1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Use bool not int for boolean options

This commit is contained in:
dmiller
2017-12-07 18:20:07 +00:00
parent 9cfc2652d5
commit 2a1f81d42d
6 changed files with 84 additions and 85 deletions

View File

@@ -228,14 +228,14 @@ class NmapOps {
float max_packet_send_rate;
/* The requested auto stats printing interval, or 0.0 if unset. */
float stats_interval;
int randomize_hosts;
int randomize_ports;
int spoofsource; /* -S used */
int fastscan;
bool randomize_hosts;
bool randomize_ports;
bool spoofsource; /* -S used */
bool fastscan;
char device[64];
int ping_group_sz;
int nogcc; /* Turn off group congestion control with --nogcc */
int generate_random_ips; /* -iR option */
bool nogcc; /* Turn off group congestion control with --nogcc */
bool generate_random_ips; /* -iR option */
FingerPrintDB *reference_FPs; /* Used in the new OS scan system. */
std::vector<FingerMatch> os_labels_ipv6;
u16 magic_port; /* The source port set by -g or --source-port. */
@@ -308,11 +308,11 @@ class NmapOps {
FIN scan into a PSH scan. Sort of a hack, but can
be very useful sometimes. */
int defeat_rst_ratelimit; /* Solaris 9 rate-limits RSTs so scanning is very
bool defeat_rst_ratelimit; /* Solaris 9 rate-limits RSTs so scanning is very
slow against it. If we don't distinguish between closed and filtered ports,
we can get the list of open ports very fast */
int defeat_icmp_ratelimit; /* If a host rate-limits ICMP responses, then scanning
bool defeat_icmp_ratelimit; /* If a host rate-limits ICMP responses, then scanning
is very slow against it. This option prevents Nmap to adjust timing
when it changes the port's state because of ICMP response, as the latter
might be rate-limited. Doing so we can get scan results faster. */
@@ -324,19 +324,18 @@ class NmapOps {
to 0. */
// Version Detection Options
int override_excludeports;
bool override_excludeports;
int version_intensity;
struct sockaddr_storage decoys[MAX_DECOYS];
int osscan_limit; /* Skip OS Scan if no open or no closed TCP ports */
int osscan_guess; /* Be more aggressive in guessing OS type */
bool osscan_limit; /* Skip OS Scan if no open or no closed TCP ports */
bool osscan_guess; /* Be more aggressive in guessing OS type */
int numdecoys;
int decoyturn;
int osscan;
int servicescan;
bool osscan;
bool servicescan;
int pingtype;
int listscan;
int allowall;
int fragscan; /* 0 or MTU (without IPv4 header size) */
int ackscan;
int bouncescan;
@@ -353,13 +352,13 @@ class NmapOps {
int sctpcookieechoscan;
int windowscan;
int xmasscan;
int noresolve;
int noportscan;
int append_output; /* Append to any output files rather than overwrite */
bool noresolve;
bool noportscan;
bool append_output; /* Append to any output files rather than overwrite */
FILE *logfd[LOG_NUM_FILES];
FILE *nmap_stdout; /* Nmap standard output */
int ttl; // Time to live
int badsum;
bool badsum;
char *datadir;
/* A map from abstract data file names like "nmap-services" and "nmap-os-db"
to paths which have been requested by the user. nmap_fetchfile will return
@@ -398,12 +397,12 @@ class NmapOps {
nsock_proxychain proxy_chain;
#ifndef NOLUA
int script;
bool script;
char *scriptargs;
char *scriptargsfile;
int scriptversion;
int scripttrace;
int scriptupdatedb;
bool scriptversion;
bool scripttrace;
bool scriptupdatedb;
bool scripthelp;
double scripttimeout;
void chooseScripts(char* argument);