... | ... |
@@ -156,7 +156,7 @@ int cli_bcomp_addpatt(struct cli_matcher *root, const char *virname, const char |
156 | 156 |
buf_start = tokens[0]; |
157 | 157 |
switch (buf_start[0]) { |
158 | 158 |
case '<': |
159 |
- if ((++buf_start)[0] == '<') { |
|
159 |
+ if ((++buf_start)[0] == '<') { |
|
160 | 160 |
offset_param = strtol(++buf_start, (char**) &buf_end, 0); |
161 | 161 |
if (buf_end && buf_end+1 != tokens[1]) { |
162 | 162 |
cli_errmsg("cli_bcomp_addpatt: while parsing (%s#%s#%s), offset parameter included invalid characters\n", tokens[0], tokens[1], tokens[2]); |
... | ... |
@@ -176,8 +176,8 @@ int cli_bcomp_addpatt(struct cli_matcher *root, const char *virname, const char |
176 | 176 |
break; |
177 | 177 |
|
178 | 178 |
case '>': |
179 |
- if ((++buf_start)[0] == '>') { |
|
180 |
- offset_param = strtol(buf_start, (char**) &buf_end, 0); |
|
179 |
+ if ((++buf_start)[0] == '>') { |
|
180 |
+ offset_param = strtol(++buf_start, (char**) &buf_end, 0); |
|
181 | 181 |
if (buf_end && buf_end+1 != tokens[1]) { |
182 | 182 |
cli_errmsg("cli_bcomp_addpatt: while parsing (%s#%s#%s), offset parameter included invalid characters\n", tokens[0], tokens[1], tokens[2]); |
183 | 183 |
free(buf); |
... | ... |
@@ -50,7 +50,6 @@ struct cli_pcre_off { |
50 | 50 |
#define CLI_PCRE_GLOBAL 0x00000001 /* g */ |
51 | 51 |
#define CLI_PCRE_ENCOMPASS 0x00000002 /* e */ |
52 | 52 |
#define CLI_PCRE_ROLLING 0x00000004 /* r */ |
53 |
-#define CLI_PCRE_BCOMP 0x00000008 /* z */ |
|
54 | 53 |
|
55 | 54 |
#define CLI_PCRE_DISABLED 0x80000000 /* used for dconf or fail to build */ |
56 | 55 |
|
... | ... |
@@ -1253,11 +1253,7 @@ int cli_fmap_scandesc(cli_ctx *ctx, cli_file_t ftype, uint8_t ftonly, struct cli |
1253 | 1253 |
|
1254 | 1254 |
cli_hashset_destroy(&info.exeinfo.vinfo); |
1255 | 1255 |
|
1256 |
-<<<<<<< HEAD |
|
1257 |
- if (SCAN_ALLMATCHES && viruses_found) |
|
1258 |
-======= |
|
1259 |
- if (SCAN_ALL && viruses_found) { |
|
1260 |
->>>>>>> refactoring byte compare functionality as a subsig; adding loader and matchers for bytecompare subsig |
|
1256 |
+ if (SCAN_ALLMATCHES && viruses_found) { |
|
1261 | 1257 |
return CL_VIRUS; |
1262 | 1258 |
} |
1263 | 1259 |
if(ret == CL_VIRUS) { |
... | ... |
@@ -606,7 +606,7 @@ int cli_parse_add(struct cli_matcher *root, const char *virname, const char *hex |
606 | 606 |
|
607 | 607 |
} else if(root->ac_only || type || lsigid || sigopts || strpbrk(hexsig, "?([") || (root->bm_offmode && (!strcmp(offset, "*") || strchr(offset, ','))) || strstr(offset, "VI") || strchr(offset, '$')) { |
608 | 608 |
if((ret = cli_ac_addsig(root, virname, hexsig, sigopts, 0, 0, 0, rtype, type, 0, 0, offset, lsigid, options))) { |
609 |
- cli_errmsg("cli_parse_add(): Problem adding signature (3). %s \n", hexsig); |
|
609 |
+ cli_errmsg("cli_parse_add(): Problem adding signature (3).\n"); |
|
610 | 610 |
return ret; |
611 | 611 |
} |
612 | 612 |
} else { |
... | ... |
@@ -75,7 +75,7 @@ size_t cli_strtokenize(char *buffer, const char delim, const size_t token_count, |
75 | 75 |
size_t cli_ldbtokenize(char *buffer, const char delim, const size_t token_count, const char **tokens, int token_skip); |
76 | 76 |
long cli_strntol(const char* nptr, size_t n, char** endptr, register int base); |
77 | 77 |
unsigned long cli_strntoul(const char* nptr, size_t n, char** endptr, register int base); |
78 |
-cl_errot_t cli_strntol_wrap(const char *buf, size_t buf_size, int fail_at_nondigit, int base, long *result); |
|
78 |
+cl_error_t cli_strntol_wrap(const char *buf, size_t buf_size, int fail_at_nondigit, int base, long *result); |
|
79 | 79 |
cl_error_t cli_strntoul_wrap(const char *buf, size_t buf_size, int fail_at_nondigit, int base, unsigned long *result); |
80 | 80 |
int cli_isnumber(const char *str); |
81 | 81 |
char *cli_unescape(const char *str); |