mirror of
https://github.com/Cisco-Talos/clamav.git
synced 2025-10-19 10:23:17 +00:00
Bump copyright for 2022
Includes minor format corrections.
This commit is contained in:
parent
cca5f489b0
commit
140c88aa4e
425 changed files with 461 additions and 462 deletions
|
@ -1,4 +1,4 @@
|
|||
# Copyright (C) 2020-2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
# Copyright (C) 2020-2022 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
|
||||
set(SCAN_TARGETS
|
||||
ARCHIVE
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* Fuzz target for cl_load()
|
||||
*
|
||||
* Copyright (C) 2018-2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
* Copyright (C) 2018-2022 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
* Authors: Micah Snyder
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* Fuzz target for cl_scanfile()
|
||||
*
|
||||
* Copyright (C) 2018-2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
* Copyright (C) 2018-2022 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
* Authors: Micah Snyder, Alex Gaynor
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
|
@ -117,7 +117,7 @@ ClamAVState kClamAVState;
|
|||
|
||||
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
|
||||
{
|
||||
FILE* fuzzfile = NULL;
|
||||
FILE* fuzzfile = NULL;
|
||||
|
||||
fuzzfile = fopen(kClamAVState.tmp_file_name, "w");
|
||||
fwrite(data, size, 1, fuzzfile);
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* Fuzz target for cl_scanmap_callback()
|
||||
*
|
||||
* Copyright (C) 2018-2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
* Copyright (C) 2018-2022 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
* Authors: Micah Snyder, Alex Gaynor
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
|
@ -59,23 +59,23 @@ class ClamAVState
|
|||
scanopts.parse |=
|
||||
#if defined(CLAMAV_FUZZ_ARCHIVE)
|
||||
CL_SCAN_PARSE_ARCHIVE;
|
||||
#elif defined( CLAMAV_FUZZ_MAIL)
|
||||
#elif defined(CLAMAV_FUZZ_MAIL)
|
||||
CL_SCAN_PARSE_MAIL;
|
||||
#elif defined( CLAMAV_FUZZ_OLE2)
|
||||
#elif defined(CLAMAV_FUZZ_OLE2)
|
||||
CL_SCAN_PARSE_OLE2;
|
||||
#elif defined( CLAMAV_FUZZ_PDF)
|
||||
#elif defined(CLAMAV_FUZZ_PDF)
|
||||
CL_SCAN_PARSE_PDF;
|
||||
#elif defined( CLAMAV_FUZZ_HTML)
|
||||
#elif defined(CLAMAV_FUZZ_HTML)
|
||||
CL_SCAN_PARSE_HTML;
|
||||
#elif defined( CLAMAV_FUZZ_PE)
|
||||
#elif defined(CLAMAV_FUZZ_PE)
|
||||
CL_SCAN_PARSE_PE;
|
||||
#elif defined( CLAMAV_FUZZ_ELF)
|
||||
#elif defined(CLAMAV_FUZZ_ELF)
|
||||
CL_SCAN_PARSE_ELF;
|
||||
#elif defined( CLAMAV_FUZZ_SWF)
|
||||
#elif defined(CLAMAV_FUZZ_SWF)
|
||||
CL_SCAN_PARSE_SWF;
|
||||
#elif defined( CLAMAV_FUZZ_XMLDOCS)
|
||||
#elif defined(CLAMAV_FUZZ_XMLDOCS)
|
||||
CL_SCAN_PARSE_XMLDOCS;
|
||||
#elif defined( CLAMAV_FUZZ_HWP3)
|
||||
#elif defined(CLAMAV_FUZZ_HWP3)
|
||||
CL_SCAN_PARSE_HWP3;
|
||||
#else
|
||||
~(0);
|
||||
|
@ -84,7 +84,6 @@ class ClamAVState
|
|||
scanopts.general |= CL_SCAN_GENERAL_COLLECT_METADATA; /* Enable the gen-json feature */
|
||||
scanopts.heuristic |= ~(0); /* Enable all heuristic code */
|
||||
scanopts.general |= CL_SCAN_GENERAL_ALLMATCHES; /* Enable all-match, so heuristic alerts don't end the scan early */
|
||||
|
||||
}
|
||||
|
||||
~ClamAVState()
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
#!/usr/bin/env python
|
||||
# Copyright (C) 2018-2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
# Copyright (C) 2018-2022 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
|
||||
|
||||
'''
|
||||
This script is a convenience tool to run a standalone fuzz target against each
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue