October 26, 2018
View e766303

Removing final references to libmspack-0.5alpha, preventing make dist.

Micah Snyder authored on 2018/10/26 12:32:18
View ebea41e

Moving variable declaration to top of function because ‘for’ loop initial declarations are only allowed in C99 mode.

Micah Snyder authored on 2018/10/26 12:30:44
View 3aa41eb

Removed sdl check from mspack so it possibly-(but not actually)-uninitialized-local-variables will not be treated as an error. Added matcher-byte-comp.c to libclamav.vcxproj.

Micah Snyder authored on 2018/10/26 10:05:09
October 25, 2018
View 311c350

Autojunk'd

Micah Snyder authored on 2018/10/25 08:55:22
View 420426d

Incrementing the libclamav version numbers to 9.0.0 and setting the version strings to 0.101.0-beta.

Micah Snyder authored on 2018/10/25 08:50:44
View a6165cd

bb12151: Added --foreground to clamd help output and man page. Also correcting the default bytecode timeout in the clamscan man page.

Micah Snyder authored on 2018/10/25 07:52:29
October 10, 2018
View 7f46503

Allow the NULL to be missing on all AlgorithmIds

Andrew authored on 2018/10/10 03:00:28
September 22, 2018
View f8a5230

Added ClamAV 0.101.0 release notes to NEWS.md.

Micah Snyder authored on 2018/09/22 00:59:39
September 15, 2018
View 64ecd10

Fix support for authenticode signatures from external .cat files This commit adds back in support for whitelisting files based on signatures from .cat files loaded in via a '-d' flag to clamscan. This also makes it so that a .crb blacklist rule match can't be overruled by a signature in a .cat file

Andrew authored on 2018/09/15 03:39:47
September 14, 2018
View b9b4c36

Update tbshash to have enough space for SHA512 hashes

Andrew authored on 2018/09/14 04:00:34
View 50d1a0b

Make --dumpcerts be more consistent, improve cert processing This commit makes the following changes: - --dumpcerts will print certificates even if they already exist in any .crb files loaded - --dumpcerts will print certificates only once - Having a whitelist CRB rule on a leaf certificate should no longer prevent signature verification from happening. NOTE, this doesn't mean that you can have whitelist rules for leaf certificates and have that result in a trusted signature - that doesn't work yet - Determining whether a certificate is blacklisted now includes comparing the public key data (modulus and exponent) in addition to the subject and serial hashes - If a blacklisted certificate is detected, the code will return immediately instead of continuing on to parse the rest of the signature

Andrew authored on 2018/09/14 01:04:17
September 12, 2018
View db39ba2

Add debug message in the case where a seemingly useless cert is detected

Andrew authored on 2018/09/12 23:41:59
View 5df252e

Set the certSign flag for certificates without a KeyUsage The MS MD5 root cert doesn't have the KeyUsage set and appears to validate just fine

Andrew authored on 2018/09/12 23:04:35
View 4ef79cf

Fix a memory leak that occurs when a PE is whitelisted due to a valid signature

Andrew authored on 2018/09/12 03:17:33
September 11, 2018
View b1c1353

Allow x509 certs with v1 TBSCertificate sections in the timestamp chain There are some Windows binaries that have certificates with version 1 TBSCertificate sections. This technically isn't allowed by the spec, but the Windows API still seems to report these are being OK

Andrew authored on 2018/09/11 05:27:21