diff options
author | RincewindsHat <12514511+RincewindsHat@users.noreply.github.com> | 2023-10-18 20:55:22 +0200 |
---|---|---|
committer | RincewindsHat <12514511+RincewindsHat@users.noreply.github.com> | 2023-10-18 20:55:22 +0200 |
commit | 163ad151b91cafe6a0f06cb4f0583a97166b0614 (patch) | |
tree | ef4a378d2220b967afbaff16328b9221e54087f5 /plugins | |
parent | 369d98cc3640a5db78305c8fb0aefdd7cd6cc9f0 (diff) | |
download | monitoring-plugins-163ad151b91cafe6a0f06cb4f0583a97166b0614.tar.gz |
check_smtp: Use C99 booleans
Diffstat (limited to 'plugins')
-rw-r--r-- | plugins/check_smtp.c | 50 |
1 files changed, 25 insertions, 25 deletions
diff --git a/plugins/check_smtp.c b/plugins/check_smtp.c index fc0ae2c4..9f019439 100644 --- a/plugins/check_smtp.c +++ b/plugins/check_smtp.c | |||
@@ -40,7 +40,7 @@ const char *email = "devel@monitoring-plugins.org"; | |||
40 | #include <ctype.h> | 40 | #include <ctype.h> |
41 | 41 | ||
42 | #ifdef HAVE_SSL | 42 | #ifdef HAVE_SSL |
43 | int check_cert = FALSE; | 43 | bool check_cert = false; |
44 | int days_till_exp_warn, days_till_exp_crit; | 44 | int days_till_exp_warn, days_till_exp_crit; |
45 | # define my_recv(buf, len) (((use_starttls || use_ssl) && ssl_established) ? np_net_ssl_read(buf, len) : read(sd, buf, len)) | 45 | # define my_recv(buf, len) (((use_starttls || use_ssl) && ssl_established) ? np_net_ssl_read(buf, len) : read(sd, buf, len)) |
46 | # define my_send(buf, len) (((use_starttls || use_ssl) && ssl_established) ? np_net_ssl_write(buf, len) : send(sd, buf, len, 0)) | 46 | # define my_send(buf, len) (((use_starttls || use_ssl) && ssl_established) ? np_net_ssl_write(buf, len) : send(sd, buf, len, 0)) |
@@ -100,17 +100,17 @@ char *authtype = NULL; | |||
100 | char *authuser = NULL; | 100 | char *authuser = NULL; |
101 | char *authpass = NULL; | 101 | char *authpass = NULL; |
102 | double warning_time = 0; | 102 | double warning_time = 0; |
103 | int check_warning_time = FALSE; | 103 | bool check_warning_time = false; |
104 | double critical_time = 0; | 104 | double critical_time = 0; |
105 | int check_critical_time = FALSE; | 105 | bool check_critical_time = false; |
106 | int verbose = 0; | 106 | int verbose = 0; |
107 | int use_ssl = FALSE; | 107 | bool use_ssl = false; |
108 | int use_starttls = FALSE; | 108 | bool use_starttls = false; |
109 | int use_sni = FALSE; | 109 | bool use_sni = false; |
110 | short use_proxy_prefix = FALSE; | 110 | bool use_proxy_prefix = false; |
111 | short use_ehlo = FALSE; | 111 | bool use_ehlo = false; |
112 | short use_lhlo = FALSE; | 112 | bool use_lhlo = false; |
113 | short ssl_established = 0; | 113 | bool ssl_established = false; |
114 | char *localhostname = NULL; | 114 | char *localhostname = NULL; |
115 | int sd; | 115 | int sd; |
116 | char buffer[MAX_INPUT_BUFFER]; | 116 | char buffer[MAX_INPUT_BUFFER]; |
@@ -118,13 +118,13 @@ enum { | |||
118 | TCP_PROTOCOL = 1, | 118 | TCP_PROTOCOL = 1, |
119 | UDP_PROTOCOL = 2, | 119 | UDP_PROTOCOL = 2, |
120 | }; | 120 | }; |
121 | int ignore_send_quit_failure = FALSE; | 121 | bool ignore_send_quit_failure = false; |
122 | 122 | ||
123 | 123 | ||
124 | int | 124 | int |
125 | main (int argc, char **argv) | 125 | main (int argc, char **argv) |
126 | { | 126 | { |
127 | short supports_tls=FALSE; | 127 | bool supports_tls = false; |
128 | int n = 0; | 128 | int n = 0; |
129 | double elapsed_time; | 129 | double elapsed_time; |
130 | long microsec; | 130 | long microsec; |
@@ -230,7 +230,7 @@ main (int argc, char **argv) | |||
230 | } else if(use_ehlo || use_lhlo){ | 230 | } else if(use_ehlo || use_lhlo){ |
231 | if(strstr(buffer, "250 STARTTLS") != NULL || | 231 | if(strstr(buffer, "250 STARTTLS") != NULL || |
232 | strstr(buffer, "250-STARTTLS") != NULL){ | 232 | strstr(buffer, "250-STARTTLS") != NULL){ |
233 | supports_tls=TRUE; | 233 | supports_tls=true; |
234 | } | 234 | } |
235 | } | 235 | } |
236 | 236 | ||
@@ -466,7 +466,7 @@ main (int argc, char **argv) | |||
466 | fperfdata ("time", elapsed_time, "s", | 466 | fperfdata ("time", elapsed_time, "s", |
467 | (int)check_warning_time, warning_time, | 467 | (int)check_warning_time, warning_time, |
468 | (int)check_critical_time, critical_time, | 468 | (int)check_critical_time, critical_time, |
469 | TRUE, 0, FALSE, 0)); | 469 | true, 0, false, 0)); |
470 | 470 | ||
471 | return result; | 471 | return result; |
472 | } | 472 | } |
@@ -560,7 +560,7 @@ process_arguments (int argc, char **argv) | |||
560 | break; | 560 | break; |
561 | case 'A': | 561 | case 'A': |
562 | authtype = optarg; | 562 | authtype = optarg; |
563 | use_ehlo = TRUE; | 563 | use_ehlo = true; |
564 | break; | 564 | break; |
565 | case 'U': | 565 | case 'U': |
566 | authuser = optarg; | 566 | authuser = optarg; |
@@ -600,7 +600,7 @@ process_arguments (int argc, char **argv) | |||
600 | usage4 (_("Critical time must be a positive")); | 600 | usage4 (_("Critical time must be a positive")); |
601 | else { | 601 | else { |
602 | critical_time = strtod (optarg, NULL); | 602 | critical_time = strtod (optarg, NULL); |
603 | check_critical_time = TRUE; | 603 | check_critical_time = true; |
604 | } | 604 | } |
605 | break; | 605 | break; |
606 | case 'w': /* warning time threshold */ | 606 | case 'w': /* warning time threshold */ |
@@ -608,7 +608,7 @@ process_arguments (int argc, char **argv) | |||
608 | usage4 (_("Warning time must be a positive")); | 608 | usage4 (_("Warning time must be a positive")); |
609 | else { | 609 | else { |
610 | warning_time = strtod (optarg, NULL); | 610 | warning_time = strtod (optarg, NULL); |
611 | check_warning_time = TRUE; | 611 | check_warning_time = true; |
612 | } | 612 | } |
613 | break; | 613 | break; |
614 | case 'v': /* verbose */ | 614 | case 'v': /* verbose */ |
@@ -645,33 +645,33 @@ process_arguments (int argc, char **argv) | |||
645 | usage2 ("Invalid certificate expiration period", optarg); | 645 | usage2 ("Invalid certificate expiration period", optarg); |
646 | days_till_exp_warn = atoi (optarg); | 646 | days_till_exp_warn = atoi (optarg); |
647 | } | 647 | } |
648 | check_cert = TRUE; | 648 | check_cert = true; |
649 | ignore_send_quit_failure = TRUE; | 649 | ignore_send_quit_failure = true; |
650 | #else | 650 | #else |
651 | usage (_("SSL support not available - install OpenSSL and recompile")); | 651 | usage (_("SSL support not available - install OpenSSL and recompile")); |
652 | #endif | 652 | #endif |
653 | case 's': | 653 | case 's': |
654 | /* ssl */ | 654 | /* ssl */ |
655 | use_ssl = TRUE; | 655 | use_ssl = true; |
656 | server_port = SMTPS_PORT; | 656 | server_port = SMTPS_PORT; |
657 | break; | 657 | break; |
658 | case 'S': | 658 | case 'S': |
659 | /* starttls */ | 659 | /* starttls */ |
660 | use_starttls = TRUE; | 660 | use_starttls = true; |
661 | use_ehlo = TRUE; | 661 | use_ehlo = true; |
662 | break; | 662 | break; |
663 | case SNI_OPTION: | 663 | case SNI_OPTION: |
664 | #ifdef HAVE_SSL | 664 | #ifdef HAVE_SSL |
665 | use_sni = TRUE; | 665 | use_sni = true; |
666 | #else | 666 | #else |
667 | usage (_("SSL support not available - install OpenSSL and recompile")); | 667 | usage (_("SSL support not available - install OpenSSL and recompile")); |
668 | #endif | 668 | #endif |
669 | break; | 669 | break; |
670 | case 'r': | 670 | case 'r': |
671 | use_proxy_prefix = TRUE; | 671 | use_proxy_prefix = true; |
672 | break; | 672 | break; |
673 | case 'L': | 673 | case 'L': |
674 | use_lhlo = TRUE; | 674 | use_lhlo = true; |
675 | break; | 675 | break; |
676 | case '4': | 676 | case '4': |
677 | address_family = AF_INET; | 677 | address_family = AF_INET; |