1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00
Files
nmap/nse_utility.h
kris e39eeea8ba Since r20267 (NSE Nsock maintenance), failures in raw IP sends from NSE cause
scripts to bail.  (This is why Ron saw a backtrace when path-mtu elicited an
EMSGSIZE [a separate issue I'm still working on] instead of path-mtu
recognizing the failure and resending with a smaller MTU like it would do
before.)  I'm changing this back to the original design of returning false to
scripts (just like connect-mode send failures).  

I've changed safe_error() in nse_utility.cc to support varargs.
2010-11-11 01:11:13 +00:00

20 lines
636 B
C

#ifndef NMAP_NSE_UTILITY_H
#define NMAP_NSE_UTILITY_H
size_t table_length (lua_State *, int);
void setsfield (lua_State *, int, const char *, const char *);
void setnfield (lua_State *, int, const char *, lua_Number);
void setbfield (lua_State *, int, const char *, int);
void weak_table (lua_State *, int, int, const char *);
int success (lua_State *);
int safe_error (lua_State *, const char *, ...);
void check_target (lua_State *, int, const char **, const char **);
unsigned short check_port (lua_State *, int, const char **);
Target *get_target (lua_State *, int);
Port *get_port (lua_State *, Target *, Port *, int);
#endif