[proftpd-mod-clamav] 01/01: Added missing header file
Francesco Lovergine
frankie at moszumanska.debian.org
Sun Feb 5 17:50:46 GMT 2017
This is an automated email from the git hooks/post-receive script.
frankie pushed a commit to branch upstream
in repository proftpd-mod-clamav.
commit fd5c7bfc46889838893a9747520613a2a0d06942
Author: Francesco Paolo Lovergine <frankie at debian.org>
Date: Sun Feb 5 18:40:53 2017 +0100
Added missing header file
---
mod_clamav.h | 883 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 883 insertions(+)
diff --git a/mod_clamav.h b/mod_clamav.h
new file mode 100644
index 0000000..a8c9d70
--- /dev/null
+++ b/mod_clamav.h
@@ -0,0 +1,883 @@
+/*
+ * mod_clamav - ClamAV virus scanning module for ProFTPD
+ * Copyright (c) 2005-2016, Joseph Benden <joe at thrallingpenguin.com>
+ * Copyright (c) 2012-2013, TJ Saunders <tj at castaglia.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307, USA.
+ *
+ * Furthermore, Joseph Benden gives permission to link this program with
+ * ClamAV, and distribute the resulting executable, without including the
+ * source code for ClamAV in the source distribution.
+ *
+ * ClamAV is available at http://www.clamav.net/
+ *
+ * Thanks to TJ Saunders for his helpful comments and suggestions!
+ *
+ * DO NOT EDIT THE LINE BELOW
+ */
+#include "conf.h"
+#include "privs.h"
+#include <libgen.h>
+#include <sys/types.h>
+#include "mod_clamav.h"
+
+/**
+ * Module version and declaration
+ */
+#define MOD_CLAMAV_VERSION "mod_clamav/0.14rc2"
+module clamav_module;
+
+/**
+ * Global variables
+ */
+static int clamd_sockd = 0, is_remote = 0;
+static char *clamd_host = NULL;
+static int clamd_port = 0;
+static unsigned long long clamd_minsize = 0, clamd_maxsize = 0;
+static int clam_errno;
+static int remove_on_failure = 0;
+static const char *trace_channel = "clamav";
+
+/**
+ * Local declarations
+ */
+static unsigned long parse_nbytes(char *nbytes_str, char *units_str);
+static int clamavd_result(int sockd, const char *abs_filename, const char *rel_filename);
+static int clamavd_connect_check(int sockd);
+static int clamavd_scan(int sockd, const char *abs_filename, const char *rel_filename);
+static int clamavd_connect(void);
+
+/**
+ * Read the returned information from Clamavd.
+ */
+static int clamavd_result(int sockd, const char *abs_filename, const char *rel_filename) {
+ int infected = 0, waserror = 0, ret;
+ char buff[4096], *pt, *pt1;
+ FILE *fd = 0;
+
+ (void) pr_trace_msg("clamav", 1, "clamavd_result (sockd %d, abs_filename '%s', rel_filename '%s')", sockd, abs_filename, rel_filename);
+
+ if ((fd=fdopen(dup(sockd), "r")) == NULL) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cant open descriptor for reading: %d",
+ errno);
+ return -1;
+ }
+
+ memset(buff, '\0', sizeof(buff));
+ if (fgets(buff, sizeof(buff) - 1, fd)) {
+ if (strstr(buff, "FOUND\n")) {
+ const char *proto;
+
+ ++infected;
+
+ pt = strrchr(buff, ':');
+ if (pt)
+ *pt = 0;
+
+ /* Delete the infected upload */
+ /* TODO: delete only the hiddenstore file, not
+ the actual file.
+ */
+ if ((ret=pr_fsio_unlink(rel_filename))!=0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": notice: unlink() failed (%d): %s",
+ errno, strerror(errno));
+ }
+
+ /* clean up the response */
+ pt += 2;
+ pt1 = strstr(pt, " FOUND");
+ if (pt1) {
+ *pt1 = 0;
+ }
+
+ /* Generate a custom event for any listeners
+ * (e.g. mod_ban) which might be listening. Pass
+ * in the string containing the virus
+ * information.
+ */
+ pr_event_generate("mod_clamav.virus-found", pt);
+
+ /* Inform the client the file contained a
+ * virus (only for FTP/FTPS connections.)
+ */
+ proto = pr_session_get_protocol(0);
+ if (strncmp(proto, "ftp", 3) == 0 ||
+ strncmp(proto, "ftps", 4) == 0) {
+ pr_response_send(R_550, "Virus Detected and Removed: %s", pt);
+ }
+
+ /* Log the fact */
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": Virus '%s' found in '%s'", pt, abs_filename);
+ } else if (strstr(buff, "ERROR\n") != NULL ||
+ strstr(buff, "UNKNOWN COMMAND") != NULL) {
+ char *err = buff, *errend;
+
+ errend = strstr(err, " ERROR");
+ if (errend) {
+ *errend = 0;
+ }
+ errend = strstr(err, " UNKNOWN COMMAND");
+ if (errend) {
+ *errend = 0;
+ }
+
+ pr_log_pri(PR_LOG_ERR, MOD_CLAMAV_VERSION ": Clamd Error: %s", err);
+ waserror = 1;
+
+ pr_trace_msg("clamav", 1, "Clamd scanner was not able to function; please check that Clamd is functioning before filing a bug report.");
+ }
+ }
+ fclose(fd);
+ return infected ? infected : (waserror ? -1 : 0);
+}
+
+/**
+ * Test the connection with Clamd.
+ */
+static int clamavd_connect_check(int sockd) {
+ FILE *fd = NULL;
+ char buff[32];
+
+ (void) pr_trace_msg("clamav", 6, "clamavd_connect_check (sockd %d)",
+ sockd);
+
+ if (sockd == -1)
+ return 0;
+
+ if (write(sockd, "PING\n", 5) <= 0) {
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": Clamd did not accept PING (%d): %s",
+ errno, strerror(errno));
+ close(sockd);
+ clamd_sockd = -1;
+ clam_errno = errno;
+ return 0;
+ }
+
+ if ((fd = fdopen(dup(sockd), "r")) == NULL) {
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": Clamd can not open descriptor for reading (%d): %s",
+ errno, strerror(errno));
+ close(sockd);
+ clamd_sockd = -1;
+ clam_errno = errno;
+ return 0;
+ }
+
+ if (fgets(buff, sizeof(buff), fd)) {
+ if (strstr(buff, "PONG")) {
+ fclose(fd);
+ return 1;
+ }
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": Clamd return unknown response to PING: '%s'", buff);
+ }
+
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": Clamd did not respond to fgets (%d): %s",
+ errno, strerror(errno));
+ fclose(fd);
+ close(sockd);
+ clamd_sockd = -1;
+ clam_errno = errno;
+ return 0;
+}
+
+/**
+ * Request Clamavd to perform a scan of the file contents.
+ */
+static int clamavd_scan_stream(int sockd, const char *abs_filename,
+ const char *rel_filename) {
+ u_int32_t len = 0;
+ char *buf;
+ size_t bufsz = 4096;
+ long res;
+ FILE *fd;
+
+ if (!clamavd_connect_check(sockd)) {
+ if ((clamd_sockd = clamavd_connect()) < 0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cannot re-connect to Clamd (%d): %s",
+ errno, strerror(errno));
+ clam_errno = errno;
+ return -1;
+ }
+ sockd = clamd_sockd;
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": Successfully reconnected to Clamd.");
+ clam_errno = 0;
+ }
+
+ if (write(sockd, "nINSTREAM\n", 10) <= 0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": Cannot write to the Clamd socket: %d", errno);
+ clam_errno = errno;
+ return -1;
+ }
+
+ fd = fopen(rel_filename, "r");
+ if (!fd) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": Cannot open file '%s' errno=%d.", rel_filename, errno);
+ clam_errno = errno;
+ return -1;
+ }
+
+ /* rewind file descriptor */
+ fseek(fd, 0, SEEK_SET);
+
+ buf = malloc(bufsz);
+ if (!buf) {
+ pr_log_pri(PR_LOG_CRIT, "Out of memory!");
+ end_login(1);
+ }
+
+ /* send file contents using protocol defined by Clamd */
+ while ((res = fread(buf, 1, bufsz, fd)) > 0) {
+ len = htonl(res);
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": Streaming %" PR_LU " bytes (%d, %u) to Clamd.", res, len, sizeof(len));
+ if (write(sockd, (void *) &len, sizeof(len)) <= 0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": Cannot write byte count to Clamd socket: %d", errno);
+ clam_errno = errno;
+ fclose(fd);
+ free(buf);
+ return -1;
+ }
+ if (write(sockd, buf, res) != res) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": Cannot stream file to Clamd socket: %d", errno);
+ clam_errno = errno;
+ fclose(fd);
+ free(buf);
+ return -1;
+ }
+ if (feof(fd)) break;
+ }
+ fclose(fd);
+ free(buf);
+
+ /* send null length byte, to terminate stream */
+ len = 0;
+ if (write(sockd, (void *) &len, sizeof(len)) <= 0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": Cannot write termination byte to Clamd socket: %d", errno);
+ clam_errno = errno;
+ return -1;
+ }
+ if (write(sockd, "\n", 1) <= 0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": Cannot write terminating return. %d", errno);
+ }
+
+ /* interpret results */
+ return clamavd_result(sockd, abs_filename, rel_filename);
+}
+
+/**
+ * Request Clamavd to perform a scan.
+ */
+static int clamavd_scan(int sockd, const char *abs_filename,
+ const char *rel_filename) {
+ char *scancmd = NULL;
+
+ scancmd = calloc(strlen(abs_filename) + 20, sizeof(char));
+ if (!scancmd) {
+ pr_log_pri(PR_LOG_ERR, MOD_CLAMAV_VERSION ": error: Cannot allocate memory.");
+ return -1;
+ }
+
+ (void) pr_trace_msg("clamav", 6, "abs_filename '%s' being scanned.",
+ abs_filename);
+
+ sprintf(scancmd, "SCAN %s\n", abs_filename);
+
+ if (!clamavd_connect_check(sockd)) {
+ if ((clamd_sockd = clamavd_connect()) < 0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cannot re-connect to Clamd (%d): %s",
+ errno, strerror(errno));
+ clam_errno = errno;
+ free(scancmd);
+ scancmd = NULL;
+ return -1;
+ }
+ sockd = clamd_sockd;
+
+ (void) pr_trace_msg("clamav", 4, "Successfully reconnected to the ClamAV scanner.");
+
+ clam_errno = 0;
+ }
+
+ if (write(sockd, scancmd, strlen(scancmd)) <= 0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cannot write to the Clamd socket: %d", errno);
+ free(scancmd);
+ scancmd = NULL;
+ clam_errno = errno;
+ return -1;
+ }
+
+ free(scancmd);
+ scancmd = NULL;
+ return clamavd_result(sockd, abs_filename, rel_filename);
+}
+
+/**
+ * Connect a socket to ClamAVd.
+ */
+static int clamavd_connect(void) {
+ struct sockaddr_un server;
+ struct sockaddr_in server2;
+ struct hostent *he;
+ int sockd, *port;
+
+ /**
+ * We will set the global socket to non-connected, just in-case.
+ */
+ clamd_sockd = -1;
+
+ memset((char*)&server, 0, sizeof(server));
+ memset((char*)&server2, 0, sizeof(server2));
+
+ clamd_host = (char *) get_param_ptr(CURRENT_CONF, "ClamLocalSocket", TRUE);
+ if (!clamd_host) {
+ clamd_host = (char *) get_param_ptr(CURRENT_CONF, "ClamServer", TRUE);
+ if (!clamd_host) {
+ pr_log_pri(PR_LOG_INFO,
+ MOD_CLAMAV_VERSION ": warning: No local socket or server was specified.");
+ return -1;
+ }
+ is_remote = 1;
+ if ((port = (int *) get_param_ptr(CURRENT_CONF, "ClamPort", TRUE)) <= 0)
+ clamd_port = 3310;
+ else
+ clamd_port = *port;
+
+ (void) pr_trace_msg("clamav", 4, "Connecting to remote ClamAV scanner on host '%s' and port %d.", clamd_host, clamd_port);
+ } else {
+ (void) pr_trace_msg("clamav", 4, "Connecting to local ClamAV scanner on unix socket '%s'.", clamd_host);
+ }
+
+ PRIVS_ROOT;
+
+ if (is_remote == 0) {
+ /* Local Socket */
+ server.sun_family = AF_UNIX;
+ strncpy(server.sun_path, clamd_host, sizeof(server.sun_path));
+
+ if ((sockd = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) {
+ PRIVS_RELINQUISH;
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cannot create socket connection to Clamd (%d): %s",
+ errno, strerror(errno));
+ clam_errno = errno;
+ return -1;
+ }
+
+ if (connect(sockd, (struct sockaddr *)&server, sizeof(struct sockaddr_un)) < 0) {
+ close(sockd);
+ PRIVS_RELINQUISH;
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cannot connect to Clamd (%d): %s", errno, strerror(errno));
+ clam_errno = errno;
+ return -1;
+ }
+ } else {
+ /* Remote Socket */
+ server2.sin_family = AF_INET;
+ server2.sin_port = htons(clamd_port);
+
+ if ((sockd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
+ PRIVS_RELINQUISH;
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cannot create socket connection Clamd (%d): %s",
+ errno, strerror(errno));
+ clam_errno = errno;
+ return -1;
+ }
+
+ if ((he = gethostbyname(clamd_host)) == 0) {
+ close(sockd);
+ PRIVS_RELINQUISH;
+ pr_log_pri(PR_LOG_ERR, MOD_CLAMAV_VERSION ": error: Cannot resolve hostname '%s'", clamd_host);
+ clam_errno = errno;
+ return -1;
+ }
+ server2.sin_addr = *(struct in_addr *) he->h_addr_list[0];
+
+ if (connect(sockd, (struct sockaddr *)&server2, sizeof(struct sockaddr_in)) < 0) {
+ close(sockd);
+ PRIVS_RELINQUISH;
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": error: Cannot connect to Clamd (%d): %s",
+ errno, strerror(errno));
+ clam_errno = errno;
+ return -1;
+ }
+ }
+
+ PRIVS_RELINQUISH;
+
+ clam_errno = 0;
+
+ return sockd;
+}
+
+/**
+ * Entry point of mod_xfer during an upload
+ */
+static int clamav_fsio_close(pr_fh_t *fh, int fd) {
+ char *abs_path = NULL, *rel_path = NULL;
+ struct stat st;
+ int do_scan = FALSE, res;
+ config_rec *c = NULL;
+ unsigned long *minsize, *maxsize;
+
+ /* We're only interested in STOR, APPE, and maybe STOU commands. */
+ if (session.curr_cmd) {
+ if (strcmp(session.curr_cmd, C_STOR) == 0 ||
+ strcmp(session.curr_cmd, C_APPE) == 0 ||
+ strcmp(session.curr_cmd, C_STOU) == 0) {
+ do_scan = TRUE;
+ }
+ }
+
+ if (!do_scan) {
+ return close(fd);
+ }
+
+ /* Make sure the data is written to disk, so that the fstat(2) picks
+ * up the size properly.
+ */
+ if (fsync(fd) < 0) {
+ int xerrno = errno;
+
+ pr_trace_msg(trace_channel, 9, "fsync(2) error on fd %d (path '%s'): %s",
+ fd, fh->fh_path, strerror(xerrno));
+
+ errno = xerrno;
+ return -1;
+ }
+
+ pr_fs_clear_cache();
+ if (pr_fsio_fstat(fh, &st) < 0) {
+ int xerrno = errno;
+
+ pr_trace_msg(trace_channel, 9, "pr_fsio_fstat() error on fd %d (path '%s'): %s",
+ fd, fh->fh_path, strerror(xerrno));
+
+ errno = xerrno;
+ return -1;
+ }
+
+ if (close(fd) < 0) {
+ return -1;
+ }
+
+ c = find_config(CURRENT_CONF, CONF_PARAM, "ClamAV", FALSE);
+ if (!c || !*(int *)(c->argv[0])) {
+ (void) pr_trace_msg("clamav", 8, "skipping ClamAV virus scan.");
+
+ return 0;
+ }
+
+ c = find_config(CURRENT_CONF, CONF_PARAM, "ClamFailsafe", FALSE);
+ if (!c || *(int *)(c->argv[0]))
+ remove_on_failure = 1;
+ else
+ remove_on_failure = 0;
+
+ (void) pr_trace_msg("clamav", 8, "fail-safe mode is %s.",
+ (remove_on_failure ? "ON" : "OFF"));
+
+ /**
+ * Figure out the absolute path of our directory.
+ */
+ char buf[PR_TUNABLE_PATH_MAX + 1];
+ getcwd(buf, PR_TUNABLE_PATH_MAX);
+ abs_path = fh->fh_path;
+ if (abs_path) {
+ (void) pr_trace_msg("clamav", 8, "vwd=%s fh_path=%s chroot=%s cwd=%s buf=%s",
+ pr_fs_getvwd(), abs_path, session.chroot_path, pr_fs_getcwd(),
+ buf);
+ if (strcmp(buf, pr_fs_getcwd()) != 0) {
+ if (strcmp(pr_fs_getcwd(), "/") != 0) {
+ char *pos = strstr(buf, pr_fs_getcwd());
+ if (pos) {
+ *pos = 0;
+ }
+ }
+
+ abs_path = pdircat(fh->fh_pool, buf, abs_path, NULL);
+ } else if (strcmp(buf, pr_fs_getcwd()) == 0 && session.chroot_path)
+ abs_path = pdircat(fh->fh_pool, session.chroot_path, abs_path, NULL);
+ }
+ rel_path = pstrdup(fh->fh_pool, fh->fh_path);
+
+ (void) pr_trace_msg("clamav", 6, "absolute path is '%s' and relative path is '%s'.", abs_path, rel_path);
+
+ /**
+ * Handle min/max settings
+ */
+ if ((minsize = (unsigned long *) get_param_ptr(CURRENT_CONF, "ClamMinSize", TRUE)) == 0UL)
+ clamd_minsize = 0;
+ else
+ clamd_minsize = *minsize;
+
+ if ((maxsize = (unsigned long *) get_param_ptr(CURRENT_CONF, "ClamMaxSize", TRUE)) == 0UL)
+ clamd_maxsize = 0;
+ else
+ clamd_maxsize = *maxsize;
+
+ (void) pr_trace_msg("clamav", 6, "ClamMinSize=%" PR_LU " ClamMaxSize=%" PR_LU " Filesize=%" PR_LU, clamd_minsize, clamd_maxsize, (pr_off_t) st.st_size);
+
+ if (clamd_minsize > 0) {
+ /* test the minimum size */
+ if (st.st_size < clamd_minsize) {
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": File is too small, skipping virus scan. min = %" PR_LU " size = %" PR_LU,
+ clamd_minsize, (pr_off_t) st.st_size);
+ return 0;
+ }
+ }
+
+ if (clamd_maxsize > 0) {
+ /* test the maximum size */
+ if (st.st_size > clamd_maxsize) {
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": File is too large, skipping virus scan. max = %" PR_LU " size = %" PR_LU,
+ clamd_maxsize, (pr_off_t) st.st_size);
+ return 0;
+ }
+ }
+
+ (void) pr_trace_msg("clamav", 1, "Going to virus scan absolute filename of '%s' and a relative filename of '%s'.", abs_path, rel_path);
+
+ clam_errno = 0;
+ c = find_config(CURRENT_CONF, CONF_PARAM, "ClamStream", FALSE);
+ if (c && *(int *)(c->argv[0])) {
+ res = clamavd_scan_stream(clamd_sockd, abs_path, rel_path);
+ } else {
+ res = clamavd_scan(clamd_sockd, abs_path, rel_path);
+ }
+ if (res < 0) {
+ if (remove_on_failure) {
+ pr_log_debug(DEBUG4,
+ MOD_CLAMAV_VERSION ": removing failed upload of filename = '%s' with relative filename = '%s'.", abs_path, rel_path);
+ if (clam_errno && pr_fsio_unlink(rel_path)!=0) {
+ pr_log_pri(PR_LOG_ERR,
+ MOD_CLAMAV_VERSION ": notice : unlink() failed (%d): %s",
+ errno, strerror(errno));
+ }
+ }
+ errno = EPERM;
+ return -1;
+ }
+
+ if (clam_errno == 0)
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": No virus detected in filename = '%s'.", abs_path);
+ else
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": Skipped virus scan due to errno = %d", clam_errno);
+
+ return 0;
+}
+
+/**
+ * Parse string size description and return value.
+ */
+static unsigned long parse_nbytes(char *nbytes_str, char *units_str) {
+ long res;
+ unsigned long nbytes;
+ char *endp = NULL;
+ float units_factor = 0.0;
+
+ /* clear any previous local errors */
+ clam_errno = 0;
+
+ /* first, check the given units to determine the correct multiplier
+ */
+ if (!strcasecmp("Gb", units_str)) {
+ units_factor = 1024.0 * 1024.0 * 1024.0;
+
+ } else if (!strcasecmp("Mb", units_str)) {
+ units_factor = 1024.0 * 1024.0;
+
+ } else if (!strcasecmp("Kb", units_str)) {
+ units_factor = 1024.0;
+
+ } else if (!strcasecmp("b", units_str)) {
+ units_factor = 1.0;
+
+ } else {
+ clam_errno = EINVAL;
+ return 0;
+ }
+
+ /* make sure a number was given */
+ if (!isdigit((int) *nbytes_str)) {
+ clam_errno = EINVAL;
+ return 0;
+ }
+
+ /* knowing the factor, now convert the given number string to a real
+ * number
+ */
+ res = strtol(nbytes_str, &endp, 10);
+
+ if (errno == ERANGE) {
+ clam_errno = ERANGE;
+ return 0;
+ }
+
+ if (endp && *endp) {
+ clam_errno = EINVAL;
+ return 0;
+ }
+
+ /* don't bother to apply the factor if that will cause the number to
+ * overflow
+ */
+ if (res > (ULONG_MAX / units_factor)) {
+ clam_errno = ERANGE;
+ return 0;
+ }
+
+ nbytes = (unsigned long) res * units_factor;
+ return nbytes;
+}
+
+/**
+ * Configuration setter: ClamAV
+ */
+MODRET set_clamav(cmd_rec *cmd) {
+ int bool = -1;
+ config_rec *c = NULL;
+
+ CHECK_ARGS(cmd, 1);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_LIMIT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ if ((bool = get_boolean(cmd,1)) == -1)
+ CONF_ERROR(cmd, "expected Boolean parameter");
+
+ c = add_config_param(cmd->argv[0], 1, NULL);
+ c->argv[0] = pcalloc(c->pool, sizeof(unsigned char));
+ *((unsigned char *) c->argv[0]) = bool;
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * Configuration setter: ClamStream
+ */
+MODRET set_clamstream(cmd_rec *cmd) {
+ int bool = -1;
+ config_rec *c = NULL;
+
+ CHECK_ARGS(cmd, 1);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_LIMIT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ if ((bool = get_boolean(cmd,1)) == -1)
+ CONF_ERROR(cmd, "expected Boolean parameter");
+
+ c = add_config_param(cmd->argv[0], 1, NULL);
+ c->argv[0] = pcalloc(c->pool, sizeof(unsigned char));
+ *((unsigned char *) c->argv[0]) = bool;
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * Configuration setter: ClamFailsafe
+ */
+MODRET set_clamfailsafe(cmd_rec *cmd) {
+ int bool = -1;
+ config_rec *c = NULL;
+
+ CHECK_ARGS(cmd, 1);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_LIMIT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ if ((bool = get_boolean(cmd, 1)) == -1)
+ CONF_ERROR(cmd, "expected Boolean parameter");
+
+ c = add_config_param(cmd->argv[0], 1, NULL);
+ c->argv[0] = pcalloc(c->pool, sizeof(unsigned char));
+ *((unsigned char *) c->argv[0]) = bool;
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * Configuration setter: ClamLocalSocket
+ */
+MODRET set_clamavd_local_socket(cmd_rec *cmd) {
+ config_rec *c = NULL;
+
+ CHECK_ARGS(cmd, 1);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ c = add_config_param_str("ClamLocalSocket", 1, (void *) cmd->argv[1]);
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * Configuration setter: ClamServer
+ */
+MODRET set_clamavd_server(cmd_rec *cmd) {
+ config_rec *c = NULL;
+
+ CHECK_ARGS(cmd, 1);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ c = add_config_param_str("ClamServer", 1, (void *) cmd->argv[1]);
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * Configuration setter: ClamPort
+ */
+MODRET set_clamavd_port(cmd_rec *cmd) {
+ config_rec *c = NULL;
+
+ CHECK_ARGS(cmd, 1);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ c = add_config_param(cmd->argv[0], 1, NULL);
+ c->argv[0] = pcalloc(c->pool, sizeof(int));
+ *((int *) c->argv[0]) = (int) atol(cmd->argv[1]);
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * Configuration setter: ClamMinSize
+ */
+MODRET set_clamavd_minsize(cmd_rec *cmd) {
+ config_rec *c = NULL;
+ unsigned long nbytes = 0;
+
+ CHECK_ARGS(cmd, 2);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ if ((nbytes = parse_nbytes(cmd->argv[1], cmd->argv[2])) == 0) {
+ char ulong_max[80] = {'\0'};
+ sprintf(ulong_max, "%lu", (unsigned long) ULONG_MAX);
+
+ if (clam_errno == EINVAL)
+ CONF_ERROR(cmd, "invalid parameters");
+
+ if (clam_errno == ERANGE)
+ CONF_ERROR(cmd, pstrcat(cmd->tmp_pool,
+ "number of bytes must be between 0 and ",
+ ulong_max, NULL));
+ }
+
+ c = add_config_param(cmd->argv[0], 1, NULL);
+ c->argv[0] = pcalloc(c->pool, sizeof(unsigned long));
+ *((unsigned long *) c->argv[0]) = nbytes;
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * Configuration setter: ClamMaxSize
+ */
+MODRET set_clamavd_maxsize(cmd_rec *cmd) {
+ config_rec *c = NULL;
+ unsigned long nbytes = 0;
+
+ CHECK_ARGS(cmd, 2);
+ CHECK_CONF(cmd, CONF_ROOT|CONF_VIRTUAL|CONF_GLOBAL|CONF_DIR);
+
+ if ((nbytes = parse_nbytes(cmd->argv[1], cmd->argv[2])) == 0) {
+ char ulong_max[80] = {'\0'};
+ sprintf(ulong_max, "%lu", (unsigned long) ULONG_MAX);
+
+ if (clam_errno == EINVAL)
+ CONF_ERROR(cmd, "invalid parameters");
+
+ if (clam_errno == ERANGE)
+ CONF_ERROR(cmd, pstrcat(cmd->tmp_pool,
+ "number of bytes must be between 0 and ",
+ ulong_max, NULL));
+ }
+
+ c = add_config_param(cmd->argv[0], 1, NULL);
+ c->argv[0] = pcalloc(c->pool, sizeof(unsigned long));
+ *((unsigned long *) c->argv[0]) = nbytes;
+ c->flags |= CF_MERGEDOWN;
+
+ return PR_HANDLED(cmd);
+}
+
+/**
+ * End FTP Session
+ */
+static void clamav_shutdown(const void *event_data, void *user_data) {
+ if (clamd_sockd != -1) {
+ close(clamd_sockd);
+ clamd_sockd = -1;
+ pr_log_debug(DEBUG4, MOD_CLAMAV_VERSION ": debug: disconnected from Clamd");
+ }
+}
+
+/**
+ * Start FTP Session
+ */
+static int clamav_sess_init(void) {
+ pr_fs_t *fs;
+
+ is_remote = 0; clamd_sockd = -1;
+
+ pr_event_register(&clamav_module, "core.exit", clamav_shutdown, NULL);
+
+ fs = pr_register_fs(session.pool, "clamav", "/");
+ if (fs) {
+ fs->close = clamav_fsio_close;
+ }
+
+ return 0;
+}
+
+static conftable clamav_conftab[] = {
+ { "ClamAV", set_clamav, NULL },
+ { "ClamFailsafe", set_clamfailsafe, NULL },
+ { "ClamLocalSocket", set_clamavd_local_socket, NULL },
+ { "ClamServer", set_clamavd_server, NULL },
+ { "ClamPort", set_clamavd_port, NULL },
+ { "ClamMinSize", set_clamavd_minsize, NULL },
+ { "ClamMaxSize", set_clamavd_maxsize, NULL },
+ { "ClamStream", set_clamstream, NULL },
+ { NULL }
+};
+
+module clamav_module = {
+ NULL, /* Always NULL */
+ NULL, /* Always NULL */
+ 0x20, /* module api version */
+ "clamav", /* module name */
+ clamav_conftab, /* module configuration handler table */
+ NULL, /* module command handler table */
+ NULL, /* module authentication handler table */
+ NULL, /* module initialization */
+ clamav_sess_init, /* session initialization */
+ MOD_CLAMAV_VERSION /* module version */
+};
+
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-proftpd/proftpd-mod-clamav.git
More information about the Pkg-proftpd-maintainers
mailing list