main(int argc, char *argv[]){ int i; struct db_sa *sa1 = NULL; progname = argv[0]; leak_detective = 1; tool_init_log(); for (i = 0; i < elemsof(oakley_sadb); i++) { /* make sure that leak reports and EFence reports get * placed in the right order. */ fflush(stdout); fflush(stderr); printf("\nmain mode oakley: %u\n", i); sa_print(&oakley_sadb[i]); sa1 = sa_copy_sa_first(&oakley_sadb[i]); sa_print(sa1); free_sa(sa1); fflush(stdout); report_leaks(); } tool_close_log(); exit(0); }
main(int argc, char *argv[]){ int i; struct db_sa *gsp = NULL; struct db_sa *sa1 = NULL; struct db_sa *sa2 = NULL; struct alg_info_ike *aii; char err_buf[256]; /* ??? big enough? */ EF_PROTECT_FREE = 1; EF_FREE_WIPES = 1; progname = argv[0]; leak_detective = 1; tool_init_log(); init_crypto(); aii = alg_info_ike_create_from_str("3des", err_buf, sizeof(err_buf)); gsp = oakley_alg_makedb(aii, &oakley_sadb[POLICY_RSASIG >> POLICY_ISAKMP_SHIFT], FALSE); sa_print(gsp); sa_v2_convert(&gsp); sa_v2_print(gsp); tool_close_log(); free_sa(&gsp); exit(0); }
main(int argc, char *argv[]) { int i; struct db_sa *gsp = NULL; struct db_sa *sa1 = NULL; struct db_sa *sa2 = NULL; struct alg_info_ike *aii; err_t ugh; progname = argv[0]; leak_detective=1; tool_init_log(); init_crypto(); aii = alg_info_ike_create_from_str("3des", &ugh); gsp = oakley_alg_makedb(aii , &oakley_sadb[POLICY_RSASIG >> POLICY_ISAKMP_SHIFT] , -1); sa_print(gsp); tool_close_log(); exit(0); }
int main(int argc, char *argv[]) { int i; struct db_sa *sa1 = NULL; struct db_sa *sa2 = NULL; progname = argv[0]; leak_detective=1; tool_init_log(); for(i=0; i < elemsof(oakley_sadb); i++) { printf("\nmain mode oakley: %u\n", i); sa_print(&oakley_sadb[i]); sa1 = sa_copy_sa(&oakley_sadb[i], 0); if(sa2 != NULL) { free_sa(sa2); } sa2 = sa_copy_sa(sa1, 0); free_sa(sa1); printf("copy 2\n"); sa_print(sa2); } for(i=0; i < elemsof(oakley_am_sadb); i++) { printf("\naggr mode oakley: %u\n", i); sa_print(&oakley_am_sadb[i]); sa1 = sa_copy_sa(&oakley_am_sadb[i], 0); if(sa2 != NULL) { free_sa(sa2); } sa2 = sa_copy_sa(sa1, 0); free_sa(sa1); printf("copy 2\n"); sa_print(sa2); } if(sa2 != NULL) free_sa(sa2); report_leaks(); tool_close_log(); exit(0); }
main(int argc, char *argv[]){ int i; struct db_sa *gsp = NULL; struct db_sa *sa1 = NULL; struct db_sa *sa2 = NULL; progname = argv[0]; leak_detective = 1; tool_init_log(); for (i = 0; i < elemsof(oakley_sadb); i++) { gsp = sa_copy_sa(&oakley_empty, 0); printf("\nmain mode oakley: %u\n", i); //sa_print(&oakley_sadb[i]); sa1 = sa_copy_sa(&oakley_sadb[i], 0); sa2 = sa_merge_proposals(gsp, sa1); printf("sa1:\n"); sa_print(sa1); printf("gsp:\n"); sa_print(gsp); printf("sa2:\n"); sa_print(sa2); free_sa(sa1); free_sa(sa2); free_sa(gsp); report_leaks(); } tool_close_log(); exit(0); }
main(int argc, char *argv[]) { int i; struct db_sa *gsp = NULL; struct db_sa *sa1 = NULL; struct db_sa *sa2 = NULL; struct alg_info_esp *aii; char err_buf[100]; EF_PROTECT_FREE = 1; EF_FREE_WIPES = 1; EF_PROTECT_BELOW = 1; progname = argv[0]; leak_detective = 1; tool_init_log(); init_crypto(); { int algo; for (algo = 1; algo <= K_SADB_EALG_MAX; algo++) esp_ealg[(algo)].sadb_alg_id = (algo); } { int algo; for (algo = 1; algo <= K_SADB_AALG_MAX; algo++) esp_aalg[(algo)].sadb_alg_id = (algo); } esp_ealg_num = 10; esp_aalg_num = 10; aii = alg_info_esp_create_from_str("aes128-sha1", &err_buf, sizeof(err_buf)); gsp = kernel_alg_makedb(POLICY_ENCRYPT | POLICY_AUTHENTICATE, aii, TRUE); sa_print(gsp); gsp = sa_v2_convert(gsp); sa_v2_print(gsp); tool_close_log(); free_sa(gsp); exit(0); }
int main(int argc, char *argv[]) { int c, go_forever, j; int cflag = 0; /* client stats */ int sflag = 0; /* server stats */ int nflag = 0; /* nfs stats */ int rflag = 0; /* rpc stats */ int mflag = 0; /* mount table stats */ int aflag = 0; /* print acl statistics */ int vflag = 0; /* version specified, 0 specifies all */ int zflag = 0; /* zero stats after printing */ char *split_line = "*******************************************" "*************************************"; interval = 0; count = 0; go_forever = 0; while ((c = getopt(argc, argv, "cnrsmzav:")) != EOF) { switch (c) { case 'c': cflag++; break; case 'n': nflag++; break; case 'r': rflag++; break; case 's': sflag++; break; case 'm': mflag++; break; case 'z': if (geteuid()) fail(0, "Must be root for z flag\n"); zflag++; break; case 'a': aflag++; break; case 'v': vflag = atoi(optarg); if ((vflag < 2) || (vflag > 4)) fail(0, "Invalid version number\n"); break; case '?': default: usage(); } } if (((argc - optind) > 0) && !mflag) { interval = safe_strtoi(argv[optind], "invalid interval"); if (interval < 1) fail(0, "invalid interval\n"); optind++; if ((argc - optind) > 0) { count = safe_strtoi(argv[optind], "invalid count"); if ((count <= 0) || (count == NULL)) fail(0, "invalid count\n"); } optind++; if ((argc - optind) > 0) usage(); /* * no count number was set, so we will loop infinitely * at interval specified */ if (!count) go_forever = 1; stats_timer(interval); } else if (mflag) { if (cflag || rflag || sflag || zflag || nflag || aflag || vflag) fail(0, "The -m flag may not be used with any other flags"); for (j = 0; (argc - optind > 0) && (j < (MAX_PATHS - 1)); j++) { path[j] = argv[optind]; if (*path[j] != '/') fail(0, "Please fully qualify your pathname " "with a leading '/'"); optind++; } path[j] = NULL; if (argc - optind > 0) fprintf(stderr, "Only the first 50 paths " "will be searched for\n"); } setup(); do { if (mflag) { mi_print(); } else { if (sflag && (rpc_clts_server_kstat == NULL || nfs_server_v4_kstat == NULL)) { fprintf(stderr, "nfsstat: kernel is not configured with " "the server nfs and rpc code.\n"); } /* if s and nothing else, all 3 prints are called */ if (sflag || (!sflag && !cflag)) { if (rflag || (!rflag && !nflag && !aflag)) sr_print(zflag); if (nflag || (!rflag && !nflag && !aflag)) sn_print(zflag, vflag); if (aflag || (!rflag && !nflag && !aflag)) sa_print(zflag, vflag); } if (cflag && (rpc_clts_client_kstat == NULL || nfs_client_kstat == NULL)) { fprintf(stderr, "nfsstat: kernel is not configured with" " the client nfs and rpc code.\n"); } if (cflag || (!sflag && !cflag)) { if (rflag || (!rflag && !nflag && !aflag)) cr_print(zflag); if (nflag || (!rflag && !nflag && !aflag)) cn_print(zflag, vflag); if (aflag || (!rflag && !nflag && !aflag)) ca_print(zflag, vflag); } } if (zflag) putstats(); if (interval) printf("%s\n", split_line); if (interval > 0) (void) pause(); } while ((--count > 0) || go_forever); kstat_close(kc); free(ksum_kstat); return (0); }
void sa_println(Array array) { sa_assert_element_size(array); sa_print(array); printf("\n"); }