@@ -228,14 +228,14 @@ class NmapOps {
228
228
float max_packet_send_rate;
229
229
/* The requested auto stats printing interval, or 0.0 if unset. */
230
230
float stats_interval;
231
- int randomize_hosts;
232
- int randomize_ports;
233
- int spoofsource; /* -S used */
234
- int fastscan;
231
+ bool randomize_hosts;
232
+ bool randomize_ports;
233
+ bool spoofsource; /* -S used */
234
+ bool fastscan;
235
235
char device[64 ];
236
236
int ping_group_sz;
237
- int nogcc; /* Turn off group congestion control with --nogcc */
238
- int generate_random_ips; /* -iR option */
237
+ bool nogcc; /* Turn off group congestion control with --nogcc */
238
+ bool generate_random_ips; /* -iR option */
239
239
FingerPrintDB *reference_FPs; /* Used in the new OS scan system. */
240
240
std::vector<FingerMatch> os_labels_ipv6;
241
241
u16 magic_port; /* The source port set by -g or --source-port. */
@@ -308,11 +308,11 @@ class NmapOps {
308
308
FIN scan into a PSH scan. Sort of a hack, but can
309
309
be very useful sometimes. */
310
310
311
- int defeat_rst_ratelimit; /* Solaris 9 rate-limits RSTs so scanning is very
311
+ bool defeat_rst_ratelimit; /* Solaris 9 rate-limits RSTs so scanning is very
312
312
slow against it. If we don't distinguish between closed and filtered ports,
313
313
we can get the list of open ports very fast */
314
314
315
- int defeat_icmp_ratelimit; /* If a host rate-limits ICMP responses, then scanning
315
+ bool defeat_icmp_ratelimit; /* If a host rate-limits ICMP responses, then scanning
316
316
is very slow against it. This option prevents Nmap to adjust timing
317
317
when it changes the port's state because of ICMP response, as the latter
318
318
might be rate-limited. Doing so we can get scan results faster. */
@@ -324,19 +324,18 @@ class NmapOps {
324
324
to 0. */
325
325
326
326
// Version Detection Options
327
- int override_excludeports;
327
+ bool override_excludeports;
328
328
int version_intensity;
329
329
330
330
struct sockaddr_storage decoys[MAX_DECOYS];
331
- int osscan_limit; /* Skip OS Scan if no open or no closed TCP ports */
332
- int osscan_guess; /* Be more aggressive in guessing OS type */
331
+ bool osscan_limit; /* Skip OS Scan if no open or no closed TCP ports */
332
+ bool osscan_guess; /* Be more aggressive in guessing OS type */
333
333
int numdecoys;
334
334
int decoyturn;
335
- int osscan;
336
- int servicescan;
335
+ bool osscan;
336
+ bool servicescan;
337
337
int pingtype;
338
338
int listscan;
339
- int allowall;
340
339
int fragscan; /* 0 or MTU (without IPv4 header size) */
341
340
int ackscan;
342
341
int bouncescan;
@@ -353,13 +352,13 @@ class NmapOps {
353
352
int sctpcookieechoscan;
354
353
int windowscan;
355
354
int xmasscan;
356
- int noresolve;
357
- int noportscan;
358
- int append_output; /* Append to any output files rather than overwrite */
355
+ bool noresolve;
356
+ bool noportscan;
357
+ bool append_output; /* Append to any output files rather than overwrite */
359
358
FILE *logfd[LOG_NUM_FILES];
360
359
FILE *nmap_stdout; /* Nmap standard output */
361
360
int ttl; // Time to live
362
- int badsum;
361
+ bool badsum;
363
362
char *datadir;
364
363
/* A map from abstract data file names like "nmap-services" and "nmap-os-db"
365
364
to paths which have been requested by the user. nmap_fetchfile will return
@@ -398,12 +397,12 @@ class NmapOps {
398
397
nsock_proxychain proxy_chain;
399
398
400
399
#ifndef NOLUA
401
- int script;
400
+ bool script;
402
401
char *scriptargs;
403
402
char *scriptargsfile;
404
- int scriptversion;
405
- int scripttrace;
406
- int scriptupdatedb;
403
+ bool scriptversion;
404
+ bool scripttrace;
405
+ bool scriptupdatedb;
407
406
bool scripthelp;
408
407
double scripttimeout;
409
408
void chooseScripts (char * argument);
0 commit comments