diff options
author | Benoit Mortier <opensides@users.sourceforge.net> | 2004-12-25 23:17:46 +0000 |
---|---|---|
committer | Benoit Mortier <opensides@users.sourceforge.net> | 2004-12-25 23:17:46 +0000 |
commit | e9ccc6b21a1152bbf150302c4a29a6df79d75bd7 (patch) | |
tree | 91bf1ebb6f927fd628b298df2ac5a89580282591 /plugins/check_tcp.c | |
parent | 71656b2aafffb69716620bf08cce76c925dc8fa3 (diff) | |
download | monitoring-plugins-e9ccc6b21a1152bbf150302c4a29a6df79d75bd7.tar.gz |
various fixes for localization
git-svn-id: https://nagiosplug.svn.sourceforge.net/svnroot/nagiosplug/nagiosplug/trunk@1061 f882894a-f735-0410-b71e-b25c423dba1c
Diffstat (limited to 'plugins/check_tcp.c')
-rw-r--r-- | plugins/check_tcp.c | 30 |
1 files changed, 14 insertions, 16 deletions
diff --git a/plugins/check_tcp.c b/plugins/check_tcp.c index b922536e..fcd67786 100644 --- a/plugins/check_tcp.c +++ b/plugins/check_tcp.c | |||
@@ -259,13 +259,13 @@ main (int argc, char **argv) | |||
259 | #ifdef HAVE_SSL | 259 | #ifdef HAVE_SSL |
260 | if (use_ssl && check_cert == TRUE) { | 260 | if (use_ssl && check_cert == TRUE) { |
261 | if (connect_SSL () != OK) | 261 | if (connect_SSL () != OK) |
262 | die (STATE_CRITICAL,"CRITICAL - Could not make SSL connection\n"); | 262 | die (STATE_CRITICAL,_("CRITICAL - Could not make SSL connection\n")); |
263 | if ((server_cert = SSL_get_peer_certificate (ssl)) != NULL) { | 263 | if ((server_cert = SSL_get_peer_certificate (ssl)) != NULL) { |
264 | result = check_certificate (&server_cert); | 264 | result = check_certificate (&server_cert); |
265 | X509_free(server_cert); | 265 | X509_free(server_cert); |
266 | } | 266 | } |
267 | else { | 267 | else { |
268 | printf("CRITICAL - Cannot retrieve server certificate.\n"); | 268 | printf(_("CRITICAL - Cannot retrieve server certificate.\n")); |
269 | result = STATE_CRITICAL; | 269 | result = STATE_CRITICAL; |
270 | } | 270 | } |
271 | SSL_shutdown (ssl); | 271 | SSL_shutdown (ssl); |
@@ -434,7 +434,7 @@ process_arguments (int argc, char **argv) | |||
434 | }; | 434 | }; |
435 | 435 | ||
436 | if (argc < 2) | 436 | if (argc < 2) |
437 | usage ("No arguments found\n"); | 437 | usage4 (_("No arguments found")); |
438 | 438 | ||
439 | /* backwards compatibility */ | 439 | /* backwards compatibility */ |
440 | for (c = 1; c < argc; c++) { | 440 | for (c = 1; c < argc; c++) { |
@@ -462,14 +462,12 @@ process_arguments (int argc, char **argv) | |||
462 | 462 | ||
463 | switch (c) { | 463 | switch (c) { |
464 | case '?': /* print short usage statement if args not parsable */ | 464 | case '?': /* print short usage statement if args not parsable */ |
465 | printf (_("%s: Unknown argument: %s\n\n"), progname, optarg); | 465 | usage2 (_("Unknown argument"), optarg); |
466 | print_usage (); | ||
467 | exit (STATE_UNKNOWN); | ||
468 | case 'h': /* help */ | 466 | case 'h': /* help */ |
469 | print_help (); | 467 | print_help (); |
470 | exit (STATE_OK); | 468 | exit (STATE_OK); |
471 | case 'V': /* version */ | 469 | case 'V': /* version */ |
472 | print_revision (progname, "$Revision$"); | 470 | print_revision (progname, revision); |
473 | exit (STATE_OK); | 471 | exit (STATE_OK); |
474 | case 'v': /* verbose mode */ | 472 | case 'v': /* verbose mode */ |
475 | verbose = TRUE; | 473 | verbose = TRUE; |
@@ -575,7 +573,7 @@ process_arguments (int argc, char **argv) | |||
575 | case 'D': /* Check SSL cert validity - days 'til certificate expiration */ | 573 | case 'D': /* Check SSL cert validity - days 'til certificate expiration */ |
576 | #ifdef HAVE_SSL | 574 | #ifdef HAVE_SSL |
577 | if (!is_intnonneg (optarg)) | 575 | if (!is_intnonneg (optarg)) |
578 | usage2 ("invalid certificate expiration period", optarg); | 576 | usage2 (_("Invalid certificate expiration period"), optarg); |
579 | days_till_exp = atoi (optarg); | 577 | days_till_exp = atoi (optarg); |
580 | check_cert = TRUE; | 578 | check_cert = TRUE; |
581 | use_ssl = TRUE; | 579 | use_ssl = TRUE; |
@@ -583,14 +581,14 @@ process_arguments (int argc, char **argv) | |||
583 | case 'S': | 581 | case 'S': |
584 | use_ssl = TRUE; | 582 | use_ssl = TRUE; |
585 | #else | 583 | #else |
586 | die (STATE_UNKNOWN, "SSL support not available. Install OpenSSL and recompile."); | 584 | die (STATE_UNKNOWN, _("SSL support not available. Install OpenSSL and recompile.")); |
587 | #endif | 585 | #endif |
588 | break; | 586 | break; |
589 | } | 587 | } |
590 | } | 588 | } |
591 | 589 | ||
592 | if (server_address == NULL) | 590 | if (server_address == NULL) |
593 | usage (_("You must provide a server address\n")); | 591 | usage4 (_("You must provide a server address")); |
594 | 592 | ||
595 | return TRUE; | 593 | return TRUE; |
596 | } | 594 | } |
@@ -669,7 +667,7 @@ check_certificate (X509 ** certificate) | |||
669 | /* Generate tm structure to process timestamp */ | 667 | /* Generate tm structure to process timestamp */ |
670 | if (tm->type == V_ASN1_UTCTIME) { | 668 | if (tm->type == V_ASN1_UTCTIME) { |
671 | if (tm->length < 10) { | 669 | if (tm->length < 10) { |
672 | printf ("CRITICAL - Wrong time format in certificate.\n"); | 670 | printf (_("CRITICAL - Wrong time format in certificate.\n")); |
673 | return STATE_CRITICAL; | 671 | return STATE_CRITICAL; |
674 | } | 672 | } |
675 | else { | 673 | else { |
@@ -681,7 +679,7 @@ check_certificate (X509 ** certificate) | |||
681 | } | 679 | } |
682 | else { | 680 | else { |
683 | if (tm->length < 12) { | 681 | if (tm->length < 12) { |
684 | printf ("CRITICAL - Wrong time format in certificate.\n"); | 682 | printf (_("CRITICAL - Wrong time format in certificate.\n")); |
685 | return STATE_CRITICAL; | 683 | return STATE_CRITICAL; |
686 | } | 684 | } |
687 | else { | 685 | else { |
@@ -710,20 +708,20 @@ check_certificate (X509 ** certificate) | |||
710 | stamp.tm_mday, stamp.tm_year + 1900, stamp.tm_hour, stamp.tm_min); | 708 | stamp.tm_mday, stamp.tm_year + 1900, stamp.tm_hour, stamp.tm_min); |
711 | 709 | ||
712 | if (days_left > 0 && days_left <= days_till_exp) { | 710 | if (days_left > 0 && days_left <= days_till_exp) { |
713 | printf ("Certificate expires in %d day(s) (%s).\n", days_left, timestamp); | 711 | printf (_("Certificate expires in %d day(s) (%s).\n"), days_left, timestamp); |
714 | return STATE_WARNING; | 712 | return STATE_WARNING; |
715 | } | 713 | } |
716 | if (days_left < 0) { | 714 | if (days_left < 0) { |
717 | printf ("Certificate expired on %s.\n", timestamp); | 715 | printf (_("Certificate expired on %s.\n"), timestamp); |
718 | return STATE_CRITICAL; | 716 | return STATE_CRITICAL; |
719 | } | 717 | } |
720 | 718 | ||
721 | if (days_left == 0) { | 719 | if (days_left == 0) { |
722 | printf ("Certificate expires today (%s).\n", timestamp); | 720 | printf (_("Certificate expires today (%s).\n"), timestamp); |
723 | return STATE_WARNING; | 721 | return STATE_WARNING; |
724 | } | 722 | } |
725 | 723 | ||
726 | printf ("Certificate will expire on %s.\n", timestamp); | 724 | printf (_("Certificate will expire on %s.\n"), timestamp); |
727 | 725 | ||
728 | return STATE_OK; | 726 | return STATE_OK; |
729 | } | 727 | } |