=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== uif-1.1.9/uif.initscript-51- [ -f /proc/modules ] || return uif-1.1.9/uif.initscript:52: LIST=`/sbin/lsmod|awk '!/Module/ {print $1}'` uif-1.1.9/uif.initscript-53- ############################################## uif-1.1.9/uif.initscript-67- log_progress_msg "IPv4-rules" uif-1.1.9/uif.initscript:68: EMSG=`$UIF $OPTIONS 2>&1` uif-1.1.9/uif.initscript-69- RET4=$? ############################################## uif-1.1.9/uif.initscript-85- log_progress_msg "IPv6-rules" uif-1.1.9/uif.initscript:86: EMSG=`$UIF -6 $OPTIONS 2>&1` uif-1.1.9/uif.initscript-87- RET6=$? ############################################## uif-1.1.9/uif.initscript-140- echo -n "IPv4 rules - active, waiting - " uif-1.1.9/uif.initscript:141: EMSG=`$UIF -T $TIMEOUT $OPTIONS` uif-1.1.9/uif.initscript-142- if [ $? -eq 0 ]; then ############################################## uif-1.1.9/uif.initscript-156- echo -n "IPv6 rules - active, waiting - " uif-1.1.9/uif.initscript:157: EMSG=`$UIF -6 -T $TIMEOUT $OPTIONS` uif-1.1.9/uif.initscript-158- if [ $? -eq 0 ]; then ############################################## uif-1.1.9/debian/uif.config-12-is_net() { uif-1.1.9/debian/uif.config:13: NET=`echo "$1" | cut -d/ -f1` uif-1.1.9/debian/uif.config:14: MASK=`echo "$1" | cut -d/ -f2` uif-1.1.9/debian/uif.config-15- is_ip "$MASK" && is_ip "$NET" && return 0 ############################################## uif-1.1.9/debian/uif.config-54- [ $WORKS -eq "0" ] && is_net "$i" && WORKS=1 uif-1.1.9/debian/uif.config:55: [ $WORKS -eq "0" ] && HOST=`is_host "$i"` uif-1.1.9/debian/uif.config-56- [ -n "$HOST" ] && WORKS=1 ############################################## uif-1.1.9/debian/uif.init-51- [ -f /proc/modules ] || return uif-1.1.9/debian/uif.init:52: LIST=`/sbin/lsmod|awk '!/Module/ {print $1}'` uif-1.1.9/debian/uif.init-53- ############################################## uif-1.1.9/debian/uif.init-67- log_progress_msg "IPv4-rules" uif-1.1.9/debian/uif.init:68: EMSG=`$UIF $OPTIONS 2>&1` uif-1.1.9/debian/uif.init-69- RET4=$? ############################################## uif-1.1.9/debian/uif.init-85- log_progress_msg "IPv6-rules" uif-1.1.9/debian/uif.init:86: EMSG=`$UIF -6 $OPTIONS 2>&1` uif-1.1.9/debian/uif.init-87- RET6=$? ############################################## uif-1.1.9/debian/uif.init-140- echo -n "IPv4 rules - active, waiting - " uif-1.1.9/debian/uif.init:141: EMSG=`$UIF -T $TIMEOUT $OPTIONS` uif-1.1.9/debian/uif.init-142- if [ $? -eq 0 ]; then ############################################## uif-1.1.9/debian/uif.init-156- echo -n "IPv6 rules - active, waiting - " uif-1.1.9/debian/uif.init:157: EMSG=`$UIF -6 -T $TIMEOUT $OPTIONS` uif-1.1.9/debian/uif.init-158- if [ $? -eq 0 ]; then ############################################## uif-1.1.9/.pc/1001_use-iptables-legacy.patch/uif.pl-1988- push (@entry, "ipNetworkNumber"); uif-1.1.9/.pc/1001_use-iptables-legacy.patch/uif.pl:1989: push (@entry, $ip->addr()); uif-1.1.9/.pc/1001_use-iptables-legacy.patch/uif.pl-1990- push (@entry, "ipNetmaskNumber"); ############################################## uif-1.1.9/.pc/1001_use-iptables-legacy.patch/uif.pl-2019- push (@entry, "ipHostNumber"); uif-1.1.9/.pc/1001_use-iptables-legacy.patch/uif.pl:2020: push (@entry, $ip->addr()); uif-1.1.9/.pc/1001_use-iptables-legacy.patch/uif.pl-2021- if ($mac) { ############################################## uif-1.1.9/uif.pl-1988- push (@entry, "ipNetworkNumber"); uif-1.1.9/uif.pl:1989: push (@entry, $ip->addr()); uif-1.1.9/uif.pl-1990- push (@entry, "ipNetmaskNumber"); ############################################## uif-1.1.9/uif.pl-2019- push (@entry, "ipHostNumber"); uif-1.1.9/uif.pl:2020: push (@entry, $ip->addr()); uif-1.1.9/uif.pl-2021- if ($mac) {