1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 13:11:28 +00:00

Fix globals, whitespace

This commit is contained in:
dmiller
2016-07-08 04:36:31 +00:00
parent 187d9190c0
commit 0ac0d8f505
4 changed files with 14 additions and 11 deletions

View File

@@ -111,6 +111,7 @@
local bin = require "bin"
local bit = require "bit"
local bits = require "bits"
local math = require "math"
local match = require "match"
local nmap = require "nmap"

View File

@@ -1,4 +1,5 @@
local http = require "http"
local nmap = require "nmap"
local shortport = require "shortport"
local stdnse = require "stdnse"
local ipOps = require "ipOps"
@@ -52,7 +53,7 @@ local function generateHttpV1_0Req(host, port, path)
-- Check if the redirect location contains an IP address
redirectIP = locTarget:match("[%d%.]+")
if redirectIP then
privateIP, _ = ipOps.isPrivate(redirectIP)
privateIP = ipOps.isPrivate(redirectIP)
end
stdnse.debug1("Location: %s", locTarget )

View File

@@ -173,7 +173,7 @@ function action(host,port)
-- Start extracting target information
-- The following works on Windows AD LDAP as well as VMware's LDAP, VMware uses lower case cn vs AD ucase CN
local serverName = string.match(scriptResult,"serverName: [cC][nN]=([^,]+),[cC][nN]=Servers,[cC][nN]=")
local serverName = scriptResult:match("serverName: [cC][nN]=([^,]+),[cC][nN]=Servers,[cC][nN]=")
if serverName then port.version.hostname = serverName end
-- Check to see if this is Active Directory vs some other product or ADAM

View File

@@ -1,3 +1,4 @@
local nmap = require "nmap"
local smb = require "smb"
local stdnse = require "stdnse"
local string = require "string"