===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
openfortivpn-1.15.0/README.md-154-
openfortivpn-1.15.0/README.md:155:    If you need to specify the openssl location you can set the `$PKG_CONFIG_PATH`
openfortivpn-1.15.0/README.md-156-    environment variable. For fine-tuning check the available configure arguments
##############################################
openfortivpn-1.15.0/configure.ac-22-	AS_IF([test "x$GIT" != "x"], [
openfortivpn-1.15.0/configure.ac:23:		REVISION=`$GIT describe --tags | sed -e 's/-/+git/;y/-/./'`
openfortivpn-1.15.0/configure.ac-24-	])
##############################################
openfortivpn-1.15.0/configure.ac-251-#include <net/route.h>
openfortivpn-1.15.0/configure.ac:252:static inline struct sockaddr_in *cast_addr(struct sockaddr *addr)
openfortivpn-1.15.0/configure.ac-253-{
##############################################
openfortivpn-1.15.0/configure.ac-257-struct rtentry route;
openfortivpn-1.15.0/configure.ac:258:cast_addr(&(&route)->rt_dst)->sin_family = AF_INET;
openfortivpn-1.15.0/configure.ac-259-])],[
##############################################
openfortivpn-1.15.0/src/http.c-845-			if (!tunnel->ipv4.ns1_addr.s_addr)
openfortivpn-1.15.0/src/http.c:846:				tunnel->ipv4.ns1_addr.s_addr = inet_addr(dns_server);
openfortivpn-1.15.0/src/http.c-847-			else if (!tunnel->ipv4.ns2_addr.s_addr)
openfortivpn-1.15.0/src/http.c:848:				tunnel->ipv4.ns2_addr.s_addr = inet_addr(dns_server);
openfortivpn-1.15.0/src/http.c-849-			free(dns_server);
##############################################
openfortivpn-1.15.0/src/ipv4.c-91-
openfortivpn-1.15.0/src/ipv4.c:92:	cast_addr(&(route)->rt_dst)->sin_family = AF_INET;
openfortivpn-1.15.0/src/ipv4.c:93:	cast_addr(&(route)->rt_genmask)->sin_family = AF_INET;
openfortivpn-1.15.0/src/ipv4.c:94:	cast_addr(&(route)->rt_gateway)->sin_family = AF_INET;
openfortivpn-1.15.0/src/ipv4.c-95-
##############################################
openfortivpn-1.15.0/src/ipv4.c-158-	// initialize the output record
openfortivpn-1.15.0/src/ipv4.c:159:	route_dest(route).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c:160:	route_mask(route).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c:161:	route_gtw(route).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c-162-
##############################################
openfortivpn-1.15.0/src/ipv4.c-737-	// Back up default route
openfortivpn-1.15.0/src/ipv4.c:738:	route_dest(def_rt).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c:739:	route_mask(def_rt).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c-740-	route_iface(def_rt) = malloc(strlen(tunnel->ppp_iface) + 2);
##############################################
openfortivpn-1.15.0/src/ipv4.c-756-	route_dest(gtw_rt).s_addr = tunnel->config->gateway_ip.s_addr;
openfortivpn-1.15.0/src/ipv4.c:757:	route_mask(gtw_rt).s_addr = inet_addr("255.255.255.255");
openfortivpn-1.15.0/src/ipv4.c-758-	route_iface(gtw_rt) = malloc(strlen(tunnel->ppp_iface) + 2);
##############################################
openfortivpn-1.15.0/src/ipv4.c-766-	    && (route_dest(gtw_rt).s_addr == tunnel->config->gateway_ip.s_addr)
openfortivpn-1.15.0/src/ipv4.c:767:	    && (route_mask(gtw_rt).s_addr == inet_addr("255.255.255.255"))) {
openfortivpn-1.15.0/src/ipv4.c-768-		log_debug("removing wrong route to vpn server...\n");
##############################################
openfortivpn-1.15.0/src/ipv4.c-780-	route_dest(gtw_rt).s_addr = tunnel->config->gateway_ip.s_addr;
openfortivpn-1.15.0/src/ipv4.c:781:	route_mask(gtw_rt).s_addr = inet_addr("255.255.255.255");
openfortivpn-1.15.0/src/ipv4.c-782-	gtw_rt->rt_flags |= RTF_HOST;
##############################################
openfortivpn-1.15.0/src/ipv4.c-868-	route_init(route);
openfortivpn-1.15.0/src/ipv4.c:869:	route_dest(route).s_addr = inet_addr(dest);
openfortivpn-1.15.0/src/ipv4.c:870:	route_mask(route).s_addr = inet_addr(mask);
openfortivpn-1.15.0/src/ipv4.c-871-	if (gateway != NULL) {
openfortivpn-1.15.0/src/ipv4.c:872:		route_gtw(route).s_addr = inet_addr(gateway);
openfortivpn-1.15.0/src/ipv4.c-873-		route->rt_flags |= RTF_GATEWAY;
##############################################
openfortivpn-1.15.0/src/ipv4.c-938-		// ip route add to 0/0 dev ppp0
openfortivpn-1.15.0/src/ipv4.c:939:		route_dest(ppp_rt).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c:940:		route_mask(ppp_rt).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c:941:		route_gtw(ppp_rt).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c-942-		log_debug("Setting new default route...\n");
##############################################
openfortivpn-1.15.0/src/ipv4.c-966-		log_debug("Setting new half-internet routes...\n");
openfortivpn-1.15.0/src/ipv4.c:967:		route_dest(ppp_rt).s_addr = inet_addr("0.0.0.0");
openfortivpn-1.15.0/src/ipv4.c:968:		route_mask(ppp_rt).s_addr = inet_addr("128.0.0.0");
openfortivpn-1.15.0/src/ipv4.c-969-
##############################################
openfortivpn-1.15.0/src/ipv4.c-987-
openfortivpn-1.15.0/src/ipv4.c:988:		route_dest(ppp_rt).s_addr = inet_addr("128.0.0.0");
openfortivpn-1.15.0/src/ipv4.c-989-		ret = ipv4_set_route(ppp_rt);
##############################################
openfortivpn-1.15.0/src/ipv4.h-38-	struct sockaddr rt_dst;         /* target address               */
openfortivpn-1.15.0/src/ipv4.h:39:	struct sockaddr rt_gateway;     /* gateway addr (RTF_GATEWAY)   */
openfortivpn-1.15.0/src/ipv4.h-40-	struct sockaddr rt_genmask;     /* target network mask (IP)     */
##############################################
openfortivpn-1.15.0/src/ipv4.h-76-// Dummy function to make gcc 6 happy
openfortivpn-1.15.0/src/ipv4.h:77:static inline struct sockaddr_in *cast_addr(struct sockaddr *addr)
openfortivpn-1.15.0/src/ipv4.h-78-{
##############################################
openfortivpn-1.15.0/src/ipv4.h-80-}
openfortivpn-1.15.0/src/ipv4.h:81:#define route_dest(route)  (cast_addr(&(route)->rt_dst)->sin_addr)
openfortivpn-1.15.0/src/ipv4.h:82:#define route_mask(route)  (cast_addr(&(route)->rt_genmask)->sin_addr)
openfortivpn-1.15.0/src/ipv4.h:83:#define route_gtw(route)   (cast_addr(&(route)->rt_gateway)->sin_addr)
openfortivpn-1.15.0/src/ipv4.h-84-#define route_iface(route) ((route)->rt_dev)
##############################################
openfortivpn-1.15.0/src/tunnel.c-474-				struct in_addr if_ip_addr =
openfortivpn-1.15.0/src/tunnel.c:475:				        cast_addr(ifa->ifa_addr)->sin_addr;
openfortivpn-1.15.0/src/tunnel.c-476-
##############################################
openfortivpn-1.15.0/src/tunnel.c-603-		log_debug("proxy_port: %s\n", proxy_port);
openfortivpn-1.15.0/src/tunnel.c:604:		server.sin_addr.s_addr = inet_addr(proxy_host);
openfortivpn-1.15.0/src/tunnel.c-605-		// if host is given as a FQDN we have to do a DNS lookup
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-894-	if (!exists($maintained_status{$filename})) {
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:895:		$maintained_status{$filename} = `perl $root/scripts/get_maintainer.pl --status --nom --nol --nogit --nogit-fallback -f $filename 2>&1`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-896-	}
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-906-	my $root_path = abs_path($root);
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:907:	my $status = `cd "$root_path"; echo "$license" | python scripts/spdxcheck.py -`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-908-	return 0 if ($status ne "");
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-922-	if (-e ".git") {
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:923:		my $git_last_include_commit = `${git_command} log --no-merges --pretty=format:"%h%n" -1 -- include`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-924-		chomp $git_last_include_commit;
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-927-		my $last_mod_date = 0;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:928:		$files = `find $root/include -name "*.h"`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-929-		@include_files = split('\n', $files);
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-950-	if (-e ".git") {
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:951:		$files = `${git_command} ls-files "include/*.h"`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-952-		@include_files = split('\n', $files);
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-974-
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:975:	my $output = `${git_command} log --no-color --format='%H %s' -1 $commit 2>&1`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-976-	$output =~ s/^\s*//gm;
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-1024-		}
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:1025:		my $lines = `${git_command} log --no-color --no-merges --pretty=format:'%H %s' $git_range`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-1026-		foreach my $line (split(/\n/, $lines)) {
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-3151-				$compat3 =~ s/\,([a-z]*)[0-9]*\-/\,$1<\.\*>\-/;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:3152:				`grep -Erq "$compat|$compat2|$compat3" $dt_path`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-3153-				if ( $? >> 8 ) {
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-3159-				my $vendor = $1;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:3160:				`grep -Eq "\\"\\^\Q$vendor\E,\\.\\*\\":" $vp_file`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-3161-				if ( $? >> 8 ) {
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-4383-			if ($prefix !~ /$Type\s+$/ &&
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:4384:			    ($where != 0 || $prefix !~ /^.\s+$/) &&
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-4385-			    $prefix !~ /[{,:]\s+$/) {
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-4699-
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:4700:					# for asm volatile statements
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-4701-					# ignore a colon with another
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-5189-			{
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:5190:				my $asminclude = `grep -Ec "#include\\s+<asm/$file>" $root/$checkfile`;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-5191-				if ($asminclude > 0) {
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-5252-
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:5253:			# Make asm volatile uses seem like a generic function
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-5254-			$dstat =~ s/\b_*asm_*\s+_*volatile_*\b/asm_volatile/g;
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-6228-#				    $fix) {
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:6229:#					$fixed[$fixlinenr] =~ s/\bmemset\s*\(\s*$FuncArg\s*,\s*$FuncArg\s*,\s*ETH_ALEN\s*\)/eth_zero_addr($2)/;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-6230-#				}
##############################################
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-6232-#				if (WARN("PREFER_ETH_BROADCAST_ADDR",
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:6233:#					 "Prefer eth_broadcast_addr() over memset()\n" . "$here\n$stat\n") &&
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-6234-#				    $fix) {
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl:6235:#					$fixed[$fixlinenr] =~ s/\bmemset\s*\(\s*$FuncArg\s*,\s*$FuncArg\s*,\s*ETH_ALEN\s*\)/eth_broadcast_addr($2)/;
openfortivpn-1.15.0/tests/ci/checkpatch/checkpatch.pl-6236-#				}
##############################################
openfortivpn-1.15.0/tests/lint/checkpatch.sh-4-# Path to checkpatch.pl
openfortivpn-1.15.0/tests/lint/checkpatch.sh:5:script_dir=`dirname "${BASH_SOURCE[0]}"`
openfortivpn-1.15.0/tests/lint/checkpatch.sh:6:checkpatch_path=`realpath "${script_dir}/../ci/checkpatch/checkpatch.pl"`
openfortivpn-1.15.0/tests/lint/checkpatch.sh-7-