
|
|
|
/* Container password storage */
|
|
struct cli_pwdb **pwdbs;
|
|
|
|
/* Pre-loading test matcher
|
|
* Test for presence before using; cleared on engine compile.
|
|
*/
|
|
struct cli_matcher *test_root;
|
|
|
|
/* Ignored signatures */
|
|
struct cli_matcher *ignored;
|
|
|
|
/* PUA categories (to be included or excluded) */
|
|
char *pua_cats;
|
|
|
|
/* Icon reference storage */
|
|
struct icon_matcher *iconcheck;
|
|
|
|
/* Negative cache storage */
|
|
struct CACHE *cache;
|
|
|
|
/* Database information from .info files */
|
|
struct cli_dbinfo *dbinfo;
|
|
|
|
/* Used for memory pools */
|
|
mpool_t *mempool;
|
|
|
|
/* crtmgr stuff */
|
|
crtmgr cmgr;
|
|
|
|
/* Callback(s) */
|
|
clcb_pre_cache cb_pre_cache;
|
|
clcb_pre_scan cb_pre_scan;
|
|
clcb_post_scan cb_post_scan;
|
|
clcb_virus_found cb_virus_found;
|
|
clcb_sigload cb_sigload;
|
|
void *cb_sigload_ctx;
|
|
clcb_hash cb_hash;
|
|
clcb_meta cb_meta;
|
|
clcb_file_props cb_file_props;
|
|
|
|
/* Used for bytecode */
|
|
struct cli_all_bc bcs;
|
|
unsigned *hooks[_BC_LAST_HOOK - _BC_START_HOOKS];
|
|
unsigned hooks_cnt[_BC_LAST_HOOK - _BC_START_HOOKS];
|
|
unsigned hook_lsig_ids;
|
|
enum bytecode_security bytecode_security;
|
|
uint32_t bytecode_timeout;
|
|
enum bytecode_mode bytecode_mode;
|
|
|
|
/* Engine max settings */
|
|
uint64_t maxembeddedpe; /* max size to scan MSEXE for PE */
|
|
uint64_t maxhtmlnormalize; /* max size to normalize HTML */
|
|
uint64_t maxhtmlnotags; /* max size for scanning normalized HTML */
|
|
uint64_t maxscriptnormalize; /* max size to normalize scripts */
|
|
uint64_t maxziptypercg; /* max size to re-do zip filetype */
|
|
|
|
/* Statistics/intelligence gathering */
|
|
void *stats_data;
|
|
clcb_stats_add_sample cb_stats_add_sample;
|
|
clcb_stats_remove_sample cb_stats_remove_sample;
|
|
clcb_stats_decrement_count cb_stats_decrement_count;
|
|
clcb_stats_submit cb_stats_submit;
|
|
clcb_stats_flush cb_stats_flush;
|
|
clcb_stats_get_num cb_stats_get_num;
|
|
clcb_stats_get_size cb_stats_get_size;
|
|
clcb_stats_get_hostid cb_stats_get_hostid;
|
|
|
|
/* Raw disk image max settings */
|
|
uint32_t maxpartitions; /* max number of partitions to scan in a disk image */
|
|
|
|
/* Engine max settings */
|
|
uint32_t maxiconspe; /* max number of icons to scan for PE */
|
|
uint32_t maxrechwp3; /* max recursive calls for HWP3 parsing */
|
|
|
|
/* PCRE matching limitations */
|
|
uint64_t pcre_match_limit;
|
|
uint64_t pcre_recmatch_limit;
|
|
uint64_t pcre_max_filesize;
|
|
|
|
#ifdef HAVE_YARA
|
|
/* YARA */
|
|
struct _yara_global *yara_global;
|
|
#endif
|
|
};
|
|
|
|
struct cl_settings {
|
|
/* don't store dboptions here; it needs to be provided to cl_load() and
|
|
* can be optionally obtained with cl_engine_get() or from the original
|
|
* settings stored by the application
|
|
*/
|
|
uint32_t ac_only;
|
|
uint32_t ac_mindepth;
|
|
uint32_t ac_maxdepth;
|
|
char *tmpdir;
|
|
uint32_t keeptmp;
|
|
uint32_t maxscantime;
|
|
uint64_t maxscansize;
|
|
uint64_t maxfilesize;
|
|
uint32_t max_recursion_level;
|
|
uint32_t maxfiles;
|
|
uint32_t min_cc_count;
|
|
uint32_t min_ssn_count;
|
|
enum bytecode_security bytecode_security;
|
|
uint32_t bytecode_timeout;
|
|
enum bytecode_mode bytecode_mode;
|
|
char *pua_cats;
|
|
uint64_t engine_options;
|
|
|
|
/* callbacks */
|
|
clcb_pre_cache cb_pre_cache;
|
|
clcb_pre_scan cb_pre_scan;
|
|
clcb_post_scan cb_post_scan;
|
|
clcb_virus_found cb_virus_found;
|
|
clcb_sigload cb_sigload;
|
|
void *cb_sigload_ctx;
|
|
clcb_msg cb_msg;
|
|
clcb_hash cb_hash;
|
|
clcb_meta cb_meta;
|
|
clcb_file_props cb_file_props;
|
|
|
|
/* Engine max settings */
|
|
uint64_t maxembeddedpe; /* max size to scan MSEXE for PE */
|
|
uint64_t maxhtmlnormalize; /* max size to normalize HTML */
|
|
uint64_t maxhtmlnotags; /* max size for scanning normalized HTML */
|
|
uint64_t maxscriptnormalize; /* max size to normalize scripts */
|
|
uint64_t maxziptypercg; /* max size to re-do zip filetype */
|
|
|
|
/* Statistics/intelligence gathering */
|
|
void *stats_data;
|
|
clcb_stats_add_sample cb_stats_add_sample;
|
|
clcb_stats_remove_sample cb_stats_remove_sample;
|
|
clcb_stats_decrement_count cb_stats_decrement_count;
|
|
clcb_stats_submit cb_stats_submit;
|
|
clcb_stats_flush cb_stats_flush;
|
|
clcb_stats_get_num cb_stats_get_num;
|
|
clcb_stats_get_size cb_stats_get_size;
|
|
clcb_stats_get_hostid cb_stats_get_hostid;
|
|
|
|
/* Raw disk image max settings */
|
|
uint32_t maxpartitions; /* max number of partitions to scan in a disk image */
|
|
|
|
/* Engine max settings */
|
|
uint32_t maxiconspe; /* max number of icons to scan for PE */
|
|
uint32_t maxrechwp3; /* max recursive calls for HWP3 parsing */
|
|
|
|
/* PCRE matching limitations */
|
|
uint64_t pcre_match_limit;
|
|
uint64_t pcre_recmatch_limit;
|
|
uint64_t pcre_max_filesize;
|
|
};
|
|
|
|
extern cl_unrar_error_t (*cli_unrar_open)(const char *filename, void **hArchive, char **comment, uint32_t *comment_size, uint8_t debug_flag);
|
|
extern cl_unrar_error_t (*cli_unrar_peek_file_header)(void *hArchive, unrar_metadata_t *file_metadata);
|
|
extern cl_unrar_error_t (*cli_unrar_extract_file)(void *hArchive, const char *destPath, char *outputBuffer);
|
|
extern cl_unrar_error_t (*cli_unrar_skip_file)(void *hArchive);
|
|
extern void (*cli_unrar_close)(void *hArchive);
|
|
|
|
extern LIBCLAMAV_EXPORT int have_rar;
|
|
|
|
#define SCAN_ALLMATCHES (ctx->options->general & CL_SCAN_GENERAL_ALLMATCHES)
|
|
#define SCAN_COLLECT_METADATA (ctx->options->general & CL_SCAN_GENERAL_COLLECT_METADATA)
|
|
#define SCAN_HEURISTICS (ctx->options->general & CL_SCAN_GENERAL_HEURISTICS)
|
|
#define SCAN_HEURISTIC_PRECEDENCE (ctx->options->general & CL_SCAN_GENERAL_HEURISTIC_PRECEDENCE)
|
|
#define SCAN_UNPRIVILEGED (ctx->options->general & CL_SCAN_GENERAL_UNPRIVILEGED)
|
|
|
|
#define SCAN_PARSE_ARCHIVE (ctx->options->parse & CL_SCAN_PARSE_ARCHIVE)
|
|
#define SCAN_PARSE_ELF (ctx->options->parse & CL_SCAN_PARSE_ELF)
|
|
#define SCAN_PARSE_PDF (ctx->options->parse & CL_SCAN_PARSE_PDF)
|
|
#define SCAN_PARSE_SWF (ctx->options->parse & CL_SCAN_PARSE_SWF)
|
|
#define SCAN_PARSE_HWP3 (ctx->options->parse & CL_SCAN_PARSE_HWP3)
|
|
#define SCAN_PARSE_XMLDOCS (ctx->options->parse & CL_SCAN_PARSE_XMLDOCS)
|
|
#define SCAN_PARSE_MAIL (ctx->options->parse & CL_SCAN_PARSE_MAIL)
|
|
#define SCAN_PARSE_OLE2 (ctx->options->parse & CL_SCAN_PARSE_OLE2)
|
|
#define SCAN_PARSE_HTML (ctx->options->parse & CL_SCAN_PARSE_HTML)
|
|
#define SCAN_PARSE_PE (ctx->options->parse & CL_SCAN_PARSE_PE)
|
|
|
|
#define SCAN_HEURISTIC_BROKEN (ctx->options->heuristic & CL_SCAN_HEURISTIC_BROKEN)
|
|
#define SCAN_HEURISTIC_BROKEN_MEDIA (ctx->options->heuristic & CL_SCAN_HEURISTIC_BROKEN_MEDIA)
|
|
#define SCAN_HEURISTIC_EXCEEDS_MAX (ctx->options->heuristic & CL_SCAN_HEURISTIC_EXCEEDS_MAX)
|
|
#define SCAN_HEURISTIC_PHISHING_SSL_MISMATCH (ctx->options->heuristic & CL_SCAN_HEURISTIC_PHISHING_SSL_MISMATCH)
|
|
#define SCAN_HEURISTIC_PHISHING_CLOAK (ctx->options->heuristic & CL_SCAN_HEURISTIC_PHISHING_CLOAK)
|
|
#define SCAN_HEURISTIC_MACROS (ctx->options->heuristic & CL_SCAN_HEURISTIC_MACROS)
|
|
#define SCAN_HEURISTIC_ENCRYPTED_ARCHIVE (ctx->options->heuristic & CL_SCAN_HEURISTIC_ENCRYPTED_ARCHIVE)
|
|
#define SCAN_HEURISTIC_ENCRYPTED_DOC (ctx->options->heuristic & CL_SCAN_HEURISTIC_ENCRYPTED_DOC)
|
|
#define SCAN_HEURISTIC_PARTITION_INTXN (ctx->options->heuristic & CL_SCAN_HEURISTIC_PARTITION_INTXN)
|
|
#define SCAN_HEURISTIC_STRUCTURED (ctx->options->heuristic & CL_SCAN_HEURISTIC_STRUCTURED)
|
|
#define SCAN_HEURISTIC_STRUCTURED_SSN_NORMAL (ctx->options->heuristic & CL_SCAN_HEURISTIC_STRUCTURED_SSN_NORMAL)
|
|
#define SCAN_HEURISTIC_STRUCTURED_SSN_STRIPPED (ctx->options->heuristic & CL_SCAN_HEURISTIC_STRUCTURED_SSN_STRIPPED)
|
|
|
|
#define SCAN_MAIL_PARTIAL_MESSAGE (ctx->options->mail & CL_SCAN_MAIL_PARTIAL_MESSAGE)
|
|
|
|
#define SCAN_DEV_COLLECT_SHA (ctx->options->dev & CL_SCAN_DEV_COLLECT_SHA)
|
|
#define SCAN_DEV_COLLECT_PERF_INFO (ctx->options->dev & CL_SCAN_DEV_COLLECT_PERFORMANCE_INFO)
|
|
|
|
/* based on macros from A. Melnikoff */
|
|
#define cbswap16(v) (((v & 0xff) << 8) | (((v) >> 8) & 0xff))
|
|
#define cbswap32(v) ((((v)&0x000000ff) << 24) | (((v)&0x0000ff00) << 8) | \
|
|
(((v)&0x00ff0000) >> 8) | (((v)&0xff000000) >> 24))
|
|
#define cbswap64(v) ((((v)&0x00000000000000ffULL) << 56) | \
|
|
(((v)&0x000000000000ff00ULL) << 40) | \
|
|
(((v)&0x0000000000ff0000ULL) << 24) | \
|
|
(((v)&0x00000000ff000000ULL) << 8) | \
|
|
(((v)&0x000000ff00000000ULL) >> 8) | \
|
|
(((v)&0x0000ff0000000000ULL) >> 24) | \
|
|
(((v)&0x00ff000000000000ULL) >> 40) | \
|
|
(((v)&0xff00000000000000ULL) >> 56))
|
|
|
|
#ifndef HAVE_ATTRIB_PACKED
|
|
#define __attribute__(x)
|
|
#endif
|
|
#ifdef HAVE_PRAGMA_PACK
|
|
#pragma pack(1)
|
|
#endif
|
|
#ifdef HAVE_PRAGMA_PACK_HPPA
|
|
#pragma pack 1
|
|
#endif
|
|
|
|
union unaligned_64 {
|
|
uint64_t una_u64;
|
|
int64_t una_s64;
|
|
} __attribute__((packed));
|
|
|
|
union unaligned_32 {
|
|
uint32_t una_u32;
|
|
int32_t una_s32;
|
|
} __attribute__((packed));
|
|
|
|
union unaligned_16 {
|
|
uint16_t una_u16;
|
|
int16_t una_s16;
|
|
} __attribute__((packed));
|
|
|
|
struct unaligned_ptr {
|
|
void *ptr;
|
|
} __attribute__((packed));
|
|
|
|
#ifdef HAVE_PRAGMA_PACK
|
|
#pragma pack()
|
|
#endif
|
|
#ifdef HAVE_PRAGMA_PACK_HPPA
|
|
#pragma pack
|
|
#endif
|
|
|
|
#if WORDS_BIGENDIAN == 0
|
|
/* Little endian */
|
|
#define le16_to_host(v) (v)
|
|
#define le32_to_host(v) (v)
|
|
#define le64_to_host(v) (v)
|
|
#define be16_to_host(v) cbswap16(v)
|
|
#define be32_to_host(v) cbswap32(v)
|
|
#define be64_to_host(v) cbswap64(v)
|
|
#define cli_readint64(buff) (((const union unaligned_64 *)(buff))->una_s64)
|
|
#define cli_readint32(buff) (((const union unaligned_32 *)(buff))->una_s32)
|
|
#define cli_readint16(buff) (((const union unaligned_16 *)(buff))->una_s16)
|
|
#define cli_writeint32(offset, value) (((union unaligned_32 *)(offset))->una_u32 = (uint32_t)(value))
|
|
#else
|
|
/* Big endian */
|
|
#define le16_to_host(v) cbswap16(v)
|
|
#define le32_to_host(v) cbswap32(v)
|
|
#define le64_to_host(v) cbswap64(v)
|
|
#define be16_to_host(v) (v)
|
|
#define be32_to_host(v) (v)
|
|
#define be64_to_host(v) (v)
|
|
|
|
static inline int64_t cli_readint64(const void *buff)
|
|
{
|
|
int64_t ret;
|
|
ret = (int64_t)((const char *)buff)[0] & 0xff;
|
|
ret |= (int64_t)(((const char *)buff)[1] & 0xff) << 8;
|
|
ret |= (int64_t)(((const char *)buff)[2] & 0xff) << 16;
|
|
ret |= (int64_t)(((const char *)buff)[3] & 0xff) << 24;
|
|
|
|
ret |= (int64_t)(((const char *)buff)[4] & 0xff) << 32;
|
|
ret |= (int64_t)(((const char *)buff)[5] & 0xff) << 40;
|
|
ret |= (int64_t)(((const char *)buff)[6] & 0xff) << 48;
|
|
ret |= (int64_t)(((const char *)buff)[7] & 0xff) << 56;
|
|
return ret;
|
|
}
|
|
|
|
static inline int32_t cli_readint32(const void *buff)
|
|
{
|
|
int32_t ret;
|
|
ret = (int32_t)((const char *)buff)[0] & 0xff;
|
|
ret |= (int32_t)(((const char *)buff)[1] & 0xff) << 8;
|
|
ret |= (int32_t)(((const char *)buff)[2] & 0xff) << 16;
|
|
ret |= (int32_t)(((const char *)buff)[3] & 0xff) << 24;
|
|
return ret;
|
|
}
|
|
|
|
static inline int16_t cli_readint16(const void *buff)
|
|
{
|
|
int16_t ret;
|
|
ret = (int16_t)((const char *)buff)[0] & 0xff;
|
|
ret |= (int16_t)(((const char *)buff)[1] & 0xff) << 8;
|
|
return ret;
|
|
}
|
|
|
|
static inline void cli_writeint32(void *offset, uint32_t value)
|
|
{
|
|
((char *)offset)[0] = value & 0xff;
|
|
((char *)offset)[1] = (value & 0xff00) >> 8;
|
|
((char *)offset)[2] = (value & 0xff0000) >> 16;
|
|
((char *)offset)[3] = (value & 0xff000000) >> 24;
|
|
}
|
|
#endif
|
|
|
|
/**
|
|
* @brief Append an alert.
|
|
*
|
|
* An FP-check will verify that the file is not whitelisted.
|
|
* The whitelist check does not happen before the scan because file whitelisting
|
|
* is so infrequent that such action would be detrimental to performance.
|
|
*
|
|
* TODO: Replace implementation with severity scale, and severity threshold
|
|
* wherein signatures that do not meet the threshold are documented in JSON
|
|
* metadata but do not halt the scan.
|
|
*
|
|
* @param ctx The scan context.
|
|
* @param virname The alert name.
|
|
* @return cl_error_t CL_VIRUS if scan should be halted due to an alert, CL_CLEAN if scan should continue.
|
|
*/
|
|
cl_error_t cli_append_virus(cli_ctx *ctx, const char *virname);
|
|
|
|
/**
|
|
* @brief Append a PUA (low severity) alert.
|
|
*
|
|
* This function will return CLEAN unless in all-match or Heuristic-precedence
|
|
* modes. The intention is for the scan to continue in case something more
|
|
* malicious is found.
|
|
*
|
|
* TODO: Replace implementation with severity scale, and severity threshold
|
|
* wherein signatures that do not meet the threshold are documented in JSON
|
|
* metadata but do not halt the scan.
|
|
*
|
|
* BUG: In normal scan mode (see above), the alert is not FP-checked!
|
|
*
|
|
* @param ctx The scan context.
|
|
* @param virname The alert name.
|
|
* @return cl_error_t CL_VIRUS if scan should be halted due to an alert, CL_CLEAN if scan should continue.
|
|
*/
|
|
cl_error_t cli_append_possibly_unwanted(cli_ctx *ctx, const char *virname);
|
|
|
|
const char *cli_get_last_virus(const cli_ctx *ctx);
|
|
const char *cli_get_last_virus_str(const cli_ctx *ctx);
|
|
void cli_virus_found_cb(cli_ctx *ctx);
|
|
|
|
/**
|
|
* @brief Push a new fmap onto our scan recursion stack.
|
|
*
|
|
* May fail if we exceed max recursion depth.
|
|
*
|
|
* @param ctx The scanning context.
|
|
* @param map The fmap for the new layer.
|
|
* @param type The file type. May be CL_TYPE_ANY if unknown. Can change it later with cli_recursion_stack_change_type().
|
|
* @param is_new_buffer true if the fmap represents a new buffer/file, and not some window into an existing fmap.
|
|
* @return cl_error_t CL_SUCCESS if successful, else CL_EMAXREC if exceeding the max recursion depth.
|
|
*/
|
|
cl_error_t cli_recursion_stack_push(cli_ctx *ctx, cl_fmap_t *map, cli_file_t type, bool is_new_buffer);
|
|
|
|
/**
|
|
* @brief Pop off a layer of our scan recursion stack.
|
|
*
|
|
* Returns the fmap for the popped layer. Does NOT funmap() the fmap for you.
|
|
*
|
|
* @param ctx The scanning context.
|
|
* @return cl_fmap_t* A pointer to the fmap for the popped layer, may return NULL instead if the stack is empty.
|
|
*/
|
|
cl_fmap_t *cli_recursion_stack_pop(cli_ctx *ctx);
|
|
|
|
/**
|
|
* @brief Re-assign the type for the current layer.
|
|
*
|
|
* @param ctx The scanning context.
|
|
* @param type The new file type.
|
|
*/
|
|
void cli_recursion_stack_change_type(cli_ctx *ctx, cli_file_t type);
|
|
|
|
/**
|
|
* @brief Get the type of a specific layer.
|
|
*
|
|
* Ignores normalized layers internally.
|
|
*
|
|
* For index:
|
|
* 0 == the outermost (bottom) layer of the stack.
|
|
* 1 == the first layer (probably never explicitly used).
|
|
* -1 == the present innermost (top) layer of the stack.
|
|
* -2 == the parent layer (or "container"). That is, the second from the top of the stack.
|
|
*
|
|
* @param ctx The scanning context.
|
|
* @param index Desired index, will be converted internally as though the normalized layers were stripped out. Don't think too had about it. Or do. ¯\_(ツ)_/¯
|
|
* @return cli_file_t The type of the requested layer,
|
|
* or returns CL_TYPE_ANY if a negative layer is requested,
|
|
* or returns CL_TYPE_IGNORED if requested layer too high.
|
|
*/
|
|
cli_file_t cli_recursion_stack_get_type(cli_ctx *ctx, int index);
|
|
|
|
/**
|
|
* @brief Get the size of a specific layer.
|
|
*
|
|
* Ignores normalized layers internally.
|
|
*
|
|
* For index:
|
|
* 0 == the outermost (bottom) layer of the stack.
|
|
* 1 == the first layer (probably never explicitly used).
|
|
* -1 == the present innermost (top) layer of the stack.
|
|
* -2 == the parent layer (or "container"). That is, the second from the top of the stack.
|
|
*
|
|
* @param ctx The scanning context.
|
|
* @param index Desired index, will be converted internally as though the normalized layers were stripped out. Don't think too had about it. Or do. ¯\_(ツ)_/¯
|
|
* @return cli_file_t The size of the requested layer,
|
|
* or returns the size of the whole file if a negative layer is requested,
|
|
* or returns 0 if requested layer too high.
|
|
*/
|
|
size_t cli_recursion_stack_get_size(cli_ctx *ctx, int index);
|
|
|
|
/* used by: spin, yc (C) aCaB */
|
|
#define __SHIFTBITS(a) (sizeof(a) << 3)
|
|
#define __SHIFTMASK(a) (__SHIFTBITS(a) - 1)
|
|
#define CLI_ROL(a, b) a = (a << ((b)&__SHIFTMASK(a))) | (a >> ((__SHIFTBITS(a) - (b)) & __SHIFTMASK(a)))
|
|
#define CLI_ROR(a, b) a = (a >> ((b)&__SHIFTMASK(a))) | (a << ((__SHIFTBITS(a) - (b)) & __SHIFTMASK(a)))
|
|
|
|
/* Implementation independent sign-extended signed right shift */
|
|
#ifdef HAVE_SAR
|
|
#define CLI_SRS(n, s) ((n) >> (s))
|
|
#else
|
|
#define CLI_SRS(n, s) ((((n) >> (s)) ^ (1 << (sizeof(n) * 8 - 1 - s))) - (1 << (sizeof(n) * 8 - 1 - s)))
|
|
#endif
|
|
#define CLI_SAR(n, s) n = CLI_SRS(n, s)
|
|
|
|
#ifdef __GNUC__
|
|
void cli_warnmsg(const char *str, ...) __attribute__((format(printf, 1, 2)));
|
|
#else
|
|
void cli_warnmsg(const char *str, ...);
|
|
#endif
|
|
|
|
#ifdef __GNUC__
|
|
void cli_errmsg(const char *str, ...) __attribute__((format(printf, 1, 2)));
|
|
#else
|
|
void cli_errmsg(const char *str, ...);
|
|
#endif
|
|
|
|
#ifdef __GNUC__
|
|
void cli_infomsg(const cli_ctx *ctx, const char *fmt, ...) __attribute__((format(printf, 2, 3)));
|
|
#else
|
|
void cli_infomsg(const cli_ctx *ctx, const char *fmt, ...);
|
|
#endif
|
|
|
|
void cli_logg_setup(const cli_ctx *ctx);
|
|
void cli_logg_unsetup(void);
|
|
|
|
/* tell compiler about branches that are very rarely taken,
|
|
* such as debug paths, and error paths */
|
|
#if (__GNUC__ >= 4) || (__GNUC__ == 3 && __GNUC_MINOR__ >= 2)
|
|
#define UNLIKELY(cond) __builtin_expect(!!(cond), 0)
|
|
#define LIKELY(cond) __builtin_expect(!!(cond), 1)
|
|
#else
|
|
#define UNLIKELY(cond) (cond)
|
|
#define LIKELY(cond) (cond)
|
|
#endif
|
|
|
|
#ifdef __GNUC__
|
|
#define always_inline inline __attribute__((always_inline))
|
|
#define never_inline __attribute__((noinline))
|
|
#else
|
|
#define never_inline
|
|
#define always_inline inline
|
|
#endif
|
|
|
|
#if defined(__GNUC__) && ((__GNUC__ > 4) || (__GNUC__ == 4 && __GNUC_MINOR__ >= 3))
|
|
#define __hot__ __attribute__((hot))
|
|
#else
|
|
#define __hot__
|
|
#endif
|
|
|
|
#define cli_dbgmsg (!UNLIKELY(cli_debug_flag)) ? (void)0 : cli_dbgmsg_internal
|
|
|
|
#ifdef __GNUC__
|
|
void cli_dbgmsg_internal(const char *str, ...) __attribute__((format(printf, 1, 2)));
|
|
#else
|
|
void cli_dbgmsg_internal(const char *str, ...);
|
|
#endif
|
|
|
|
#ifdef HAVE_CLI_GETPAGESIZE
|
|
#undef HAVE_CLI_GETPAGESIZE
|
|
#endif
|
|
|
|
#ifdef _WIN32
|
|
static inline int cli_getpagesize(void)
|
|
{
|
|
SYSTEM_INFO si;
|
|
GetSystemInfo(&si);
|
|
return si.dwPageSize;
|
|
}
|
|
#else /* ! _WIN32 */
|
|
#if HAVE_SYSCONF_SC_PAGESIZE
|
|
static inline int cli_getpagesize(void)
|
|
{
|
|
return sysconf(_SC_PAGESIZE);
|
|
}
|
|
#define HAVE_CLI_GETPAGESIZE 1
|
|
#else
|
|
#if HAVE_GETPAGESIZE
|
|
static inline int cli_getpagesize(void)
|
|
{
|
|
return getpagesize();
|
|
}
|
|
#define HAVE_CLI_GETPAGESIZE 1
|
|
#endif /* HAVE_GETPAGESIZE */
|
|
#endif /* HAVE_SYSCONF_SC_PAGESIZE */
|
|
#endif /* _WIN32 */
|
|
|
|
void *cli_malloc(size_t nmemb);
|
|
void *cli_calloc(size_t nmemb, size_t size);
|
|
void *cli_realloc(void *ptr, size_t size);
|
|
void *cli_realloc2(void *ptr, size_t size);
|
|
char *cli_strdup(const char *s);
|
|
int cli_rmdirs(const char *dirname);
|
|
char *cli_hashstream(FILE *fs, unsigned char *digcpy, int type);
|
|
char *cli_hashfile(const char *filename, int type);
|
|
int cli_unlink(const char *pathname);
|
|
size_t cli_readn(int fd, void *buff, size_t count);
|
|
size_t cli_writen(int fd, const void *buff, size_t count);
|
|
const char *cli_gettmpdir(void);
|
|
|
|
/**
|
|
* @brief Sanitize a relative path, so it cannot have a negative depth.
|
|
*
|
|
* Caller is responsible for freeing the sanitized filepath.
|
|
* The optioal sanitized_filebase output param is a pointer into the filepath,
|
|
* if set, and does not need to be freed.
|
|
*
|
|
* @param filepath The filepath to sanitize
|
|
* @param filepath_len The length of the filepath
|
|
* @param[out] sanitized_filebase Pointer to the basename portion of the sanitized filepath. (optional)
|
|
* @return char*
|
|
*/
|
|
char *cli_sanitize_filepath(const char *filepath, size_t filepath_len, char **sanitized_filebase);
|
|
|
|
/**
|
|
* @brief Generate tempfile filename (no path) with a random MD5 hash.
|
|
*
|
|
* Caller is responsible for freeing the filename.
|
|
*
|
|
* @return char* filename or NULL.
|
|
*/
|
|
char *cli_genfname(const char *prefix);
|
|
|
|
/**
|
|
* @brief Generate a full tempfile filepath with a provided the name.
|
|
*
|
|
* Caller is responsible for freeing the filename.
|
|
* If the dir is not provided, the engine->tmpdir will be used.
|
|
*
|
|
* @param dir Alternative directory. (optional)
|
|
* @return char* filename or NULL.
|
|
*/
|
|
char *cli_newfilepath(const char *dir, const char *fname);
|
|
|
|
/**
|
|
* @brief Generate a full tempfile filepath with a provided the name.
|
|
*
|
|
* Caller is responsible for freeing the filename.
|
|
* If the dir is not provided, the engine->tmpdir will be used.
|
|
*
|
|
* @param dir Alternative temp directory (optional).
|
|
* @param prefix (Optional) Base filename for new file.
|
|
* @param[out] name Allocated filepath, must be freed by caller.
|
|
* @param[out] fd File descriptor of open temp file.
|
|
*/
|
|
cl_error_t cli_newfilepathfd(const char *dir, char *fname, char **name, int *fd);
|
|
|
|
/**
|
|
* @brief Generate a full tempfile filepath with a random MD5 hash and prefix the name, if provided.
|
|
*
|
|
* Caller is responsible for freeing the filename.
|
|
*
|
|
* @param dir Alternative temp directory. (optional)
|
|
* @return char* filename or NULL.
|
|
*/
|
|
char *cli_gentemp_with_prefix(const char *dir, const char *prefix);
|
|
|
|
/**
|
|
* @brief Generate a full tempfile filepath with a random MD5 hash.
|
|
*
|
|
* Caller is responsible for freeing the filename.
|
|
*
|
|
* @param dir Alternative temp directory. (optional)
|
|
* @return char* filename or NULL.
|
|
*/
|
|
char *cli_gentemp(const char *dir);
|
|
|
|
/**
|
|
* @brief Create a temp filename, create the file, open it, and pass back the filepath and open file descriptor.
|
|
*
|
|
* @param dir Alternative temp directory (optional).
|
|
* @param[out] name Allocated filepath, must be freed by caller.
|
|
* @param[out] fd File descriptor of open temp file.
|
|
* @return cl_error_t CL_SUCCESS, CL_ECREAT, or CL_EMEM.
|
|
*/
|
|
cl_error_t cli_gentempfd(const char *dir, char **name, int *fd);
|
|
|
|
/**
|
|
* @brief Create a temp filename, create the file, open it, and pass back the filepath and open file descriptor.
|
|
*
|
|
* @param dir Alternative temp directory (optional).
|
|
* @param prefix (Optional) Prefix for new file tempfile.
|
|
* @param[out] name Allocated filepath, must be freed by caller.
|
|
* @param[out] fd File descriptor of open temp file.
|
|
* @return cl_error_t CL_SUCCESS, CL_ECREAT, or CL_EMEM.
|
|
*/
|
|
cl_error_t cli_gentempfd_with_prefix(const char *dir, char *prefix, char **name, int *fd);
|
|
|
|
unsigned int cli_rndnum(unsigned int max);
|
|
int cli_filecopy(const char *src, const char *dest);
|
|
bitset_t *cli_bitset_init(void);
|
|
void cli_bitset_free(bitset_t *bs);
|
|
int cli_bitset_set(bitset_t *bs, unsigned long bit_offset);
|
|
int cli_bitset_test(bitset_t *bs, unsigned long bit_offset);
|
|
const char *cli_ctime(const time_t *timep, char *buf, const size_t bufsize);
|
|
void cli_append_virus_if_heur_exceedsmax(cli_ctx *, char *);
|
|
cl_error_t cli_checklimits(const char *, cli_ctx *, unsigned long, unsigned long, unsigned long);
|
|
|
|
/**
|
|
* @brief Call before scanning a file to determine if we should scan it, skip it, or abort the entire scanning process.
|
|
*
|
|
* If the verdict is CL_SUCCESS, then this function increments the # of scanned files, and increments the amount of scanned data.
|
|
* If the verdict is that a limit has been exceeded, then ctx->
|
|
*
|
|
* @param ctx The scanning context.
|
|
* @param needed The size of the file we're considering scanning.
|
|
* @return cl_error_t CL_SUCCESS if we're good to keep scanning else an error status.
|
|
*/
|
|
cl_error_t cli_updatelimits(cli_ctx *ctx, size_t needed);
|
|
|
|
unsigned long cli_getsizelimit(cli_ctx *, unsigned long);
|
|
int cli_matchregex(const char *str, const char *regex);
|
|
void cli_qsort(void *a, size_t n, size_t es, int (*cmp)(const void *, const void *));
|
|
void cli_qsort_r(void *a, size_t n, size_t es, int (*cmp)(const void *, const void *, const void *), void *arg);
|
|
cl_error_t cli_checktimelimit(cli_ctx *ctx);
|
|
|
|
/* symlink behaviour */
|
|
#define CLI_FTW_FOLLOW_FILE_SYMLINK 0x01
|
|
#define CLI_FTW_FOLLOW_DIR_SYMLINK 0x02
|
|
|
|
/* if the callback needs the stat */
|
|
#define CLI_FTW_NEED_STAT 0x04
|
|
|
|
/* remove leading/trailing slashes */
|
|
#define CLI_FTW_TRIM_SLASHES 0x08
|
|
#define CLI_FTW_STD (CLI_FTW_NEED_STAT | CLI_FTW_TRIM_SLASHES)
|
|
|
|
enum cli_ftw_reason {
|
|
visit_file,
|
|
visit_directory_toplev, /* this is a directory at toplevel of recursion */
|
|
error_mem, /* recommended to return CL_EMEM */
|
|
/* recommended to return CL_SUCCESS below */
|
|
error_stat,
|
|
warning_skipped_link,
|
|
warning_skipped_special,
|
|
warning_skipped_dir
|
|
};
|
|
|
|
/* wrap void*, so that we don't mix it with some other pointer */
|
|
struct cli_ftw_cbdata {
|
|
void *data;
|
|
};
|
|
|
|
/**
|
|
* @brief Callback to process each file in a file tree walk (FTW).
|
|
*
|
|
* The callback is responsible for freeing filename when it is done using it.
|
|
*
|
|
* Note that callback decides if directory traversal should continue
|
|
* after an error, we call the callback with reason == error,
|
|
* and if it returns CL_BREAK we break.
|
|
*
|
|
* Return:
|
|
* - CL_BREAK to break out without an error,
|
|
* - CL_SUCCESS to continue,
|
|
* - any CL_E* to break out due to error.
|
|
*/
|
|
typedef cl_error_t (*cli_ftw_cb)(STATBUF *stat_buf, char *filename, const char *path, enum cli_ftw_reason reason, struct cli_ftw_cbdata *data);
|
|
|
|
/**
|
|
* @brief Callback to determine if a path in a file tree walk (FTW) should be skipped.
|
|
* Has access to the same callback data as the main FTW callback function (above).
|
|
*
|
|
* Return:
|
|
* - 1 if the path should be skipped (i.e. to not call the callback for the given path),
|
|
* - 0 if the path should be processed (i.e. to call the callback for the given path).
|
|
*/
|
|
typedef int (*cli_ftw_pathchk)(const char *path, struct cli_ftw_cbdata *data);
|
|
|
|
/**
|
|
* @brief Traverse a file path, calling the callback function on each file
|
|
* within if the pathchk() check allows for it. Will skip certain file types:
|
|
* -
|
|
*
|
|
* This is regardless of virus found/not, that is the callback's job to store.
|
|
* Note that the callback may dispatch async the scan, so that when cli_ftw
|
|
* returns we don't know the infected/notinfected status of the directory yet!
|
|
*
|
|
* Due to this if the callback scans synchronously it should store the infected
|
|
* status in its cbdata.
|
|
* This works for both files and directories. It stats the path to determine
|
|
* which one it is.
|
|
* If it is a file, it simply calls the callback once, otherwise recurses.
|
|
*
|
|
* @param base The top level directory (or file) path to be processed
|
|
* @param flags A bitflag field for the CLI_FTW_* flag options (see above)
|
|
* @param maxdepth The max recursion depth.
|
|
* @param callback The cli_ftw_cb callback to invoke on each file AND directory.
|
|
* @param data Callback data for the callback function.
|
|
* @param pathchk A function used to determine if the callback should be run on the given file.
|
|
* @return cl_error_t CL_SUCCESS if it traversed all files and subdirs
|
|
* @return cl_error_t CL_BREAK if traversal has stopped at some point
|
|
* @return cl_error_t CL_E* if error encountered during traversal and we had to break out
|
|
*/
|
|
cl_error_t cli_ftw(char *base, int flags, int maxdepth, cli_ftw_cb callback, struct cli_ftw_cbdata *data, cli_ftw_pathchk pathchk);
|
|
|
|
const char *cli_strerror(int errnum, char *buf, size_t len);
|
|
|
|
/**
|
|
* @brief Attempt to get a filename from an open file descriptor.
|
|
*
|
|
* Caller is responsible for free'ing the filename.
|
|
* Should work on Linux, macOS, Windows.
|
|
*
|
|
* @param desc File descriptor
|
|
* @param[out] filepath Will be set to file path if found, or NULL.
|
|
* @return cl_error_t CL_SUCCESS if found, else an error code.
|
|
*/
|
|
cl_error_t cli_get_filepath_from_filedesc(int desc, char **filepath);
|
|
|
|
/**
|
|
* @brief Attempt to get the real path of a provided path (evaluating symlinks).
|
|
*
|
|
* Caller is responsible for free'ing the file path.
|
|
* On posix systems this just calls realpath() under the hood.
|
|
* On Win32, it opens a handle and uses cli_get_filepath_from_filedesc()
|
|
* to get the real path.
|
|
*
|
|
* @param desc A file path to evaluate.
|
|
* @param char* [out] A malloced string containing the real path.
|
|
* @return cl_error_t CL_SUCCESS if found, else an error code.
|
|
*/
|
|
cl_error_t cli_realpath(const char *file_name, char **real_filename);
|
|
|
|
#ifndef FREE
|
|
#define FREE(VAR) \
|
|
if (NULL != VAR) { \
|
|
free(VAR); \
|
|
VAR = NULL; \
|
|
}
|
|
#endif /* FREE */
|
|
|
|
#endif
|