- Timestamp:
- Feb 12, 2006, 10:49:56 PM (19 years ago)
- Location:
- trunk/src
- Files:
-
- 11 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/cutest_sh_tiger0.c
r17 r19 233 233 CuAssertTrue(tc, result == 0); 234 234 235 236 235 } 236 237 /* test checksum of file upto some given length 238 */ 239 void Test_tiger_file_with_length(CuTest *tc) { 240 241 SL_TICKET rval_open; 242 FILE * fp; 243 int result; 244 char * actual; 245 char * expected; 246 247 char * teststring = "Tiger - A Fast New Hash Function, by Ross Anderson and Eli Biham, proceedings of Fast Software Encryption 3, Cambridge, 1996.\n"; 248 int testlen = strlen(teststring); 249 250 init(); 251 252 fp = fopen("cutest_foo", "w"); 253 CuAssertPtrNotNull(tc, fp); 254 255 result = fprintf(fp, "%s", teststring); 256 CuAssertTrue(tc, result >= 0); 257 result = fprintf(fp, "%s", teststring); 258 CuAssertTrue(tc, result >= 0); 259 260 result = fclose(fp); 261 CuAssertTrue(tc, result == 0); 262 263 result = sh_tiger_hashtype("TIGER192"); 264 CuAssertTrue(tc, result == 0); 265 266 /* same as GnuPG 1.0.6 (gpg --load-extension tiger --print-md TIGER192) 267 */ 268 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, testlen, 0); 269 expected = "75B98A7AE257A230189828A40792E30B4038D286479CC7B8"; 270 CuAssertStrEquals(tc, expected, actual); 271 272 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, 2*testlen, 0); 273 expected = "B5B4FB97B01ADB58794D87A6A01B2368852FA764BD93AB90"; 274 CuAssertStrEquals(tc, expected, actual); 275 276 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, 0, 0); 277 expected = "B5B4FB97B01ADB58794D87A6A01B2368852FA764BD93AB90"; 278 CuAssertStrEquals(tc, expected, actual); 279 280 fp = fopen("cutest_foo", "a"); 281 CuAssertPtrNotNull(tc, fp); 282 result = fprintf(fp, "%s", teststring); 283 CuAssertTrue(tc, result >= 0); 284 result = fclose(fp); 285 CuAssertTrue(tc, result == 0); 286 287 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, testlen, 0); 288 expected = "75B98A7AE257A230189828A40792E30B4038D286479CC7B8"; 289 CuAssertStrEquals(tc, expected, actual); 290 291 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, 2*testlen, 0); 292 expected = "B5B4FB97B01ADB58794D87A6A01B2368852FA764BD93AB90"; 293 CuAssertStrEquals(tc, expected, actual); 294 295 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, 3*testlen, 0); 296 expected = "D0EE1A9956CAB22D84B51A5E0C093B724828C6A1F9CBDB7F"; 297 CuAssertStrEquals(tc, expected, actual); 298 299 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, 0, 0); 300 expected = "D0EE1A9956CAB22D84B51A5E0C093B724828C6A1F9CBDB7F"; 301 CuAssertStrEquals(tc, expected, actual); 302 303 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FILE, 5, 0); 304 expected = "9F00F599072300DD276ABB38C8EB6DEC37790C116F9D2BDF"; 305 CuAssertStrEquals(tc, expected, actual); 306 307 /* same results as GNU md5sum */ 308 309 result = sh_tiger_hashtype("MD5"); 310 CuAssertTrue(tc, result == 0); 311 312 rval_open = sl_open_fastread ("cutest_foo", SL_YESPRIV); 313 CuAssertTrue(tc, rval_open >= 0); 314 tiger_fd = rval_open; 315 316 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, testlen, 0); 317 expected = "11E7E7EA486136273606BEE57C71F34B0000000000000000"; 318 CuAssertStrEquals(tc, expected, actual); 319 320 result = sl_rewind(rval_open); 321 CuAssertTrue(tc, rval_open >= 0); 322 323 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, 2*testlen, 0); 324 expected = "D49DAD474095D467E2E5EFCB2DC23A770000000000000000"; 325 CuAssertStrEquals(tc, expected, actual); 326 327 result = sl_rewind(rval_open); 328 CuAssertTrue(tc, rval_open >= 0); 329 330 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, 3*testlen, 0); 331 expected = "00A1F1C5EDDCCFC430D3862FDA94593E0000000000000000"; 332 CuAssertStrEquals(tc, expected, actual); 333 334 result = sl_rewind(rval_open); 335 CuAssertTrue(tc, rval_open >= 0); 336 337 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, 0, 0); 338 expected = "00A1F1C5EDDCCFC430D3862FDA94593E0000000000000000"; 339 CuAssertStrEquals(tc, expected, actual); 340 341 /* same result as gpg --print-md SHA1 342 */ 343 344 result = sh_tiger_hashtype("SHA1"); 345 CuAssertTrue(tc, result == 0); 346 347 result = sl_rewind(rval_open); 348 CuAssertTrue(tc, rval_open >= 0); 349 350 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, testlen, 0); 351 expected = "F37DB4344CCD140EE315179E9A27512FB4704F0F00000000"; 352 CuAssertStrEquals(tc, expected, actual); 353 354 result = sl_rewind(rval_open); 355 CuAssertTrue(tc, rval_open >= 0); 356 357 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, 2*testlen, 0); 358 expected = "D2AD5FC366452D81400BAC31F96269DEEF314BC200000000"; 359 CuAssertStrEquals(tc, expected, actual); 360 361 result = sl_rewind(rval_open); 362 CuAssertTrue(tc, rval_open >= 0); 363 364 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, 3*testlen, 0); 365 expected = "FAA937EF3389C7E786EB0F1006D049D7AEA7B7B600000000"; 366 CuAssertStrEquals(tc, expected, actual); 367 368 result = sl_rewind(rval_open); 369 CuAssertTrue(tc, rval_open >= 0); 370 371 actual = sh_tiger_generic_hash("cutest_foo", TIGER_FD, 0, 0); 372 expected = "FAA937EF3389C7E786EB0F1006D049D7AEA7B7B600000000"; 373 CuAssertStrEquals(tc, expected, actual); 374 375 result = sl_close(rval_open); 376 CuAssertTrue(tc, result == 0); 377 378 result = remove("cutest_foo"); 379 CuAssertTrue(tc, result == 0); 380 } -
trunk/src/cutest_sh_tools.c
r17 r19 4 4 #include <string.h> 5 5 #include "CuTest.h" 6 #include "samhain.h" 6 7 #include "sh_tools.h" 7 8 -
trunk/src/make-tests.sh
r17 r19 6 6 # Author: Asim Jalis 7 7 # Date: 01/08/2003 8 9 # Modified to return non-zero if any test has failed 10 # Rainer Wichmann, 29. Jan 2006 11 # ...and to print to stderr if any test has failed 12 # Rainer Wichmann, 31. Jan 2006 8 13 9 14 if test $# -eq 0 ; then FILES=*.c ; else FILES=$* ; fi … … 26 31 ' 27 32 28 voidRunAllTests(void)33 int RunAllTests(void) 29 34 { 30 35 CuString *output = CuStringNew(); … … 43 48 CuSuiteSummary(suite, output); 44 49 CuSuiteDetails(suite, output); 45 printf("%s\n", output->buffer); 50 if (suite->failCount > 0) 51 fprintf(stderr, "%s\n", output->buffer); 52 else 53 fprintf(stdout, "%s\n", output->buffer); 54 return suite->failCount; 46 55 } 47 56 48 57 int main(void) 49 58 { 50 RunAllTests(); 51 return 0; 59 int retval; 60 retval = RunAllTests(); 61 return (retval == 0) ? 0 : 1; 52 62 } 53 63 ' -
trunk/src/samhain.c
r18 r19 1752 1752 } 1753 1753 1754 if (sig_suspend_switch == 1) /* SIGUSR2 */1754 if (sig_suspend_switch > 0) /* SIGUSR2 */ 1755 1755 { 1756 1756 TPT((0, FIL__, __LINE__, _("msg=<Suspend switch.>\n"))); … … 1762 1762 sh_global_suspend_flag = 1; 1763 1763 } 1764 sig_suspend_switch = 0;1764 --sig_suspend_switch; 1765 1765 --sig_raised; --sig_urgent; 1766 1766 } -
trunk/src/sh_err_log.c
r1 r19 755 755 if (skey->mlock_failed == SL_FALSE) 756 756 { 757 if ( (-1) == sh_unix_mlock( log_msg.msg,757 if ( (-1) == sh_unix_mlock( FIL__, __LINE__, log_msg.msg, 758 758 (size_t)(2*KEY_LEN + status + 32) ) ) 759 759 { -
trunk/src/sh_files.c
r8 r19 590 590 if (0 == strncmp(myword, _("HLN"), 3)) 591 591 sh_files_set_mask (mask, MODI_HLN, act); 592 /* size may grow */ 593 if (0 == strncmp(myword, _("GROW"), 3)) 594 sh_files_set_mask (mask, MODI_SGROW, act); 595 /* use prelink */ 596 if (0 == strncmp(myword, _("PRE"), 3)) 597 sh_files_set_mask (mask, MODI_PREL, act); 592 598 593 599 } … … 1010 1016 ++dcount; 1011 1017 } 1012 ptr->checked = S_TRUE; 1018 ptr->checked = S_TRUE; 1019 ptr->childs_checked = S_TRUE; 1013 1020 } 1014 1021 … … 1425 1432 1426 1433 dirstack_t * dst_ptr; 1434 dirstack_t * tmp_ptr; 1427 1435 1428 1436 int hardlink_num = 0; … … 1645 1653 file_class_next = dst_ptr->class; 1646 1654 checked_flag = dst_ptr->checked; 1647 cchecked_flag = dst_ptr->childs_checked; 1655 /* not set, hence always FALSE */ 1656 /* cchecked_flag = dst_ptr->childs_checked; */ 1648 1657 } 1649 1658 … … 1708 1717 cchecked_flag = -1; 1709 1718 1710 dst_ptr = (dirstack_t *) zAVLSearch(zdirListOne, tmpcat);1711 1712 if ( dst_ptr)1719 tmp_ptr = (dirstack_t *) zAVLSearch(zdirListOne, tmpcat); 1720 1721 if (tmp_ptr) 1713 1722 { 1714 1723 TPT((0, FIL__, __LINE__, 1715 1724 _("msg=<%s -> recursion depth %d\n>"), 1716 dst_ptr->name, dst_ptr->rdepth));1717 rdepth_next = dst_ptr->rdepth;1718 class_next = dst_ptr->class;1725 tmp_ptr->name, tmp_ptr->rdepth)); 1726 rdepth_next = tmp_ptr->rdepth; 1727 class_next = tmp_ptr->class; 1719 1728 /* 28. Aug 2001 reversed 1720 1729 */ 1721 cchecked_flag = dst_ptr->childs_checked;1722 checked_flag = dst_ptr->checked;1730 cchecked_flag = tmp_ptr->childs_checked; 1731 checked_flag = tmp_ptr->checked; 1723 1732 } 1724 1733 1725 1734 if (checked_flag == -1) 1726 1735 { 1727 dst_ptr = (dirstack_t *) zAVLSearch(zdirListTwo, tmpcat);1728 1729 if ( dst_ptr)1736 tmp_ptr = (dirstack_t *) zAVLSearch(zdirListTwo, tmpcat); 1737 1738 if (tmp_ptr) 1730 1739 { 1731 1740 TPT((0, FIL__, __LINE__, 1732 1741 _("msg=<%s -> recursion depth %d\n>"), 1733 dst_ptr->name, dst_ptr->rdepth));1734 rdepth_next = dst_ptr->rdepth;1735 class_next = dst_ptr->class;1742 tmp_ptr->name, tmp_ptr->rdepth)); 1743 rdepth_next = tmp_ptr->rdepth; 1744 class_next = tmp_ptr->class; 1736 1745 /* 28. Aug 2001 reversed 1737 1746 */ 1738 cchecked_flag = dst_ptr->childs_checked;1739 checked_flag = dst_ptr->checked;1747 cchecked_flag = tmp_ptr->childs_checked; 1748 checked_flag = tmp_ptr->checked; 1740 1749 } 1741 1750 } … … 1745 1754 sh_files_checkdir (class_next, rdepth_next, tmpcat, 1746 1755 dirlist->sh_d_name); 1747 dst_ptr->childs_checked = S_TRUE; 1756 tmp_ptr->childs_checked = S_TRUE; 1757 /* 1758 * 04. Feb 2006 avoid double checking 1759 */ 1760 tmp_ptr->checked = S_TRUE; 1748 1761 } 1749 1762 else if (checked_flag == -1) … … 1768 1781 1769 1782 dirlist = dirlist->next; 1783 1784 if (dst_ptr) 1785 dst_ptr->childs_checked = S_TRUE; 1770 1786 1771 1787 } while (dirlist != NULL); … … 1820 1836 */ 1821 1837 char fullpath[PATH_MAX]; 1822 char fileHash[ KEY_LEN + 1];1838 char fileHash[2*(KEY_LEN + 1)]; 1823 1839 int status; 1824 1840 file_type theFile; -
trunk/src/sh_forward.c
r12 r19 4995 4995 } 4996 4996 4997 if (sig_suspend_switch == 1) /* SIGUSR2 */4997 if (sig_suspend_switch > 0) /* SIGUSR2 */ 4998 4998 { 4999 4999 TPT((0, FIL__, __LINE__, _("msg=<Suspend switch.>\n"))); … … 5005 5005 sh_global_suspend_flag = 1; 5006 5006 } 5007 sig_suspend_switch = 0;5007 --sig_suspend_switch; 5008 5008 --sig_raised; --sig_urgent; 5009 5009 } … … 5171 5171 tcurrent = (unsigned long) time (NULL); 5172 5172 5173 /* check for time limit exceeded 5174 */ 5175 if ((tcurrent - tchkold) > (unsigned int) 3 ) 5176 { 5177 tchkold = tcurrent; 5178 client_time_check(/* all_clients */); 5179 } 5180 5181 /* seed / re-seed the PRNG if required 5182 */ 5183 (void) taus_seed(); 5184 5173 5185 /* select() timeout handling. 5174 5186 */ … … 5246 5258 } 5247 5259 } 5248 5249 /* check for time limit exceeded 5250 */ 5251 if ((tcurrent - tchkold) > (unsigned int) 3 ) 5252 { 5253 tchkold = tcurrent; 5254 client_time_check(/* all_clients */); 5255 } 5256 tcurrent = tcurrent; 5257 5258 /* seed / re-seed the PRNG if required 5259 */ 5260 (void) taus_seed(); 5261 5260 /* continue */ 5262 5261 } 5263 5262 /* notreached */ -
trunk/src/sh_hash.c
r18 r19 2485 2485 2486 2486 if ( (fileHash != NULL) && (p->theFile.checksum != NULL) && 2487 (strncmp (fileHash, p->theFile.checksum, 50) != 0) &&2487 (strncmp (fileHash, p->theFile.checksum, KEY_LEN) != 0) && 2488 2488 (theFile->check_mask & MODI_CHK) != 0) 2489 2489 { 2490 modi_mask |= MODI_CHK; 2491 change_code[0] = 'C'; 2492 TPT ((0, FIL__, __LINE__, _("mod=<checksum>"))); 2490 if ((theFile->check_mask & MODI_SGROW) == 0) 2491 { 2492 modi_mask |= MODI_CHK; 2493 change_code[0] = 'C'; 2494 TPT ((0, FIL__, __LINE__, _("mod=<checksum>"))); 2495 } 2496 else 2497 { 2498 if (0 != strncmp (&fileHash[KEY_LEN + 1], 2499 p->theFile.checksum, KEY_LEN)) 2500 { 2501 modi_mask |= MODI_CHK; 2502 change_code[0] = 'C'; 2503 TPT ((0, FIL__, __LINE__, _("mod=<checksum>"))); 2504 } 2505 else 2506 { 2507 p->theFile.size = theFile->size; 2508 sl_strlcpy(p->theFile.checksum, fileHash, KEY_LEN+1); 2509 } 2510 } 2493 2511 } 2494 2512 … … 2621 2639 (theFile->check_mask & MODI_SIZ) != 0) 2622 2640 { 2623 if (class == SH_LEVEL_LOGGROW && theFile->size < (off_t) p->theFile.size) 2641 if ((theFile->check_mask & MODI_SGROW) == 0 || 2642 theFile->size < (off_t) p->theFile.size) 2624 2643 { 2625 2644 modi_mask |= MODI_SIZ; 2626 2645 change_code[9] = 'S'; 2627 2646 TPT ((0, FIL__, __LINE__, _("mod=<size>"))); 2628 } 2629 else if (class != SH_LEVEL_LOGGROW) 2630 { 2631 modi_mask |= MODI_SIZ; 2632 change_code[9] = 'S'; 2633 TPT ((0, FIL__, __LINE__, _("mod=<size>"))); 2634 } 2647 } 2635 2648 } 2636 2649 change_code[10] = '\0'; -
trunk/src/sh_suidchk.c
r1 r19 417 417 418 418 file_type theFile; 419 char fileHash[ KEY_LEN + 1];419 char fileHash[2*(KEY_LEN + 1)]; 420 420 421 421 SL_ENTER(_("sh_suidchk_check_internal")); -
trunk/src/sh_tiger0.c
r18 r19 104 104 static 105 105 word64 * sh_tiger_hash_val (char * filename, TigerType what, 106 unsigned longLength, int timeout)106 UINT64 Length, int timeout) 107 107 #else 108 108 static 109 109 sh_word32 * sh_tiger_hash_val (char * filename, TigerType what, 110 unsigned longLength, int timeout)110 UINT64 Length, int timeout) 111 111 #endif 112 112 { … … 117 117 char * tmp; 118 118 sh_byte * bptr; 119 sh_byte bbuf[64]; 119 sh_byte bbuf[64]; 120 UINT64 bcount = 0; 120 121 121 122 static int lockflag = SL_FALSE; … … 178 179 179 180 #if defined(HAVE_MLOCK) && !defined(HAVE_BROKEN_MLOCK) 180 if ( lockflag == SL_FALSE && skey->mlock_failed == SL_FALSE)181 if ((lockflag == SL_FALSE) && (skey->mlock_failed == SL_FALSE)) 181 182 { 182 if ( (-1) == sh_unix_mlock((char *)buffer,(PRIV_MAX)*sizeof(sh_byte))) 183 lockflag = SL_TRUE; 184 if ( (-1) == sh_unix_mlock(FIL__, __LINE__, 185 (char *)buffer, 186 (PRIV_MAX)*sizeof(sh_byte))) 183 187 skey->mlock_failed = SL_TRUE; 184 lockflag = SL_TRUE;185 188 } 186 189 #else 187 190 if (lockflag == SL_FALSE && skey->mlock_failed == SL_FALSE) 188 191 { 192 lockflag = SL_TRUE; 189 193 skey->mlock_failed = SL_TRUE; 190 lockflag = SL_TRUE;191 194 } 192 195 #endif … … 229 232 230 233 SL_RETURN( NULL, _("sh_tiger_hash_val")); 234 } 235 236 if (Length > 0) 237 { 238 bcount += count; 239 if (bcount > Length) 240 count = count - (bcount - Length); 241 count = (count < 0) ? 0 : count; 231 242 } 232 243 … … 382 393 if (what == TIGER_DATA && filename != NULL) 383 394 { 384 tiger(TIGER_CAST filename, 395 tiger(TIGER_CAST filename, (sh_word32) Length, res); 385 396 SL_RETURN(res, _("sh_tiger_hash_val")); 386 397 } … … 692 703 resulting message digest number will be written into the 16 bytes 693 704 beginning at RESBLOCK. */ 694 static int md5_stream(char * filename, void *resblock, int timeout) 705 static int md5_stream(char * filename, void *resblock, 706 UINT64 Length, int timeout) 695 707 { 696 708 /* Important: BLOCKSIZE must be a multiple of 64. */ … … 702 714 char * tmp; 703 715 uid_t euid; 716 UINT64 bcount = 0; 704 717 705 718 unsigned long pages_read; … … 762 775 } 763 776 777 if (Length > 0) 778 { 779 bcount += n; 780 if (bcount > Length) 781 n = n - (bcount - Length); 782 n = (n < 0) ? 0 : n; 783 } 784 764 785 sum += n; 765 786 } … … 807 828 static 808 829 char * sh_tiger_md5_hash (char * filename, TigerType what, 809 unsigned longLength, int timeout)810 { 811 int cnt = (int) Length;830 UINT64 Length, int timeout) 831 { 832 int cnt; 812 833 static char out[KEY_LEN+1]; 813 834 unsigned char md5buffer[16]; … … 822 843 } 823 844 824 (void) md5_stream (filename, md5buffer, timeout);845 (void) md5_stream (filename, md5buffer, Length, timeout); 825 846 826 847 /*@-bufferoverflowhigh -usedef@*/ … … 1202 1223 resulting message digest number will be written into the 16 bytes 1203 1224 beginning at RESBLOCK. */ 1204 static int sha1_stream(char * filename, void *resblock, int timeout) 1225 static int sha1_stream(char * filename, void *resblock, 1226 UINT64 Length, int timeout) 1205 1227 { 1206 1228 /* Important: BLOCKSIZE must be a multiple of 64. */ … … 1212 1234 char * tmp; 1213 1235 uid_t euid; 1236 UINT64 bcount = 0; 1214 1237 1215 1238 unsigned long pages_read; … … 1275 1298 } 1276 1299 1300 if (Length > 0) 1301 { 1302 bcount += n; 1303 if (bcount > Length) 1304 n = n - (bcount - Length); 1305 n = (n < 0) ? 0 : n; 1306 } 1307 1277 1308 sum += n; 1278 1309 } … … 1322 1353 1323 1354 static char * sh_tiger_sha1_hash (char * filename, TigerType what, 1324 unsigned longLength, int timeout)1355 UINT64 Length, int timeout) 1325 1356 { 1326 1357 int cnt = (int) Length; /* fix compiler warning */ … … 1337 1368 } 1338 1369 1339 (void) sha1_stream (filename, sha1buffer, timeout);1370 (void) sha1_stream (filename, sha1buffer, Length, timeout); 1340 1371 1341 1372 /*@-bufferoverflowhigh -usedef@*/ … … 1388 1419 1389 1420 static char * sh_tiger_hash_internal (char * filename, TigerType what, 1390 unsigned longLength, int timeout);1421 UINT64 Length, int timeout); 1391 1422 1392 1423 char * sh_tiger_hash (char * filename, TigerType what, 1393 unsigned longLength)1424 UINT64 Length) 1394 1425 { 1395 1426 return sh_tiger_hash_internal (filename, what, Length, 0); … … 1397 1428 1398 1429 char * sh_tiger_generic_hash (char * filename, TigerType what, 1399 unsigned longLength, int timeout)1430 UINT64 Length, int timeout) 1400 1431 { 1401 1432 #ifdef USE_SHA1 … … 1414 1445 1415 1446 static char * sh_tiger_hash_internal (char * filename, TigerType what, 1416 unsigned longLength, int timeout)1447 UINT64 Length, int timeout) 1417 1448 { 1418 1449 #if defined(TIGER_64_BIT) … … 1423 1454 static char out[KEY_LEN+1]; 1424 1455 1425 SL_ENTER( _("sh_tiger_hash "));1456 SL_ENTER( _("sh_tiger_hash_internal")); 1426 1457 1427 1458 res = sh_tiger_hash_val (filename, what, Length, timeout); … … 1451 1482 /*@+bufferoverflowhigh@*/ 1452 1483 out[KEY_LEN] = '\0'; 1453 SL_RETURN( out, _("sh_tiger_hash "));1484 SL_RETURN( out, _("sh_tiger_hash_internal")); 1454 1485 1455 1486 } 1456 1487 1457 1488 SL_RETURN( _("000000000000000000000000000000000000000000000000"), 1458 _("sh_tiger_hash "));1489 _("sh_tiger_hash_internal")); 1459 1490 } 1460 1491 1461 1492 char * sh_tiger_hash_gpg (char * filename, TigerType what, 1462 unsigned longLength)1493 UINT64 Length) 1463 1494 { 1464 1495 size_t len; … … 1530 1561 UINT32 * sh_tiger_hash_uint32 (char * filename, 1531 1562 TigerType what, 1532 unsigned longLength)1563 UINT64 Length) 1533 1564 { 1534 1565 #if defined(TIGER_64_BIT) -
trunk/src/sh_unix.c
r18 r19 573 573 if (mysignal == SIGUSR2) 574 574 { 575 sig_suspend_switch = 1;575 ++sig_suspend_switch; 576 576 ++sig_urgent; 577 577 } … … 1582 1582 if (skey->mlock_failed == SL_FALSE) 1583 1583 { 1584 if ( (-1) == sh_unix_mlock( (char *) skey, sizeof (sh_key_t)) ) 1584 if ( (-1) == sh_unix_mlock( FIL__, __LINE__, 1585 (char *) skey, sizeof (sh_key_t)) ) 1585 1586 { 1586 1587 skey->mlock_failed = SL_TRUE; … … 2754 2755 #include "sh_ignore.h" 2755 2756 2757 int sh_unix_checksum_size (char * filename, struct stat * fbuf, 2758 char * fileHash, int alert_timeout) 2759 { 2760 file_type tmpFile; 2761 int status; 2762 2763 SL_ENTER(_("sh_unix_checksum_size")); 2764 2765 /* lookup file in database */ 2766 status = sh_hash_get_it (filename, &tmpFile); 2767 if (status != 0) { 2768 goto out; 2769 } 2770 2771 /* if last < current get checksum */ 2772 if (tmpFile.size < fbuf->st_size) 2773 { 2774 strcpy(fileHash, /* known to fit */ 2775 sh_tiger_generic_hash (filename, TIGER_FD, tmpFile.size, 2776 alert_timeout)); 2777 2778 /* return */ 2779 SL_RETURN( 0, _("sh_unix_checksum_size")); 2780 } 2781 2782 out: 2783 strcpy(fileHash, /* known to fit */ 2784 _("000000000000000000000000000000000000000000000000")); 2785 SL_RETURN( -1, _("sh_unix_checksum_size")); 2786 } 2787 2756 2788 int sh_unix_getinfo (int level, char * filename, file_type * theFile, 2757 2789 char * fileHash, int policy) … … 2891 2923 _("000000000000000000000000000000000000000000000000")); 2892 2924 } 2893 else if ( policy == SH_LEVEL_PRELINK&&2925 else if ((theFile->check_mask & MODI_PREL) != 0 && 2894 2926 S_TRUE == sh_prelink_iself(rval_open, fbuf.st_size, 2895 2927 alert_timeout)) … … 2906 2938 sh_tiger_generic_hash (theFile->fullpath, TIGER_FD, 0, 2907 2939 alert_timeout)); 2940 if ((theFile->check_mask & MODI_SGROW) != 0) 2941 { 2942 sl_rewind(rval_open); 2943 tiger_fd = rval_open; 2944 sh_unix_checksum_size (theFile->fullpath, &fbuf, 2945 &fileHash[KEY_LEN + 1], 2946 alert_timeout); 2947 } 2908 2948 } 2909 2949 } … … 2939 2979 alert_timeout), 2940 2980 KEY_LEN + 1); 2981 if ((theFile->check_mask & MODI_SGROW) != 0) 2982 { 2983 sl_rewind(rval_open); 2984 tiger_fd = rval_open; 2985 sh_unix_checksum_size (theFile->fullpath, &fbuf, 2986 &fileHash[KEY_LEN + 1], 2987 alert_timeout); 2988 } 2941 2989 } 2942 2990 } … … 3648 3696 unsigned long page_start; 3649 3697 int page_refcount; 3698 char file[64]; 3699 int line; 3650 3700 struct sh_page_lt * next; 3651 3701 } sh_page_l; … … 3691 3741 3692 3742 #if defined(HAVE_MLOCK) && !defined(HAVE_BROKEN_MLOCK) 3693 int sh_unix_mlock ( void * in_addr, size_t len)3743 int sh_unix_mlock (char * file, int line, void * in_addr, size_t len) 3694 3744 { 3695 3745 int num_pages; … … 3755 3805 page_list->page_start = addr; 3756 3806 page_list->page_refcount = 1; 3807 sl_strlcpy(page_list->file, file, 64); 3808 page_list->line = line; 3757 3809 status = mlock( (void *) addr, pagesize); 3758 3810 if (status != 0) … … 3929 3981 while (page_list != NULL) 3930 3982 { 3983 #ifdef WITH_TPT 3984 sl_snprintf(str, 128, _("file: %s line: %d page: %d"), 3985 page_list->file, page_list->line, i+1); 3986 sh_error_handle(SH_ERR_INFO, FIL__, __LINE__, i, MSG_E_SUBGEN, 3987 str, _("sh_unix_count_mlock")); 3988 #endif 3931 3989 page_list = page_list->next; 3932 3990 ++i; 3933 3991 } 3934 s printf(str, _("%d pages locked"), i); /* known to fit */3992 sl_snprintf(str, 128, _("%d pages locked"), i); 3935 3993 sh_error_handle(SH_ERR_INFO, FIL__, __LINE__, i, MSG_E_SUBGEN, 3936 3994 str, _("sh_unix_count_mlock"));
Note:
See TracChangeset
for help on using the changeset viewer.