bool AP_Arming_Sub::pre_arm_checks(bool report) { if (armed) { return true; } return AP_Arming::pre_arm_checks(report) & rc_check(report); }
int main (int argc, char **argv) { int result = ERROR_RC; int c,i; char *p, msg[4096]; SERVER *srv; char *path_radiusclient_conf = RC_CONFIG_FILE; rc_handle *rh; extern int optind; pname = (pname = strrchr(argv[0],'/'))?pname+1:argv[0]; rc_openlog(pname); while ((c = getopt(argc,argv,"hVf:")) > 0) { switch(c) { case 'f': path_radiusclient_conf = optarg; break; case 'V': version(); break; case 'h': usage(); break; default: exit(ERROR_RC); break; } } argc -= optind; argv += optind; if ((rh = rc_read_config(path_radiusclient_conf)) == NULL) exit(ERROR_RC); if (rc_read_dictionary(rh, rc_conf_str(rh, "dictionary")) != 0) exit (ERROR_RC); if (argc > 0) { for (i = 0; i < argc; i++) { if ((p = strchr(argv[i], ':')) == NULL) { result = rc_check(rh, argv[i],rc_getport(AUTH), msg); } else if (!strcmp(p+1, "auth")) { *p = '\0'; result = rc_check(rh, argv[i],rc_getport(AUTH), msg); } else if (!strcmp(p+1, "acct")) { *p = '\0'; result = rc_check(rh, argv[i],rc_getport(ACCT), msg); } else { *p = '\0'; result = rc_check(rh, argv[i], atoi(p+1), msg); } if (result == OK_RC) fputs(msg, stdout); else printf(SC_STATUS_FAILED); } } else { srv = rc_conf_srv(rh, "authserver"); for(i=0; i<srv->max ; i++) { result = rc_check(rh, srv->name[i], srv->port[i], msg); fputs(msg, stdout); } srv = rc_conf_srv(rh, "acctserver"); for(i=0; i<srv->max ; i++) { result = rc_check(rh, srv->name[i], srv->port[i], msg); fputs(msg, stdout); } } }