virtual void SetUp() override { struct sa laddr; int err; #if 0 log_set_min_level(LOG_LEVEL_WARN); log_enable_stderr(true); #endif aucodec_register(&aucodecl, &dummy_opus); vidcodec_register(&vidcodecl, &dummy_vp8); sa_set_str(&laddr, "127.0.0.1", 0); err = create_dtls_srtp_context(&dtls, CERT_TYPE_RSA); ASSERT_EQ(0, err); err = mediaflow_alloc(&mf, dtls, &aucodecl, &laddr, MEDIAFLOW_TRICKLEICE_DUALSTACK, CRYPTO_DTLS_SRTP, false, mediaflow_localcand_handler, mediaflow_estab_handler, mediaflow_close_handler, this); ASSERT_EQ(0, err); ASSERT_TRUE(mf != NULL); }
int main(int argc, char **argv) { struct evdns_base *dns; struct event_base *base; struct bufferevent *bev; struct url *socks, *host; int s4; base = event_base_new(); dns = evdns_base_new(base, 1); log_set_file(NULL); log_set_min_level(LOG_DEBUG); if (argc >= 3) { socks = url_tokenize(argv[2]); s4 = !evutil_ascii_strcasecmp("socks4", socks->scheme); if (conn_set_socks_server(socks->host, socks->port, s4? SOCKS_4 : SOCKS_4a) < 0) return 0; } host = url_connect_tokenize(argv[1]); bev = bufferevent_socket_new(base, -1, BEV_OPT_CLOSE_ON_FREE); conn_connect_bufferevent(bev, dns, AF_INET, host->host, host->port, do_connect, NULL); event_base_dispatch(base); return 0; }
TEST(version, print) { log_set_min_level(LOG_LEVEL_INFO); log_enable_stderr(true); avs_print_versions(); avs_print_network(); print_udp_bufsize(AF_INET); print_udp_bufsize(AF_INET6); }
static void decrease_log_verbosity(void) { switch (log_get_min_level()) { case LOG_DEBUG: log_set_min_level(LOG_INFO); break; case LOG_INFO: log_set_min_level(LOG_NOTICE); break; case LOG_NOTICE: log_set_min_level(LOG_WARN); break; case LOG_WARN: log_set_min_level(LOG_ERROR); break; case LOG_ERROR: log_set_min_level(LOG_FATAL); break; default: break; } }
/* Callback for authentication method independent option parsing. */ static gpg_error_t pam_poldi_options_cb (void *cookie, simpleparse_opt_spec_t spec, const char *arg) { gpg_err_code_t err = GPG_ERR_NO_ERROR; poldi_ctx_t ctx = cookie; if (!strcmp (spec.long_opt, "log-file")) { /* LOG-FILE. */ ctx->logfile = xtrystrdup (arg); if (!ctx->logfile) { err = gpg_error_from_errno (errno); log_msg_error (ctx->loghandle, _("failed to duplicate %s: %s"), "logfile name", gpg_strerror (err)); } } else if (!strcmp (spec.long_opt, "scdaemon-program")) { /* SCDAEMON-PROGRAM. */ ctx->scdaemon_program = strdup (arg); if (!ctx->scdaemon_program) { err = gpg_error_from_errno (errno); log_msg_error (ctx->loghandle, _("failed to duplicate %s: %s"), "scdaemon program name", gpg_strerror (err)); } } else if (!strcmp (spec.long_opt, "scdaemon-options")) { /* SCDAEMON-OPTIONS. */ ctx->scdaemon_options = strdup (arg); if (!ctx->scdaemon_options) { err = gpg_error_from_errno (errno); log_msg_error (ctx->loghandle, _("failed to duplicate %s: %s"), "scdaemon options name", gpg_strerror (err)); } } else if (!strcmp (spec.long_opt, "auth-method")) { /* AUTH-METHOD. */ int method = auth_method_lookup (arg); if (method >= 0) ctx->auth_method = method; else { log_msg_error (ctx->loghandle, _("unknown authentication method '%s'"), arg); err = GPG_ERR_INV_VALUE; } } else if (!strcmp (spec.long_opt, "debug")) { /* DEBUG. */ ctx->debug = 1; log_set_min_level (ctx->loghandle, LOG_LEVEL_DEBUG); } else if (!strcmp (spec.long_opt, "modify-environment")) { /* MODIFY-ENVIRONMENT. */ ctx->modify_environment = 1; } else if (!strcmp (spec.long_opt, "quiet")) { /* QUIET. */ ctx->quiet = 1; } return gpg_error (err); }