diff --git a/CMakeLists.txt b/CMakeLists.txt
index eb6b215d2..d5c958a34 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -247,25 +247,12 @@ if (NOT CVSS3_RATINGS)
endif (NOT CVSS3_RATINGS)
add_definitions (-DCVSS3_RATINGS=${CVSS3_RATINGS})
-if (NOT COMPLIANCE_REPORTS)
- set (COMPLIANCE_REPORTS 1)
-endif (NOT COMPLIANCE_REPORTS)
-add_definitions (-DCOMPLIANCE_REPORTS=${COMPLIANCE_REPORTS})
-
message ("-- Install prefix: ${CMAKE_INSTALL_PREFIX}")
## Version
set (GVMD_VERSION "${PROJECT_VERSION_STRING}")
-if (COMPLIANCE_REPORTS EQUAL 1)
- set(IF_COMPLIANCE_REPORTS "")
- set(ENDIF_COMPLIANCE_REPORTS "")
-elseif (COMPLIANCE_REPORTS EQUAL 0)
- set(IF_COMPLIANCE_REPORTS "")
-endif()
-
# Configure Doxyfile with version number
configure_file (doc/Doxyfile.in doc/Doxyfile)
configure_file (doc/Doxyfile_full.in doc/Doxyfile_full)
diff --git a/src/gmp.c b/src/gmp.c
index 462a7ed07..5fb9ec15b 100644
--- a/src/gmp.c
+++ b/src/gmp.c
@@ -12958,11 +12958,6 @@ handle_get_features (gmp_parser_t *gmp_parser, GError **error)
" status=\"" STATUS_OK "\""
" status_text=\"" STATUS_OK_TEXT "\">");
- SENDF_TO_CLIENT_OR_FAIL (""
- "COMPLIANCE_REPORTS"
- "",
- COMPLIANCE_REPORTS ? 1 : 0);
-
SENDF_TO_CLIENT_OR_FAIL (""
"CVSS3_RATINGS"
"",
@@ -15134,31 +15129,23 @@ handle_get_reports (gmp_parser_t *gmp_parser, GError **error)
overrides = filter_term_apply_overrides (filter ? filter : get->filter);
min_qod = filter_term_min_qod (filter ? filter : get->filter);
levels = filter_term_value (filter ? filter : get->filter, "levels");
- #if COMPLIANCE_REPORTS == 1
- gchar *compliance_levels;
- compliance_levels = filter_term_value (filter
- ? filter
- : get->filter,
- "compliance_levels");
-
- /* Setup result filter from overrides. */
- get_reports_data->get.filter
- = g_strdup_printf
- ("apply_overrides=%i min_qod=%i levels=%s compliance_levels=%s",
- overrides,
- min_qod,
- levels ? levels : "hmlgdf",
- compliance_levels ? compliance_levels : "yniu");
- g_free (compliance_levels);
- #else
- /* Setup result filter from overrides. */
- get_reports_data->get.filter
- = g_strdup_printf
- ("apply_overrides=%i min_qod=%i levels=%s",
- overrides,
- min_qod,
- levels ? levels : "hmlgdf");
- #endif
+
+ gchar *compliance_levels;
+ compliance_levels = filter_term_value (filter
+ ? filter
+ : get->filter,
+ "compliance_levels");
+
+ /* Setup result filter from overrides. */
+ get_reports_data->get.filter
+ = g_strdup_printf
+ ("apply_overrides=%i min_qod=%i levels=%s compliance_levels=%s",
+ overrides,
+ min_qod,
+ levels ? levels : "hmlgdf",
+ compliance_levels ? compliance_levels : "yniu");
+ g_free (compliance_levels);
+
g_free (filter);
g_free (levels);
}
@@ -16206,7 +16193,6 @@ select_resource_iterator (get_resource_names_data_t *resource_names_data,
else if (g_strcmp0 ("report", resource_names_data->type) == 0)
{
*iterator = (int (*) (iterator_t*, get_data_t *))init_report_iterator;
-#if COMPLIANCE_REPORTS == 1
get_data_set_extra (&resource_names_data->get,
"usage_type",
g_strdup ("scan"));
@@ -16217,7 +16203,6 @@ select_resource_iterator (get_resource_names_data_t *resource_names_data,
get_data_set_extra (&resource_names_data->get,
"usage_type",
g_strdup ("audit"));
-#endif
}
else if (g_strcmp0 ("report_config", resource_names_data->type) == 0)
{
diff --git a/src/gvmd.c b/src/gvmd.c
index 0fbe8051b..99f8e1fa1 100644
--- a/src/gvmd.c
+++ b/src/gvmd.c
@@ -2324,9 +2324,6 @@ gvmd (int argc, char** argv, char *env[])
#endif
#if CVSS3_RATINGS == 1
printf ("CVSS3 severity ratings enabled\n");
-#endif
-#if COMPLIANCE_REPORTS == 1
- printf ("Compliance reports enabled\n");
#endif
printf ("Copyright (C) 2009-2021 Greenbone AG\n");
printf ("License: AGPL-3.0-or-later\n");
diff --git a/src/manage_sql.c b/src/manage_sql.c
index 3f47b535a..be266c79a 100644
--- a/src/manage_sql.c
+++ b/src/manage_sql.c
@@ -2221,7 +2221,7 @@ manage_report_filter_controls (const gchar *filter, int *first, int *max,
else
*apply_overrides = val;
}
-
+
if (compliance_levels)
{
if (filter_control_str ((keyword_t **) split->pdata,
@@ -3980,14 +3980,9 @@ valid_type (const char* type)
int
valid_subtype (const char* type)
{
- #if COMPLIANCE_REPORTS == 1
return (strcasecmp (type, "audit_report") == 0)
|| (strcasecmp (type, "audit") == 0)
|| (strcasecmp (type, "policy") == 0);
- #else
- return (strcasecmp (type, "audit") == 0)
- || (strcasecmp (type, "policy") == 0);
- #endif
}
/**
@@ -14406,7 +14401,7 @@ manage_test_alert (const char *alert_id, gchar **script_message)
NULL);
if (result)
report_add_result (report, result);
-
+
result = make_result (
task, "127.0.0.1", "localhost", "general/tcp",
@@ -18335,7 +18330,7 @@ task_usage_type (task_t task, char ** usage_type)
task);
if (usage_type == NULL)
return -1;
-
+
return 0;
}
@@ -22368,7 +22363,6 @@ report_iterator_opts_table (int override, int min_qod)
min_qod);
}
-#if COMPLIANCE_REPORTS == 1
/**
* @brief Return SQL WHERE for restricting a SELECT to compliance statuses.
*
@@ -22426,7 +22420,6 @@ where_compliance_status (const char *compliance)
return g_string_free (compliance_sql, FALSE);;
}
-#endif
/**
* @brief Generate an extra WHERE clause for selecting reports
@@ -22461,32 +22454,30 @@ reports_extra_where (int trash, const gchar *filter, const char *usage_type)
g_string_append_printf(extra_where, "%s", trash_clause);
g_free (trash_clause);
- #if COMPLIANCE_REPORTS == 1
- gchar *usage_type_clause, *compliance_clause = NULL;
- gchar *compliance_filter = NULL;
- if (usage_type && strcmp (usage_type, ""))
- {
- gchar *quoted_usage_type;
- quoted_usage_type = sql_quote (usage_type);
- usage_type_clause = g_strdup_printf (" AND task in (SELECT id from tasks"
- " WHERE usage_type='%s')",
- quoted_usage_type);
+ gchar *usage_type_clause, *compliance_clause = NULL;
+ gchar *compliance_filter = NULL;
+ if (usage_type && strcmp (usage_type, ""))
+ {
+ gchar *quoted_usage_type;
+ quoted_usage_type = sql_quote (usage_type);
+ usage_type_clause = g_strdup_printf (" AND task in (SELECT id from tasks"
+ " WHERE usage_type='%s')",
+ quoted_usage_type);
- g_free (quoted_usage_type);
- }
- else
- usage_type_clause = NULL;
+ g_free (quoted_usage_type);
+ }
+ else
+ usage_type_clause = NULL;
- if (filter)
- compliance_filter = filter_term_value(filter, "report_compliance_levels");
+ if (filter)
+ compliance_filter = filter_term_value(filter, "report_compliance_levels");
- compliance_clause = where_compliance_status (compliance_filter ?: "yniu");
+ compliance_clause = where_compliance_status (compliance_filter ?: "yniu");
- g_string_append_printf (extra_where, "%s%s", usage_type_clause ?: "", compliance_clause ?: "");
- g_free (compliance_filter);
- g_free (compliance_clause);
- g_free (usage_type_clause);
- #endif
+ g_string_append_printf (extra_where, "%s%s", usage_type_clause ?: "", compliance_clause ?: "");
+ g_free (compliance_filter);
+ g_free (compliance_clause);
+ g_free (usage_type_clause);
return g_string_free (extra_where, FALSE);
}
@@ -22508,7 +22499,7 @@ report_count (const get_data_t *get)
int ret;
extra_tables = report_iterator_opts_table (0, MIN_QOD_DEFAULT);
-
+
const gchar *usage_type = get_data_get_extra (get, "usage_type");
extra_where = reports_extra_where(get->trash, get->filter, usage_type);
@@ -23935,7 +23926,7 @@ result_count (const get_data_t *get, report_t report, const char* host)
dynamic_severity,
"results",
"nvts");
-
+
extra_tables = g_strdup_printf (" LEFT OUTER JOIN result_vt_epss"
" ON results.nvt = result_vt_epss.vt_id"
" LEFT OUTER JOIN nvts"
@@ -26305,7 +26296,6 @@ report_counts_id_full (report_t report, int* holes, int* infos,
return 0;
}
-#if COMPLIANCE_REPORTS == 1
/**
* @brief Get the compliance state from compliance counts.
*
@@ -26450,8 +26440,6 @@ report_compliance_counts (report_t report,
return 0;
}
-#endif
-
/**
* @brief Get only the filtered message counts for a report.
@@ -28190,7 +28178,7 @@ print_report_host_tls_certificates_xml (report_host_t report_host,
" AND (source_description = 'SSL/TLS Certificate'"
" OR source_description = 'SSL Certificate')",
report_host);
-
+
while (next (&tls_certs))
{
const char *certificate_prefixed, *certificate_b64;
@@ -28774,54 +28762,53 @@ print_report_host_xml (FILE *stream,
host_iterator_asset_uuid (hosts));
else if (lean == 0)
PRINT (stream,
- "");
+ "");
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (usage_type, "audit") == 0)
- {
- int yes_count, no_count, incomplete_count, undefined_count;
-
- yes_count
- = GPOINTER_TO_INT
- (g_hash_table_lookup (f_host_compliant, current_host));
- no_count
- = GPOINTER_TO_INT
- (g_hash_table_lookup (f_host_notcompliant, current_host));
- incomplete_count
- = GPOINTER_TO_INT
- (g_hash_table_lookup (f_host_incomplete, current_host));
- undefined_count
- = GPOINTER_TO_INT
- (g_hash_table_lookup (f_host_undefined, current_host));
-
- PRINT (stream,
- "%s"
- "%s"
- "%d"
- ""
- "%d"
- "%d"
- "%d"
- "%d"
- "%d"
- ""
- "%s",
- host_iterator_start_time (hosts),
- host_iterator_end_time (hosts)
- ? host_iterator_end_time (hosts)
- : "",
- ports_count,
- (yes_count + no_count + incomplete_count + undefined_count),
- yes_count,
- no_count,
- incomplete_count,
- undefined_count,
- report_compliance_from_counts (&yes_count,
- &no_count,
- &incomplete_count,
- &undefined_count));
- } else
- #endif
+ if (strcmp (usage_type, "audit") == 0)
+ {
+ int yes_count, no_count, incomplete_count, undefined_count;
+
+ yes_count
+ = GPOINTER_TO_INT
+ (g_hash_table_lookup (f_host_compliant, current_host));
+ no_count
+ = GPOINTER_TO_INT
+ (g_hash_table_lookup (f_host_notcompliant, current_host));
+ incomplete_count
+ = GPOINTER_TO_INT
+ (g_hash_table_lookup (f_host_incomplete, current_host));
+ undefined_count
+ = GPOINTER_TO_INT
+ (g_hash_table_lookup (f_host_undefined, current_host));
+
+ PRINT (stream,
+ "%s"
+ "%s"
+ "%d"
+ ""
+ "%d"
+ "%d"
+ "%d"
+ "%d"
+ "%d"
+ ""
+ "%s",
+ host_iterator_start_time (hosts),
+ host_iterator_end_time (hosts)
+ ? host_iterator_end_time (hosts)
+ : "",
+ ports_count,
+ (yes_count + no_count + incomplete_count + undefined_count),
+ yes_count,
+ no_count,
+ incomplete_count,
+ undefined_count,
+ report_compliance_from_counts (&yes_count,
+ &no_count,
+ &incomplete_count,
+ &undefined_count));
+ }
+ else
{
int holes_count, warnings_count, infos_count;
int logs_count, false_positives_count;
@@ -28841,7 +28828,7 @@ print_report_host_xml (FILE *stream,
false_positives_count
= GPOINTER_TO_INT
(g_hash_table_lookup ( f_host_false_positives,
- current_host));
+ current_host));
PRINT (stream,
"%s"
@@ -29993,30 +29980,29 @@ print_v2_report_delta_xml (FILE *out, iterator_t *results,
if (strchr (delta_states, state[0]) == NULL) continue;
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (usage_type, "audit") == 0)
- {
- const char* compliance;
- compliance = result_iterator_compliance (results);
- (*f_compliance_count)++;
- if (strcasecmp (compliance, "yes") == 0)
- {
- (*f_compliance_yes)++;
- }
- else if (strcasecmp (compliance, "no") == 0)
- {
- (*f_compliance_no)++;
- }
- else if (strcasecmp (compliance, "incomplete") == 0)
- {
- (*f_compliance_incomplete)++;
- }
- else if (strcasecmp (compliance, "undefined") == 0)
- {
- (*f_compliance_undefined)++;
- }
- } else
- #endif
+ if (strcmp (usage_type, "audit") == 0)
+ {
+ const char* compliance;
+ compliance = result_iterator_compliance (results);
+ (*f_compliance_count)++;
+ if (strcasecmp (compliance, "yes") == 0)
+ {
+ (*f_compliance_yes)++;
+ }
+ else if (strcasecmp (compliance, "no") == 0)
+ {
+ (*f_compliance_no)++;
+ }
+ else if (strcasecmp (compliance, "incomplete") == 0)
+ {
+ (*f_compliance_incomplete)++;
+ }
+ else if (strcasecmp (compliance, "undefined") == 0)
+ {
+ (*f_compliance_undefined)++;
+ }
+ }
+ else
{
const char *level;
/* Increase the result count. */
@@ -30081,7 +30067,7 @@ print_v2_report_delta_xml (FILE *out, iterator_t *results,
}
g_string_free (buffer, TRUE);
g_free (usage_type);
-
+
if (fprintf (out, "") < 0)
{
g_tree_destroy (ports);
@@ -30398,9 +30384,7 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
if (report)
{
/* Get total counts of full results. */
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (tsk_usage_type, "audit"))
- #endif
+ if (strcmp (tsk_usage_type, "audit"))
{
if (delta == 0)
{
@@ -30538,22 +30522,20 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
filters_extra_buffer = g_string_new ("");
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (tsk_usage_type, "audit") == 0)
- {
- compliance_levels = compliance_levels ? compliance_levels : g_strdup ("yniu");
-
- if (strchr (compliance_levels, 'y'))
- g_string_append (filters_extra_buffer, "Yes");
- if (strchr (compliance_levels, 'n'))
- g_string_append (filters_extra_buffer, "No");
- if (strchr (compliance_levels, 'i'))
- g_string_append (filters_extra_buffer, "Incomplete");
- if (strchr (compliance_levels, 'u'))
- g_string_append (filters_extra_buffer, "Undefined");
- }
- else
- #endif
+ if (strcmp (tsk_usage_type, "audit") == 0)
+ {
+ compliance_levels = compliance_levels ? compliance_levels : g_strdup ("yniu");
+
+ if (strchr (compliance_levels, 'y'))
+ g_string_append (filters_extra_buffer, "Yes");
+ if (strchr (compliance_levels, 'n'))
+ g_string_append (filters_extra_buffer, "No");
+ if (strchr (compliance_levels, 'i'))
+ g_string_append (filters_extra_buffer, "Incomplete");
+ if (strchr (compliance_levels, 'u'))
+ g_string_append (filters_extra_buffer, "Undefined");
+ }
+ else
{
if (strchr (levels, 'h'))
g_string_append (filters_extra_buffer, "High");
@@ -30830,41 +30812,40 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
}
/* Prepare result counts. */
- #if COMPLIANCE_REPORTS == 1
- int compliance_yes, compliance_no;
- int compliance_incomplete, compliance_undefined;
- int total_compliance_count = 0;
+ int compliance_yes, compliance_no;
+ int compliance_incomplete, compliance_undefined;
+ int total_compliance_count = 0;
- if (strcmp (tsk_usage_type, "audit") == 0)
- {
- report_compliance_counts (report, get, &compliance_yes, &compliance_no,
- &compliance_incomplete, &compliance_undefined);
+ if (strcmp (tsk_usage_type, "audit") == 0)
+ {
+ report_compliance_counts (report, get, &compliance_yes, &compliance_no,
+ &compliance_incomplete, &compliance_undefined);
- total_compliance_count = compliance_yes
- + compliance_no
- + compliance_incomplete
- + compliance_undefined;
+ total_compliance_count = compliance_yes
+ + compliance_no
+ + compliance_incomplete
+ + compliance_undefined;
- f_compliance_yes = f_compliance_no = 0;
- f_compliance_incomplete = f_compliance_undefined = 0;
+ f_compliance_yes = f_compliance_no = 0;
+ f_compliance_incomplete = f_compliance_undefined = 0;
- if (count_filtered == 0)
- {
- report_compliance_f_counts (report,
- get,
- &f_compliance_yes,
- &f_compliance_no,
- &f_compliance_incomplete,
- &f_compliance_undefined);
+ if (count_filtered == 0)
+ {
+ report_compliance_f_counts (report,
+ get,
+ &f_compliance_yes,
+ &f_compliance_no,
+ &f_compliance_incomplete,
+ &f_compliance_undefined);
- f_compliance_count = f_compliance_yes
- + f_compliance_no
- + f_compliance_incomplete
- + f_compliance_undefined;
- }
- } else
- #endif
- {
+ f_compliance_count = f_compliance_yes
+ + f_compliance_no
+ + f_compliance_incomplete
+ + f_compliance_undefined;
+ }
+ }
+ else
+ {
if (count_filtered)
{
/* We're getting all the filtered results, so we can count them as we
@@ -30878,12 +30859,12 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
f_false_positives = f_severity = 0;
}
else
- report_counts_id_full (report, &holes, &infos, &logs,
- &warnings, &false_positives, &severity,
- get, NULL,
- &f_holes, &f_infos, &f_logs, &f_warnings,
- &f_false_positives, &f_severity);
- }
+ report_counts_id_full (report, &holes, &infos, &logs,
+ &warnings, &false_positives, &severity,
+ get, NULL,
+ &f_holes, &f_infos, &f_logs, &f_warnings,
+ &f_false_positives, &f_severity);
+ }
/* Results. */
@@ -30948,31 +30929,30 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
/* Quiet erroneous compiler warning. */
result_hosts = NULL;
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (tsk_usage_type, "audit") == 0)
- {
- f_host_compliant = g_hash_table_new_full (g_str_hash, g_str_equal,
- g_free, NULL);
- f_host_notcompliant = g_hash_table_new_full (g_str_hash, g_str_equal,
- g_free, NULL);
- f_host_incomplete = g_hash_table_new_full (g_str_hash, g_str_equal,
+ if (strcmp (tsk_usage_type, "audit") == 0)
+ {
+ f_host_compliant = g_hash_table_new_full (g_str_hash, g_str_equal,
+ g_free, NULL);
+ f_host_notcompliant = g_hash_table_new_full (g_str_hash, g_str_equal,
g_free, NULL);
- f_host_undefined = g_hash_table_new_full (g_str_hash, g_str_equal,
- g_free, NULL);
- } else
- #endif
- {
- f_host_holes = g_hash_table_new_full (g_str_hash, g_str_equal,
- g_free, NULL);
- f_host_warnings = g_hash_table_new_full (g_str_hash, g_str_equal,
+ f_host_incomplete = g_hash_table_new_full (g_str_hash, g_str_equal,
+ g_free, NULL);
+ f_host_undefined = g_hash_table_new_full (g_str_hash, g_str_equal,
+ g_free, NULL);
+ }
+ else
+ {
+ f_host_holes = g_hash_table_new_full (g_str_hash, g_str_equal,
g_free, NULL);
- f_host_infos = g_hash_table_new_full (g_str_hash, g_str_equal,
- g_free, NULL);
- f_host_logs = g_hash_table_new_full (g_str_hash, g_str_equal,
- g_free, NULL);
- f_host_false_positives = g_hash_table_new_full (g_str_hash, g_str_equal,
- g_free, NULL);
- }
+ f_host_warnings = g_hash_table_new_full (g_str_hash, g_str_equal,
+ g_free, NULL);
+ f_host_infos = g_hash_table_new_full (g_str_hash, g_str_equal,
+ g_free, NULL);
+ f_host_logs = g_hash_table_new_full (g_str_hash, g_str_equal,
+ g_free, NULL);
+ f_host_false_positives = g_hash_table_new_full (g_str_hash, g_str_equal,
+ g_free, NULL);
+ }
if (delta && get->details)
{
@@ -31056,109 +31036,107 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
array_add_new_string (result_hosts,
result_iterator_host (&results));
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (tsk_usage_type, "audit") == 0)
- {
- const char* compliance;
- compliance = result_iterator_compliance (&results);
-
- if (strcasecmp (compliance, "yes") == 0)
- {
- f_host_result_counts = f_host_compliant;
- if (count_filtered)
- f_compliance_yes++;
- }
- else if (strcasecmp (compliance, "no") == 0)
- {
- f_host_result_counts = f_host_notcompliant;
- if (count_filtered)
- f_compliance_no++;
- }
- else if (strcasecmp (compliance, "incomplete") == 0)
- {
- f_host_result_counts = f_host_incomplete;
- if (count_filtered)
- f_compliance_incomplete++;
- }
- else if (strcasecmp (compliance, "undefined") == 0)
- {
- f_host_result_counts = f_host_undefined;
- if (count_filtered)
- f_compliance_undefined++;
- }
- else
- {
- f_host_result_counts = NULL;
- }
+ if (strcmp (tsk_usage_type, "audit") == 0)
+ {
+ const char* compliance;
+ compliance = result_iterator_compliance (&results);
- if (f_host_result_counts)
- {
- const char *result_host = result_iterator_host (&results);
- int result_count
- = GPOINTER_TO_INT
- (g_hash_table_lookup (f_host_result_counts,
- result_host));
-
- g_hash_table_replace (f_host_result_counts,
- g_strdup (result_host),
- GINT_TO_POINTER (result_count + 1));
+ if (strcasecmp (compliance, "yes") == 0)
+ {
+ f_host_result_counts = f_host_compliant;
+ if (count_filtered)
+ f_compliance_yes++;
+ }
+ else if (strcasecmp (compliance, "no") == 0)
+ {
+ f_host_result_counts = f_host_notcompliant;
+ if (count_filtered)
+ f_compliance_no++;
+ }
+ else if (strcasecmp (compliance, "incomplete") == 0)
+ {
+ f_host_result_counts = f_host_incomplete;
+ if (count_filtered)
+ f_compliance_incomplete++;
+ }
+ else if (strcasecmp (compliance, "undefined") == 0)
+ {
+ f_host_result_counts = f_host_undefined;
+ if (count_filtered)
+ f_compliance_undefined++;
+ }
+ else
+ {
+ f_host_result_counts = NULL;
}
- } else
- #endif
- {
- double result_severity;
- result_severity = result_iterator_severity_double (&results);
- if (result_severity > f_severity)
- f_severity = result_severity;
-
- level = result_iterator_level (&results);
- if (strcasecmp (level, "log") == 0)
- {
- f_host_result_counts = f_host_logs;
- if (count_filtered)
- f_logs++;
- }
- else if (strcasecmp (level, "high") == 0)
- {
- f_host_result_counts = f_host_holes;
- if (count_filtered)
- f_holes++;
- }
- else if (strcasecmp (level, "medium") == 0)
- {
- f_host_result_counts = f_host_warnings;
- if (count_filtered)
- f_warnings++;
- }
- else if (strcasecmp (level, "low") == 0)
- {
- f_host_result_counts = f_host_infos;
- if (count_filtered)
- f_infos++;
- }
- else if (strcasecmp (level, "false positive") == 0)
- {
- f_host_result_counts = f_host_false_positives;
- if (count_filtered)
- f_false_positives++;
+ if (f_host_result_counts)
+ {
+ const char *result_host = result_iterator_host (&results);
+ int result_count
+ = GPOINTER_TO_INT
+ (g_hash_table_lookup (f_host_result_counts,
+ result_host));
+
+ g_hash_table_replace (f_host_result_counts,
+ g_strdup (result_host),
+ GINT_TO_POINTER (result_count + 1));
}
- else
- f_host_result_counts = NULL;
+ }
+ else
+ {
+ double result_severity;
+ result_severity = result_iterator_severity_double (&results);
+ if (result_severity > f_severity)
+ f_severity = result_severity;
- if (f_host_result_counts)
- {
- const char *result_host = result_iterator_host (&results);
- int result_count
- = GPOINTER_TO_INT
- (g_hash_table_lookup (f_host_result_counts, result_host));
-
- g_hash_table_replace (f_host_result_counts,
- g_strdup (result_host),
- GINT_TO_POINTER (result_count + 1));
- }
- }
+ level = result_iterator_level (&results);
+ if (strcasecmp (level, "log") == 0)
+ {
+ f_host_result_counts = f_host_logs;
+ if (count_filtered)
+ f_logs++;
+ }
+ else if (strcasecmp (level, "high") == 0)
+ {
+ f_host_result_counts = f_host_holes;
+ if (count_filtered)
+ f_holes++;
+ }
+ else if (strcasecmp (level, "medium") == 0)
+ {
+ f_host_result_counts = f_host_warnings;
+ if (count_filtered)
+ f_warnings++;
+ }
+ else if (strcasecmp (level, "low") == 0)
+ {
+ f_host_result_counts = f_host_infos;
+ if (count_filtered)
+ f_infos++;
+ }
+ else if (strcasecmp (level, "false positive") == 0)
+ {
+ f_host_result_counts = f_host_false_positives;
+ if (count_filtered)
+ f_false_positives++;
+ }
+ else
+ f_host_result_counts = NULL;
+
+ if (f_host_result_counts)
+ {
+ const char *result_host = result_iterator_host (&results);
+ int result_count
+ = GPOINTER_TO_INT
+ (g_hash_table_lookup (f_host_result_counts, result_host));
+
+ g_hash_table_replace (f_host_result_counts,
+ g_strdup (result_host),
+ GINT_TO_POINTER (result_count + 1));
+ }
+ }
}
PRINT (out, "");
}
@@ -31169,131 +31147,130 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
/* Print result counts and severity. */
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (tsk_usage_type, "audit") == 0)
- {
- if (delta)
+ if (strcmp (tsk_usage_type, "audit") == 0)
+ {
+ if (delta)
+ PRINT (out,
+ ""
+ "%i"
+ "%i"
+ "%i"
+ "%i"
+ "%i"
+ "",
+ f_compliance_count,
+ (strchr (compliance_levels, 'y') ? f_compliance_yes : 0),
+ (strchr (compliance_levels, 'n') ? f_compliance_no : 0),
+ (strchr (compliance_levels, 'i') ? f_compliance_incomplete : 0),
+ (strchr (compliance_levels, 'u') ? f_compliance_undefined : 0));
+ else
+ {
+ if (count_filtered)
+ f_compliance_count = f_compliance_yes
+ + f_compliance_no
+ + f_compliance_incomplete
+ + f_compliance_undefined;
PRINT (out,
- ""
- "%i"
- "%i"
- "%i"
- "%i"
- "%i"
- "",
- f_compliance_count,
- (strchr (compliance_levels, 'y') ? f_compliance_yes : 0),
- (strchr (compliance_levels, 'n') ? f_compliance_no : 0),
- (strchr (compliance_levels, 'i') ? f_compliance_incomplete : 0),
- (strchr (compliance_levels, 'u') ? f_compliance_undefined : 0));
- else
- {
- if (count_filtered)
- f_compliance_count = f_compliance_yes
- + f_compliance_no
- + f_compliance_incomplete
- + f_compliance_undefined;
- PRINT (out,
- ""
- "%i"
- "%i"
- "%i"
- "%i%i"
- "%i%i"
- "%i%i"
- "%i%i"
- "",
- total_compliance_count,
- total_compliance_count,
- f_compliance_count,
- compliance_yes,
- (strchr (compliance_levels, 'y') ? f_compliance_yes : 0),
- compliance_no,
- (strchr (compliance_levels, 'n') ? f_compliance_no : 0),
- compliance_incomplete,
- (strchr (compliance_levels, 'i') ? f_compliance_incomplete : 0),
- compliance_undefined,
- (strchr (compliance_levels, 'i') ? f_compliance_undefined : 0));
-
- PRINT (out,
- ""
- "%s"
- "%s"
- "",
- report_compliance_from_counts (&compliance_yes,
- &compliance_no,
- &compliance_incomplete,
- &compliance_undefined),
- report_compliance_from_counts (&f_compliance_yes,
- &f_compliance_no,
- &f_compliance_incomplete,
- &f_compliance_undefined));
- }
- } else
- #endif
- {
- if (delta)
- /** @todo The f_holes, etc. vars are setup to give the page count. */
- PRINT (out,
- ""
- "%i"
- "%i"
- "%i"
- "%i"
- "%i"
- ""
- "%i"
- ""
- "",
- orig_filtered_result_count,
- (strchr (levels, 'h') ? orig_f_holes : 0),
- (strchr (levels, 'l') ? orig_f_infos : 0),
- (strchr (levels, 'g') ? orig_f_logs : 0),
- (strchr (levels, 'm') ? orig_f_warnings : 0),
- (strchr (levels, 'f') ? orig_f_false_positives : 0));
- else
- {
- if (count_filtered)
- filtered_result_count = f_holes + f_infos + f_logs
- + f_warnings + false_positives;
+ ""
+ "%i"
+ "%i"
+ "%i"
+ "%i%i"
+ "%i%i"
+ "%i%i"
+ "%i%i"
+ "",
+ total_compliance_count,
+ total_compliance_count,
+ f_compliance_count,
+ compliance_yes,
+ (strchr (compliance_levels, 'y') ? f_compliance_yes : 0),
+ compliance_no,
+ (strchr (compliance_levels, 'n') ? f_compliance_no : 0),
+ compliance_incomplete,
+ (strchr (compliance_levels, 'i') ? f_compliance_incomplete : 0),
+ compliance_undefined,
+ (strchr (compliance_levels, 'i') ? f_compliance_undefined : 0));
+ PRINT (out,
+ ""
+ "%s"
+ "%s"
+ "",
+ report_compliance_from_counts (&compliance_yes,
+ &compliance_no,
+ &compliance_incomplete,
+ &compliance_undefined),
+ report_compliance_from_counts (&f_compliance_yes,
+ &f_compliance_no,
+ &f_compliance_incomplete,
+ &f_compliance_undefined));
+ }
+ }
+ else
+ {
+ if (delta)
+ /** @todo The f_holes, etc. vars are setup to give the page count. */
PRINT (out,
""
- "%i"
- "%i"
"%i"
- "%i%i"
- "%i%i"
- "%i%i"
- "%i%i"
+ "%i"
+ "%i"
+ "%i"
+ "%i"
""
- "%i"
"%i"
""
"",
- total_result_count,
- total_result_count,
- filtered_result_count,
- holes,
- (strchr (levels, 'h') ? f_holes : 0),
- infos,
- (strchr (levels, 'l') ? f_infos : 0),
- logs,
- (strchr (levels, 'g') ? f_logs : 0),
- warnings,
- (strchr (levels, 'm') ? f_warnings : 0),
- false_positives,
- (strchr (levels, 'f') ? f_false_positives : 0));
+ orig_filtered_result_count,
+ (strchr (levels, 'h') ? orig_f_holes : 0),
+ (strchr (levels, 'l') ? orig_f_infos : 0),
+ (strchr (levels, 'g') ? orig_f_logs : 0),
+ (strchr (levels, 'm') ? orig_f_warnings : 0),
+ (strchr (levels, 'f') ? orig_f_false_positives : 0));
+ else
+ {
+ if (count_filtered)
+ filtered_result_count = f_holes + f_infos + f_logs
+ + f_warnings + false_positives;
- PRINT (out,
- ""
- "%1.1f"
- "%1.1f"
- "",
- severity,
- f_severity);
- }
- }
+ PRINT (out,
+ ""
+ "%i"
+ "%i"
+ "%i"
+ "%i%i"
+ "%i%i"
+ "%i%i"
+ "%i%i"
+ ""
+ "%i"
+ "%i"
+ ""
+ "",
+ total_result_count,
+ total_result_count,
+ filtered_result_count,
+ holes,
+ (strchr (levels, 'h') ? f_holes : 0),
+ infos,
+ (strchr (levels, 'l') ? f_infos : 0),
+ logs,
+ (strchr (levels, 'g') ? f_logs : 0),
+ warnings,
+ (strchr (levels, 'm') ? f_warnings : 0),
+ false_positives,
+ (strchr (levels, 'f') ? f_false_positives : 0));
+
+ PRINT (out,
+ ""
+ "%1.1f"
+ "%1.1f"
+ "",
+ severity,
+ f_severity);
+ }
+ }
if (host_summary)
{
@@ -31374,22 +31351,21 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
}
cleanup_iterator (&hosts);
}
- #if COMPLIANCE_REPORTS == 1
- if (strcmp (tsk_usage_type, "audit") == 0)
- {
- g_hash_table_destroy (f_host_compliant);
- g_hash_table_destroy (f_host_notcompliant);
- g_hash_table_destroy (f_host_incomplete);
- g_hash_table_destroy (f_host_undefined);
- } else
- #endif
- {
- g_hash_table_destroy (f_host_holes);
- g_hash_table_destroy (f_host_warnings);
- g_hash_table_destroy (f_host_infos);
- g_hash_table_destroy (f_host_logs);
- g_hash_table_destroy (f_host_false_positives);
- }
+ if (strcmp (tsk_usage_type, "audit") == 0)
+ {
+ g_hash_table_destroy (f_host_compliant);
+ g_hash_table_destroy (f_host_notcompliant);
+ g_hash_table_destroy (f_host_incomplete);
+ g_hash_table_destroy (f_host_undefined);
+ }
+ else
+ {
+ g_hash_table_destroy (f_host_holes);
+ g_hash_table_destroy (f_host_warnings);
+ g_hash_table_destroy (f_host_infos);
+ g_hash_table_destroy (f_host_logs);
+ g_hash_table_destroy (f_host_false_positives);
+ }
g_hash_table_destroy (f_host_ports);
/* Print TLS certificates */
@@ -31487,36 +31463,36 @@ print_report_xml_start (report_t report, report_t delta, task_t task,
return 0;
failed_delta_report:
- fclose (out);
- g_free (sort_field);
- g_free (levels);
- g_free (search_phrase);
- g_free (min_qod);
- g_free (delta_states);
- cleanup_iterator (&results);
- cleanup_iterator (&delta_results);
+ fclose (out);
+ g_free (sort_field);
+ g_free (levels);
+ g_free (search_phrase);
+ g_free (min_qod);
+ g_free (delta_states);
+ cleanup_iterator (&results);
+ cleanup_iterator (&delta_results);
failed_print_report_host:
if (host_summary_buffer)
g_string_free (host_summary_buffer, TRUE);
tz_revert (zone, tz, old_tz_override);
g_hash_table_destroy (f_host_ports);
- #if COMPLIANCE_REPORTS == 1
- g_free (compliance_levels);
- if (strcmp (tsk_usage_type, "audit") == 0)
+
+ g_free (compliance_levels);
+ if (strcmp (tsk_usage_type, "audit") == 0)
{
g_hash_table_destroy (f_host_compliant);
g_hash_table_destroy (f_host_notcompliant);
g_hash_table_destroy (f_host_incomplete);
g_hash_table_destroy (f_host_undefined);
- } else
- #endif
- {
- g_hash_table_destroy (f_host_holes);
- g_hash_table_destroy (f_host_warnings);
- g_hash_table_destroy (f_host_infos);
- g_hash_table_destroy (f_host_logs);
- g_hash_table_destroy (f_host_false_positives);
- }
+ }
+ else
+ {
+ g_hash_table_destroy (f_host_holes);
+ g_hash_table_destroy (f_host_warnings);
+ g_hash_table_destroy (f_host_infos);
+ g_hash_table_destroy (f_host_logs);
+ g_hash_table_destroy (f_host_false_positives);
+ }
return -1;
}
@@ -53824,10 +53800,8 @@ modify_setting (const gchar *uuid, const gchar *name,
setting_name = g_strdup ("Alerts Filter");
else if (strcmp (uuid, "0f040d06-abf9-43a2-8f94-9de178b0e978") == 0)
setting_name = g_strdup ("Assets Filter");
- #if COMPLIANCE_REPORTS == 1
- else if (strcmp (uuid, "45414da7-55f0-44c1-abbb-6b7d1126fbdf") == 0)
- setting_name = g_strdup ("Audit Reports Filter");
- #endif
+ else if (strcmp (uuid, "45414da7-55f0-44c1-abbb-6b7d1126fbdf") == 0)
+ setting_name = g_strdup ("Audit Reports Filter");
else if (strcmp (uuid, "1a9fbd91-0182-44cd-bc88-a13a9b3b1bef") == 0)
setting_name = g_strdup ("Configs Filter");
else if (strcmp (uuid, "186a5ac8-fe5a-4fb1-aa22-44031fb339f3") == 0)
@@ -53951,10 +53925,8 @@ modify_setting (const gchar *uuid, const gchar *name,
setting_name = g_strdup ("Reports Top Dashboard Configuration");
/* Audit Reports dashboard settings */
- #if COMPLIANCE_REPORTS == 1
- else if (strcmp (uuid, "8083d77b-05bb-4b17-ab39-c81175cb512c") == 0)
- setting_name = g_strdup ("Audit Reports Top Dashboard Configuration");
- #endif
+ else if (strcmp (uuid, "8083d77b-05bb-4b17-ab39-c81175cb512c") == 0)
+ setting_name = g_strdup ("Audit Reports Top Dashboard Configuration");
/* Results dashboard settings */
else if (strcmp (uuid, "0b8ae70d-d8fc-4418-8a72-e65ac8d2828e") == 0)
setting_name = g_strdup ("Results Top Dashboard Configuration");
@@ -57717,18 +57689,16 @@ tag_add_resources_filter (tag_t tag, const char *type, const char *filter)
{
get_data_set_extra (&resources_get, "usage_type", g_strdup ("scan"));
}
- #if COMPLIANCE_REPORTS == 1
- else if (strcasecmp (type, "audit_report") == 0)
- {
- type = g_strdup ("report");
- resources_get.type = g_strdup (type);
- get_data_set_extra (&resources_get, "usage_type", g_strdup ("audit"));
- }
- else if (strcasecmp (type, "report") == 0)
- {
- get_data_set_extra (&resources_get, "usage_type", g_strdup ("scan"));
- }
- #endif
+ else if (strcasecmp (type, "audit_report") == 0)
+ {
+ type = g_strdup ("report");
+ resources_get.type = g_strdup (type);
+ get_data_set_extra (&resources_get, "usage_type", g_strdup ("audit"));
+ }
+ else if (strcasecmp (type, "report") == 0)
+ {
+ get_data_set_extra (&resources_get, "usage_type", g_strdup ("scan"));
+ }
gchar *columns;
@@ -57900,20 +57870,18 @@ tag_remove_resources_filter (tag_t tag, const char *type, const char *filter)
{
get_data_set_extra (&resources_get, "usage_type", g_strdup ("scan"));
}
- #if COMPLIANCE_REPORTS == 1
- else if (strcasecmp (type, "audit_report") == 0)
- {
- type = g_strdup ("report");
- resources_get.type = g_strdup (type);
- get_data_set_extra (&resources_get,
- "usage_type",
- g_strdup ("audit"));
- }
- else if (strcasecmp (type, "report") == 0)
- {
- get_data_set_extra (&resources_get, "usage_type", g_strdup ("scan"));
- }
- #endif
+ else if (strcasecmp (type, "audit_report") == 0)
+ {
+ type = g_strdup ("report");
+ resources_get.type = g_strdup (type);
+ get_data_set_extra (&resources_get,
+ "usage_type",
+ g_strdup ("audit"));
+ }
+ else if (strcasecmp (type, "report") == 0)
+ {
+ get_data_set_extra (&resources_get, "usage_type", g_strdup ("scan"));
+ }
gchar *columns;
diff --git a/src/schema_formats/XML/GMP.xml.in b/src/schema_formats/XML/GMP.xml.in
index 5bb6e166d..986a61a21 100644
--- a/src/schema_formats/XML/GMP.xml.in
+++ b/src/schema_formats/XML/GMP.xml.in
@@ -68,7 +68,6 @@ along with this program. If not, see .
xsd:token { pattern = "y?n?i?u?" }
- @IF_COMPLIANCE_REPORTS@
compliance_status
A compliance status
@@ -76,7 +75,6 @@ along with this program. If not, see .
xsd:token { pattern = "yes|no|incomplete|undefined" }
- @ENDIF_COMPLIANCE_REPORTS@
ctime
A date and time, in the C `ctime' format
@@ -2025,16 +2023,12 @@ along with this program. If not, see .
permissions
user_tags
scan_run_status
- @IF_COMPLIANCE_REPORTS@
- @ENDIF_COMPLIANCE_REPORTS@
result_count
severity
- @IF_COMPLIANCE_REPORTS@
compliance_count
compliance
- @ENDIF_COMPLIANCE_REPORTS@
task
ports
results
@@ -2468,7 +2462,6 @@ along with this program. If not, see .
- @IF_COMPLIANCE_REPORTS@
compliance_count
Counts of compliance results. Only for reports of an audit task.
@@ -2577,7 +2570,6 @@ along with this program. If not, see .
- @ENDIF_COMPLIANCE_REPORTS@
severity
@@ -2595,7 +2587,6 @@ along with this program. If not, see .
Maximum severity of the report after filtering
- @IF_COMPLIANCE_REPORTS@
compliance
@@ -2613,7 +2604,6 @@ along with this program. If not, see .
Compliance of the report after filtering ("yes", "no", "incomplete" or "undefined")
- @ENDIF_COMPLIANCE_REPORTS@
task
@@ -2875,15 +2865,11 @@ along with this program. If not, see .
start
end
port_count
- @IF_COMPLIANCE_REPORTS@
- @ENDIF_COMPLIANCE_REPORTS@
result_count
- @IF_COMPLIANCE_REPORTS@
compliance_count
host_compliance
- @ENDIF_COMPLIANCE_REPORTS@
detail
@@ -3001,7 +2987,6 @@ along with this program. If not, see .
- @IF_COMPLIANCE_REPORTS@
compliance_count
Only for audit reports
@@ -3071,7 +3056,6 @@ along with this program. If not, see .
Only for audit reports. Host compliance
compliance_status
- @ENDIF_COMPLIANCE_REPORTS@
detail
A detail associated with the host
@@ -18194,13 +18178,11 @@ END:VCALENDAR
integer
Minimum QoD of the results
- @IF_COMPLIANCE_REPORTS@
- @ENDIF_COMPLIANCE_REPORTS@
tag
text
@@ -18346,7 +18328,6 @@ END:VCALENDAR
iso_time
Scan end time
- @IF_COMPLIANCE_REPORTS@
compliance_yes
integer
@@ -18367,7 +18348,6 @@ END:VCALENDAR
compliance_status
Compliance state of the report. Can be yes, no, incomplete or undefined
- @ENDIF_COMPLIANCE_REPORTS@
@@ -18437,7 +18417,6 @@ END:VCALENDAR
boolean
- @IF_COMPLIANCE_REPORTS@
usage_type
Optional usage type to limit the reports to. Affects total count unlike filter
@@ -18449,7 +18428,6 @@ END:VCALENDAR
- @ENDIF_COMPLIANCE_REPORTS@
@@ -23170,15 +23148,11 @@ END:VCALENDAR
timestamp
scan_end
- @IF_COMPLIANCE_REPORTS@
- @ENDIF_COMPLIANCE_REPORTS@
result_count
severity
- @IF_COMPLIANCE_REPORTS@
compliance_count
- @ENDIF_COMPLIANCE_REPORTS@
timestamp
@@ -23224,7 +23198,6 @@ END:VCALENDAR
severity
Maximum severity of the report
- @IF_COMPLIANCE_REPORTS@
compliance_count
Complaince counts. Only for audit tasks
@@ -23251,7 +23224,6 @@ END:VCALENDAR
integer
- @ENDIF_COMPLIANCE_REPORTS@