diff options
Diffstat (limited to 'plugins')
| -rw-r--r-- | plugins/check_http.c | 111 |
1 files changed, 55 insertions, 56 deletions
diff --git a/plugins/check_http.c b/plugins/check_http.c index 1835a2d0..b1effd8d 100644 --- a/plugins/check_http.c +++ b/plugins/check_http.c | |||
| @@ -57,8 +57,8 @@ enum { | |||
| 57 | }; | 57 | }; |
| 58 | 58 | ||
| 59 | #ifdef HAVE_SSL | 59 | #ifdef HAVE_SSL |
| 60 | int check_cert = FALSE; | 60 | bool check_cert = false; |
| 61 | int continue_after_check_cert = FALSE; | 61 | bool continue_after_check_cert = false; |
| 62 | int ssl_version = 0; | 62 | int ssl_version = 0; |
| 63 | int days_till_exp_warn, days_till_exp_crit; | 63 | int days_till_exp_warn, days_till_exp_crit; |
| 64 | char *randbuff; | 64 | char *randbuff; |
| @@ -69,7 +69,7 @@ X509 *server_cert; | |||
| 69 | # define my_recv(buf, len) read(sd, buf, len) | 69 | # define my_recv(buf, len) read(sd, buf, len) |
| 70 | # define my_send(buf, len) send(sd, buf, len, 0) | 70 | # define my_send(buf, len) send(sd, buf, len, 0) |
| 71 | #endif /* HAVE_SSL */ | 71 | #endif /* HAVE_SSL */ |
| 72 | int no_body = FALSE; | 72 | bool no_body = false; |
| 73 | int maximum_age = -1; | 73 | int maximum_age = -1; |
| 74 | 74 | ||
| 75 | enum { | 75 | enum { |
| @@ -91,7 +91,7 @@ struct timeval tv_temp; | |||
| 91 | #define HTTP_URL "/" | 91 | #define HTTP_URL "/" |
| 92 | #define CRLF "\r\n" | 92 | #define CRLF "\r\n" |
| 93 | 93 | ||
| 94 | int specify_port = FALSE; | 94 | bool specify_port = false; |
| 95 | int server_port = HTTP_PORT; | 95 | int server_port = HTTP_PORT; |
| 96 | int virtual_port = 0; | 96 | int virtual_port = 0; |
| 97 | char server_port_text[6] = ""; | 97 | char server_port_text[6] = ""; |
| @@ -113,16 +113,16 @@ char *critical_thresholds = NULL; | |||
| 113 | thresholds *thlds; | 113 | thresholds *thlds; |
| 114 | char user_auth[MAX_INPUT_BUFFER] = ""; | 114 | char user_auth[MAX_INPUT_BUFFER] = ""; |
| 115 | char proxy_auth[MAX_INPUT_BUFFER] = ""; | 115 | char proxy_auth[MAX_INPUT_BUFFER] = ""; |
| 116 | int display_html = FALSE; | 116 | bool display_html = false; |
| 117 | char **http_opt_headers; | 117 | char **http_opt_headers; |
| 118 | int http_opt_headers_count = 0; | 118 | int http_opt_headers_count = 0; |
| 119 | int onredirect = STATE_OK; | 119 | int onredirect = STATE_OK; |
| 120 | int followsticky = STICKY_NONE; | 120 | int followsticky = STICKY_NONE; |
| 121 | int use_ssl = FALSE; | 121 | bool use_ssl = false; |
| 122 | int use_sni = FALSE; | 122 | bool use_sni = false; |
| 123 | int verbose = FALSE; | 123 | bool verbose = false; |
| 124 | int show_extended_perfdata = FALSE; | 124 | bool show_extended_perfdata = false; |
| 125 | int show_body = FALSE; | 125 | bool show_body = false; |
| 126 | int sd; | 126 | int sd; |
| 127 | int min_page_len = 0; | 127 | int min_page_len = 0; |
| 128 | int max_page_len = 0; | 128 | int max_page_len = 0; |
| @@ -136,10 +136,10 @@ char buffer[MAX_INPUT_BUFFER]; | |||
| 136 | char *client_cert = NULL; | 136 | char *client_cert = NULL; |
| 137 | char *client_privkey = NULL; | 137 | char *client_privkey = NULL; |
| 138 | 138 | ||
| 139 | int process_arguments (int, char **); | 139 | bool process_arguments (int, char **); |
| 140 | int check_http (void); | 140 | int check_http (void); |
| 141 | void redir (char *pos, char *status_line); | 141 | void redir (char *pos, char *status_line); |
| 142 | int server_type_check(const char *type); | 142 | bool server_type_check(const char *type); |
| 143 | int server_port_check(int ssl_flag); | 143 | int server_port_check(int ssl_flag); |
| 144 | char *perfd_time (double microsec); | 144 | char *perfd_time (double microsec); |
| 145 | char *perfd_time_connect (double microsec); | 145 | char *perfd_time_connect (double microsec); |
| @@ -169,10 +169,10 @@ main (int argc, char **argv) | |||
| 169 | /* Parse extra opts if any */ | 169 | /* Parse extra opts if any */ |
| 170 | argv=np_extra_opts (&argc, argv, progname); | 170 | argv=np_extra_opts (&argc, argv, progname); |
| 171 | 171 | ||
| 172 | if (process_arguments (argc, argv) == ERROR) | 172 | if (process_arguments (argc, argv) == false) |
| 173 | usage4 (_("Could not parse arguments")); | 173 | usage4 (_("Could not parse arguments")); |
| 174 | 174 | ||
| 175 | if (display_html == TRUE) | 175 | if (display_html == true) |
| 176 | printf ("<A HREF=\"%s://%s:%d%s\" target=\"_blank\">", | 176 | printf ("<A HREF=\"%s://%s:%d%s\" target=\"_blank\">", |
| 177 | use_ssl ? "https" : "http", host_name ? host_name : server_address, | 177 | use_ssl ? "https" : "http", host_name ? host_name : server_address, |
| 178 | server_port, server_url); | 178 | server_port, server_url); |
| @@ -196,8 +196,7 @@ test_file (char *path) | |||
| 196 | } | 196 | } |
| 197 | 197 | ||
| 198 | /* process command-line arguments */ | 198 | /* process command-line arguments */ |
| 199 | int | 199 | bool process_arguments (int argc, char **argv) |
| 200 | process_arguments (int argc, char **argv) | ||
| 201 | { | 200 | { |
| 202 | int c = 1; | 201 | int c = 1; |
| 203 | char *p; | 202 | char *p; |
| @@ -252,7 +251,7 @@ process_arguments (int argc, char **argv) | |||
| 252 | }; | 251 | }; |
| 253 | 252 | ||
| 254 | if (argc < 2) | 253 | if (argc < 2) |
| 255 | return ERROR; | 254 | return false; |
| 256 | 255 | ||
| 257 | for (c = 1; c < argc; c++) { | 256 | for (c = 1; c < argc; c++) { |
| 258 | if (strcmp ("-to", argv[c]) == 0) | 257 | if (strcmp ("-to", argv[c]) == 0) |
| @@ -308,10 +307,10 @@ process_arguments (int argc, char **argv) | |||
| 308 | /* xasprintf (&http_opt_headers, "%s", optarg); */ | 307 | /* xasprintf (&http_opt_headers, "%s", optarg); */ |
| 309 | break; | 308 | break; |
| 310 | case 'L': /* show html link */ | 309 | case 'L': /* show html link */ |
| 311 | display_html = TRUE; | 310 | display_html = true; |
| 312 | break; | 311 | break; |
| 313 | case 'n': /* do not show html link */ | 312 | case 'n': /* do not show html link */ |
| 314 | display_html = FALSE; | 313 | display_html = false; |
| 315 | break; | 314 | break; |
| 316 | case 'C': /* Check SSL cert validity */ | 315 | case 'C': /* Check SSL cert validity */ |
| 317 | #ifdef HAVE_SSL | 316 | #ifdef HAVE_SSL |
| @@ -332,12 +331,12 @@ process_arguments (int argc, char **argv) | |||
| 332 | usage2 (_("Invalid certificate expiration period"), optarg); | 331 | usage2 (_("Invalid certificate expiration period"), optarg); |
| 333 | days_till_exp_warn = atoi (optarg); | 332 | days_till_exp_warn = atoi (optarg); |
| 334 | } | 333 | } |
| 335 | check_cert = TRUE; | 334 | check_cert = true; |
| 336 | goto enable_ssl; | 335 | goto enable_ssl; |
| 337 | #endif | 336 | #endif |
| 338 | case CONTINUE_AFTER_CHECK_CERT: /* don't stop after the certificate is checked */ | 337 | case CONTINUE_AFTER_CHECK_CERT: /* don't stop after the certificate is checked */ |
| 339 | #ifdef HAVE_SSL | 338 | #ifdef HAVE_SSL |
| 340 | continue_after_check_cert = TRUE; | 339 | continue_after_check_cert = true; |
| 341 | break; | 340 | break; |
| 342 | #endif | 341 | #endif |
| 343 | case 'J': /* use client certificate */ | 342 | case 'J': /* use client certificate */ |
| @@ -357,7 +356,7 @@ process_arguments (int argc, char **argv) | |||
| 357 | enable_ssl: | 356 | enable_ssl: |
| 358 | /* ssl_version initialized to 0 as a default. Only set if it's non-zero. This helps when we include multiple | 357 | /* ssl_version initialized to 0 as a default. Only set if it's non-zero. This helps when we include multiple |
| 359 | parameters, like -S and -C combinations */ | 358 | parameters, like -S and -C combinations */ |
| 360 | use_ssl = TRUE; | 359 | use_ssl = true; |
| 361 | if (c=='S' && optarg != NULL) { | 360 | if (c=='S' && optarg != NULL) { |
| 362 | int got_plus = strchr(optarg, '+') != NULL; | 361 | int got_plus = strchr(optarg, '+') != NULL; |
| 363 | 362 | ||
| @@ -374,7 +373,7 @@ process_arguments (int argc, char **argv) | |||
| 374 | else | 373 | else |
| 375 | usage4 (_("Invalid option - Valid SSL/TLS versions: 2, 3, 1, 1.1, 1.2 (with optional '+' suffix)")); | 374 | usage4 (_("Invalid option - Valid SSL/TLS versions: 2, 3, 1, 1.1, 1.2 (with optional '+' suffix)")); |
| 376 | } | 375 | } |
| 377 | if (specify_port == FALSE) | 376 | if (specify_port == false) |
| 378 | server_port = HTTPS_PORT; | 377 | server_port = HTTPS_PORT; |
| 379 | #else | 378 | #else |
| 380 | /* -C -J and -K fall through to here without SSL */ | 379 | /* -C -J and -K fall through to here without SSL */ |
| @@ -382,7 +381,7 @@ process_arguments (int argc, char **argv) | |||
| 382 | #endif | 381 | #endif |
| 383 | break; | 382 | break; |
| 384 | case SNI_OPTION: | 383 | case SNI_OPTION: |
| 385 | use_sni = TRUE; | 384 | use_sni = true; |
| 386 | break; | 385 | break; |
| 387 | case MAX_REDIRS_OPTION: | 386 | case MAX_REDIRS_OPTION: |
| 388 | if (!is_intnonneg (optarg)) | 387 | if (!is_intnonneg (optarg)) |
| @@ -420,7 +419,7 @@ process_arguments (int argc, char **argv) | |||
| 420 | host_name_length = strlen (host_name) - strlen (p) - 1; | 419 | host_name_length = strlen (host_name) - strlen (p) - 1; |
| 421 | free (host_name); | 420 | free (host_name); |
| 422 | host_name = strndup (optarg, host_name_length); | 421 | host_name = strndup (optarg, host_name_length); |
| 423 | if (specify_port == FALSE) | 422 | if (specify_port == false) |
| 424 | server_port = virtual_port; | 423 | server_port = virtual_port; |
| 425 | } | 424 | } |
| 426 | } else if ((p = strchr (host_name, ':')) != NULL | 425 | } else if ((p = strchr (host_name, ':')) != NULL |
| @@ -430,7 +429,7 @@ process_arguments (int argc, char **argv) | |||
| 430 | host_name_length = strlen (host_name) - strlen (p) - 1; | 429 | host_name_length = strlen (host_name) - strlen (p) - 1; |
| 431 | free (host_name); | 430 | free (host_name); |
| 432 | host_name = strndup (optarg, host_name_length); | 431 | host_name = strndup (optarg, host_name_length); |
| 433 | if (specify_port == FALSE) | 432 | if (specify_port == false) |
| 434 | server_port = virtual_port; | 433 | server_port = virtual_port; |
| 435 | } | 434 | } |
| 436 | break; | 435 | break; |
| @@ -446,7 +445,7 @@ process_arguments (int argc, char **argv) | |||
| 446 | usage2 (_("Invalid port number"), optarg); | 445 | usage2 (_("Invalid port number"), optarg); |
| 447 | else { | 446 | else { |
| 448 | server_port = atoi (optarg); | 447 | server_port = atoi (optarg); |
| 449 | specify_port = TRUE; | 448 | specify_port = true; |
| 450 | } | 449 | } |
| 451 | break; | 450 | break; |
| 452 | case 'a': /* authorization info */ | 451 | case 'a': /* authorization info */ |
| @@ -502,7 +501,7 @@ process_arguments (int argc, char **argv) | |||
| 502 | if (errcode != 0) { | 501 | if (errcode != 0) { |
| 503 | (void) regerror (errcode, &preg, errbuf, MAX_INPUT_BUFFER); | 502 | (void) regerror (errcode, &preg, errbuf, MAX_INPUT_BUFFER); |
| 504 | printf (_("Could Not Compile Regular Expression: %s"), errbuf); | 503 | printf (_("Could Not Compile Regular Expression: %s"), errbuf); |
| 505 | return ERROR; | 504 | return false; |
| 506 | } | 505 | } |
| 507 | break; | 506 | break; |
| 508 | case INVERT_REGEX: | 507 | case INVERT_REGEX: |
| @@ -519,7 +518,7 @@ process_arguments (int argc, char **argv) | |||
| 519 | #endif | 518 | #endif |
| 520 | break; | 519 | break; |
| 521 | case 'v': /* verbose */ | 520 | case 'v': /* verbose */ |
| 522 | verbose = TRUE; | 521 | verbose = true; |
| 523 | break; | 522 | break; |
| 524 | case 'm': /* min_page_length */ | 523 | case 'm': /* min_page_length */ |
| 525 | { | 524 | { |
| @@ -544,7 +543,7 @@ process_arguments (int argc, char **argv) | |||
| 544 | break; | 543 | break; |
| 545 | } | 544 | } |
| 546 | case 'N': /* no-body */ | 545 | case 'N': /* no-body */ |
| 547 | no_body = TRUE; | 546 | no_body = true; |
| 548 | break; | 547 | break; |
| 549 | case 'M': /* max-age */ | 548 | case 'M': /* max-age */ |
| 550 | { | 549 | { |
| @@ -565,10 +564,10 @@ process_arguments (int argc, char **argv) | |||
| 565 | } | 564 | } |
| 566 | break; | 565 | break; |
| 567 | case 'E': /* show extended perfdata */ | 566 | case 'E': /* show extended perfdata */ |
| 568 | show_extended_perfdata = TRUE; | 567 | show_extended_perfdata = true; |
| 569 | break; | 568 | break; |
| 570 | case 'B': /* print body content after status line */ | 569 | case 'B': /* print body content after status line */ |
| 571 | show_body = TRUE; | 570 | show_body = true; |
| 572 | break; | 571 | break; |
| 573 | } | 572 | } |
| 574 | } | 573 | } |
| @@ -605,7 +604,7 @@ process_arguments (int argc, char **argv) | |||
| 605 | if (virtual_port == 0) | 604 | if (virtual_port == 0) |
| 606 | virtual_port = server_port; | 605 | virtual_port = server_port; |
| 607 | 606 | ||
| 608 | return TRUE; | 607 | return true; |
| 609 | } | 608 | } |
| 610 | 609 | ||
| 611 | 610 | ||
| @@ -945,7 +944,7 @@ check_http (void) | |||
| 945 | /* @20100414, public[at]frank4dd.com, http://www.frank4dd.com/howto */ | 944 | /* @20100414, public[at]frank4dd.com, http://www.frank4dd.com/howto */ |
| 946 | 945 | ||
| 947 | if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0 | 946 | if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0 |
| 948 | && host_name != NULL && use_ssl == TRUE) { | 947 | && host_name != NULL && use_ssl == true) { |
| 949 | 948 | ||
| 950 | if (verbose) printf ("Entering CONNECT tunnel mode with proxy %s:%d to dst %s:%d\n", server_address, server_port, host_name, HTTPS_PORT); | 949 | if (verbose) printf ("Entering CONNECT tunnel mode with proxy %s:%d to dst %s:%d\n", server_address, server_port, host_name, HTTPS_PORT); |
| 951 | asprintf (&buf, "%s %s:%d HTTP/1.1\r\n%s\r\n", http_method, host_name, HTTPS_PORT, user_agent); | 950 | asprintf (&buf, "%s %s:%d HTTP/1.1\r\n%s\r\n", http_method, host_name, HTTPS_PORT, user_agent); |
| @@ -979,7 +978,7 @@ check_http (void) | |||
| 979 | } | 978 | } |
| 980 | #ifdef HAVE_SSL | 979 | #ifdef HAVE_SSL |
| 981 | elapsed_time_connect = (double)microsec_connect / 1.0e6; | 980 | elapsed_time_connect = (double)microsec_connect / 1.0e6; |
| 982 | if (use_ssl == TRUE) { | 981 | if (use_ssl == true) { |
| 983 | gettimeofday (&tv_temp, NULL); | 982 | gettimeofday (&tv_temp, NULL); |
| 984 | result = np_net_ssl_init_with_hostname_version_and_cert(sd, (use_sni ? host_name : NULL), ssl_version, client_cert, client_privkey); | 983 | result = np_net_ssl_init_with_hostname_version_and_cert(sd, (use_sni ? host_name : NULL), ssl_version, client_cert, client_privkey); |
| 985 | if (verbose) printf ("SSL initialized\n"); | 984 | if (verbose) printf ("SSL initialized\n"); |
| @@ -987,9 +986,9 @@ check_http (void) | |||
| 987 | die (STATE_CRITICAL, NULL); | 986 | die (STATE_CRITICAL, NULL); |
| 988 | microsec_ssl = deltime (tv_temp); | 987 | microsec_ssl = deltime (tv_temp); |
| 989 | elapsed_time_ssl = (double)microsec_ssl / 1.0e6; | 988 | elapsed_time_ssl = (double)microsec_ssl / 1.0e6; |
| 990 | if (check_cert == TRUE) { | 989 | if (check_cert == true) { |
| 991 | result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit); | 990 | result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit); |
| 992 | if (continue_after_check_cert == FALSE) { | 991 | if (continue_after_check_cert == false) { |
| 993 | if (sd) close(sd); | 992 | if (sd) close(sd); |
| 994 | np_net_ssl_cleanup(); | 993 | np_net_ssl_cleanup(); |
| 995 | return result; | 994 | return result; |
| @@ -999,7 +998,7 @@ check_http (void) | |||
| 999 | #endif /* HAVE_SSL */ | 998 | #endif /* HAVE_SSL */ |
| 1000 | 999 | ||
| 1001 | if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0 | 1000 | if ( server_address != NULL && strcmp(http_method, "CONNECT") == 0 |
| 1002 | && host_name != NULL && use_ssl == TRUE) | 1001 | && host_name != NULL && use_ssl == true) |
| 1003 | asprintf (&buf, "%s %s %s\r\n%s\r\n", http_method_proxy, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent); | 1002 | asprintf (&buf, "%s %s %s\r\n%s\r\n", http_method_proxy, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent); |
| 1004 | else | 1003 | else |
| 1005 | asprintf (&buf, "%s %s %s\r\n%s\r\n", http_method, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent); | 1004 | asprintf (&buf, "%s %s %s\r\n%s\r\n", http_method, server_url, host_name ? "HTTP/1.1" : "HTTP/1.0", user_agent); |
| @@ -1027,10 +1026,10 @@ check_http (void) | |||
| 1027 | * 14.23). Some server applications/configurations cause trouble if the | 1026 | * 14.23). Some server applications/configurations cause trouble if the |
| 1028 | * (default) port is explicitly specified in the "Host:" header line. | 1027 | * (default) port is explicitly specified in the "Host:" header line. |
| 1029 | */ | 1028 | */ |
| 1030 | if ((use_ssl == FALSE && virtual_port == HTTP_PORT) || | 1029 | if ((use_ssl == false && virtual_port == HTTP_PORT) || |
| 1031 | (use_ssl == TRUE && virtual_port == HTTPS_PORT) || | 1030 | (use_ssl == true && virtual_port == HTTPS_PORT) || |
| 1032 | (server_address != NULL && strcmp(http_method, "CONNECT") == 0 | 1031 | (server_address != NULL && strcmp(http_method, "CONNECT") == 0 |
| 1033 | && host_name != NULL && use_ssl == TRUE)) | 1032 | && host_name != NULL && use_ssl == true)) |
| 1034 | xasprintf (&buf, "%sHost: %s\r\n", buf, host_name); | 1033 | xasprintf (&buf, "%sHost: %s\r\n", buf, host_name); |
| 1035 | else | 1034 | else |
| 1036 | xasprintf (&buf, "%sHost: %s:%d\r\n", buf, host_name, virtual_port); | 1035 | xasprintf (&buf, "%sHost: %s:%d\r\n", buf, host_name, virtual_port); |
| @@ -1334,7 +1333,7 @@ check_http (void) | |||
| 1334 | perfd_time (elapsed_time), | 1333 | perfd_time (elapsed_time), |
| 1335 | perfd_size (page_len), | 1334 | perfd_size (page_len), |
| 1336 | perfd_time_connect (elapsed_time_connect), | 1335 | perfd_time_connect (elapsed_time_connect), |
| 1337 | use_ssl == TRUE ? perfd_time_ssl (elapsed_time_ssl) : "", | 1336 | use_ssl == true ? perfd_time_ssl (elapsed_time_ssl) : "", |
| 1338 | perfd_time_headers (elapsed_time_headers), | 1337 | perfd_time_headers (elapsed_time_headers), |
| 1339 | perfd_time_firstbyte (elapsed_time_firstbyte), | 1338 | perfd_time_firstbyte (elapsed_time_firstbyte), |
| 1340 | perfd_time_transfer (elapsed_time_transfer)); | 1339 | perfd_time_transfer (elapsed_time_transfer)); |
| @@ -1529,13 +1528,13 @@ redir (char *pos, char *status_line) | |||
| 1529 | } | 1528 | } |
| 1530 | 1529 | ||
| 1531 | 1530 | ||
| 1532 | int | 1531 | bool |
| 1533 | server_type_check (const char *type) | 1532 | server_type_check (const char *type) |
| 1534 | { | 1533 | { |
| 1535 | if (strcmp (type, "https")) | 1534 | if (strcmp (type, "https")) |
| 1536 | return FALSE; | 1535 | return false; |
| 1537 | else | 1536 | else |
| 1538 | return TRUE; | 1537 | return true; |
| 1539 | } | 1538 | } |
| 1540 | 1539 | ||
| 1541 | int | 1540 | int |
| @@ -1550,42 +1549,42 @@ server_port_check (int ssl_flag) | |||
| 1550 | char *perfd_time (double elapsed_time) | 1549 | char *perfd_time (double elapsed_time) |
| 1551 | { | 1550 | { |
| 1552 | return fperfdata ("time", elapsed_time, "s", | 1551 | return fperfdata ("time", elapsed_time, "s", |
| 1553 | thlds->warning?TRUE:FALSE, thlds->warning?thlds->warning->end:0, | 1552 | thlds->warning?true:false, thlds->warning?thlds->warning->end:0, |
| 1554 | thlds->critical?TRUE:FALSE, thlds->critical?thlds->critical->end:0, | 1553 | thlds->critical?true:false, thlds->critical?thlds->critical->end:0, |
| 1555 | TRUE, 0, TRUE, socket_timeout); | 1554 | true, 0, true, socket_timeout); |
| 1556 | } | 1555 | } |
| 1557 | 1556 | ||
| 1558 | char *perfd_time_connect (double elapsed_time_connect) | 1557 | char *perfd_time_connect (double elapsed_time_connect) |
| 1559 | { | 1558 | { |
| 1560 | return fperfdata ("time_connect", elapsed_time_connect, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout); | 1559 | return fperfdata ("time_connect", elapsed_time_connect, "s", false, 0, false, 0, false, 0, true, socket_timeout); |
| 1561 | } | 1560 | } |
| 1562 | 1561 | ||
| 1563 | char *perfd_time_ssl (double elapsed_time_ssl) | 1562 | char *perfd_time_ssl (double elapsed_time_ssl) |
| 1564 | { | 1563 | { |
| 1565 | return fperfdata ("time_ssl", elapsed_time_ssl, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout); | 1564 | return fperfdata ("time_ssl", elapsed_time_ssl, "s", false, 0, false, 0, false, 0, true, socket_timeout); |
| 1566 | } | 1565 | } |
| 1567 | 1566 | ||
| 1568 | char *perfd_time_headers (double elapsed_time_headers) | 1567 | char *perfd_time_headers (double elapsed_time_headers) |
| 1569 | { | 1568 | { |
| 1570 | return fperfdata ("time_headers", elapsed_time_headers, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout); | 1569 | return fperfdata ("time_headers", elapsed_time_headers, "s", false, 0, false, 0, false, 0, true, socket_timeout); |
| 1571 | } | 1570 | } |
| 1572 | 1571 | ||
| 1573 | char *perfd_time_firstbyte (double elapsed_time_firstbyte) | 1572 | char *perfd_time_firstbyte (double elapsed_time_firstbyte) |
| 1574 | { | 1573 | { |
| 1575 | return fperfdata ("time_firstbyte", elapsed_time_firstbyte, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout); | 1574 | return fperfdata ("time_firstbyte", elapsed_time_firstbyte, "s", false, 0, false, 0, false, 0, true, socket_timeout); |
| 1576 | } | 1575 | } |
| 1577 | 1576 | ||
| 1578 | char *perfd_time_transfer (double elapsed_time_transfer) | 1577 | char *perfd_time_transfer (double elapsed_time_transfer) |
| 1579 | { | 1578 | { |
| 1580 | return fperfdata ("time_transfer", elapsed_time_transfer, "s", FALSE, 0, FALSE, 0, FALSE, 0, TRUE, socket_timeout); | 1579 | return fperfdata ("time_transfer", elapsed_time_transfer, "s", false, 0, false, 0, false, 0, true, socket_timeout); |
| 1581 | } | 1580 | } |
| 1582 | 1581 | ||
| 1583 | char *perfd_size (int page_len) | 1582 | char *perfd_size (int page_len) |
| 1584 | { | 1583 | { |
| 1585 | return perfdata ("size", page_len, "B", | 1584 | return perfdata ("size", page_len, "B", |
| 1586 | (min_page_len>0?TRUE:FALSE), min_page_len, | 1585 | (min_page_len>0?true:false), min_page_len, |
| 1587 | (min_page_len>0?TRUE:FALSE), 0, | 1586 | (min_page_len>0?true:false), 0, |
| 1588 | TRUE, 0, FALSE, 0); | 1587 | true, 0, false, 0); |
| 1589 | } | 1588 | } |
| 1590 | 1589 | ||
| 1591 | void | 1590 | void |
