mirror of
https://github.com/nmap/nmap.git
synced 2025-12-10 09:49:05 +00:00
spellcheck patch
This commit is contained in:
@@ -1,4 +1,5 @@
|
||||
# Nmap Changelog ($Id$); -*-text-*-
|
||||
o Applied some small internal cleanup patches by Kris Katterjohn.
|
||||
|
||||
4.20ALPHA6
|
||||
|
||||
|
||||
2
HACKING
2
HACKING
@@ -32,7 +32,7 @@ to track down and patch a problem, bug reports are always welcome.
|
||||
Hackers interested in something more major, such as a new feature, are
|
||||
encouraged to send a mail describing their plans to
|
||||
nmap-dev@insecure.org . This is a good way to solicit feedback on
|
||||
your proposals. List members or often very willing to help. You
|
||||
your proposals. List members are often very willing to help. You
|
||||
might want to subscribe to that mailing list as well -- send a blank
|
||||
email to nmap-dev-subscribe@insecure.org . While you are at it, you
|
||||
might also want to subscribe to nmap-hackers via the same mechanism.
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.1).
|
||||
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||
.TH "NMAP" "1" "08/31/2006" "" "Nmap Reference Guide"
|
||||
.TH "NMAP" "1" "09/02/2006" "" "Nmap Reference Guide"
|
||||
.\" disable hyphenation
|
||||
.nh
|
||||
.\" disable justification (adjust text to left margin only)
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
Nmap 4.20ALPHA5 ( http://insecure.org/nmap/ )
|
||||
Nmap 4.20ALPHA6 ( http://Insecure.Org )
|
||||
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||
TARGET SPECIFICATION:
|
||||
Can pass hostnames, IP addresses, networks, etc.
|
||||
|
||||
@@ -5,7 +5,7 @@
|
||||
* completely blind scanning (eg no packets sent to the target from your *
|
||||
* own IP address) and can also be used to penetrate firewalls and scope *
|
||||
* out router ACLs. This is one of the "advanced" scans meant for *
|
||||
* epxerienced Nmap users. *
|
||||
* experienced Nmap users. *
|
||||
* *
|
||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||
* *
|
||||
|
||||
@@ -5,7 +5,7 @@
|
||||
* completely blind scanning (eg no packets sent to the target from your *
|
||||
* own IP address) and can also be used to penetrate firewalls and scope *
|
||||
* out router ACLs. This is one of the "advanced" scans meant for *
|
||||
* epxerienced Nmap users. *
|
||||
* experienced Nmap users. *
|
||||
* *
|
||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||
* *
|
||||
|
||||
@@ -959,13 +959,7 @@ static FingerPrint *get_fingerprint(Target *target, struct seq_info *si) {
|
||||
/* printf("The sequence sum is %e\n", seq_inc_sum);*/
|
||||
seq_inc_sum /= (si->responses - 1);
|
||||
|
||||
/* Some versions of Linux libc seem to have broken pow ... so we
|
||||
avoid it */
|
||||
#ifdef LINUX
|
||||
si->index = (unsigned int) (0.5 + sqrt(seq_inc_sum));
|
||||
#else
|
||||
si->index = (unsigned int) (0.5 + pow(seq_inc_sum, 0.5));
|
||||
#endif
|
||||
|
||||
/* printf("The sequence index is %d\n", si->index);*/
|
||||
if (si->index < 75) {
|
||||
|
||||
@@ -1735,11 +1735,7 @@ void HostOsScan::makeTSeqFP(HostOsScanStats *hss) {
|
||||
seq_stddev /= hss->si.responses - 2;
|
||||
|
||||
/* Next we need to take the square root of this value */
|
||||
#ifdef LINUX
|
||||
seq_stddev = (unsigned int) (0.5 + sqrt(seq_stddev));
|
||||
#else
|
||||
seq_stddev = (unsigned int) (0.5 + pow(seq_stddev, 0.5));
|
||||
#endif
|
||||
|
||||
/* Finally we take a binary logarithm, multiply by 8, and round
|
||||
to get the final result */
|
||||
|
||||
@@ -195,7 +195,7 @@ struct protoent *nmap_getprotbynum(int num) {
|
||||
|
||||
}
|
||||
|
||||
/* Be default we do all prots 0-255. */
|
||||
/* By default we do all prots 0-255. */
|
||||
struct scan_lists *getdefaultprots(void) {
|
||||
int protindex = 0;
|
||||
struct scan_lists *scanlist;
|
||||
|
||||
@@ -983,7 +983,7 @@ void ServiceProbe::setPortVector(vector<u16> *portv, const char *portstr,
|
||||
// SERVICE_TUNNEL_SSL. Otherwise use SERVICE_TUNNEL_NONE. The line
|
||||
// number is requested because this function will bail with an error
|
||||
// (giving the line number) if it fails to parse the string. Ports
|
||||
// are a comma seperated list of ports and ranges
|
||||
// are a comma separated list of ports and ranges
|
||||
// (e.g. 53,80,6000-6010).
|
||||
void ServiceProbe::setProbablePorts(enum service_tunnel_type tunnel,
|
||||
const char *portstr, int lineno) {
|
||||
@@ -1053,7 +1053,7 @@ void ServiceProbe::addMatch(const char *match, int lineno) {
|
||||
}
|
||||
|
||||
// Parses the given nmap-service-probes file into the AP class
|
||||
/* Must NOT be static because I have externam maintenance tools (servicematch)
|
||||
/* Must NOT be static because I have external maintenance tools (servicematch)
|
||||
which use this */
|
||||
void parse_nmap_service_probe_file(AllProbes *AP, char *filename) {
|
||||
ServiceProbe *newProbe;
|
||||
|
||||
@@ -253,7 +253,7 @@ class ServiceProbe {
|
||||
// SERVICE_TUNNEL_SSL. Otherwise use SERVICE_TUNNEL_NONE. The line
|
||||
// number is requested because this function will bail with an error
|
||||
// (giving the line number) if it fails to parse the string. Ports
|
||||
// are a comma seperated list of ports and ranges
|
||||
// are a comma separated list of ports and ranges
|
||||
// (e.g. 53,80,6000-6010).
|
||||
void setProbablePorts(enum service_tunnel_type tunnel,
|
||||
const char *portstr, int lineno);
|
||||
|
||||
2
tcpip.h
2
tcpip.h
@@ -505,7 +505,7 @@ bool route_dst(const struct sockaddr_storage *const dst, struct route_nfo *rnfo)
|
||||
be set to 1 if dst is directly connected on the ifentry network and
|
||||
0 if it requires routing. If nexthop_ip is not NULL, and routing
|
||||
is required, the next hop is filled into nexthop_ip. This function
|
||||
returns false if no apporpiate interface or route was found and
|
||||
returns false if no appropiate interface or route was found and
|
||||
true if it succeeds. */
|
||||
bool routethrough(const struct sockaddr_storage * const dest,
|
||||
struct intf_entry *ifentry,
|
||||
|
||||
4
utils.cc
4
utils.cc
@@ -195,7 +195,7 @@ char *strerror(int errnum) {
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Like the perl equivialent -- It removes the terminating newline from string
|
||||
/* Like the perl equivalent -- It removes the terminating newline from string
|
||||
IF one exists. It then returns the POSSIBLY MODIFIED string */
|
||||
char *chomp(char *string) {
|
||||
int len = strlen(string);
|
||||
@@ -388,7 +388,7 @@ unsigned int gcd_n_uint(int nvals, unsigned int *val)
|
||||
}
|
||||
|
||||
/* This function takes a command and the address of an uninitialized
|
||||
char ** . It parses the command (by seperating out whitespace)
|
||||
char ** . It parses the command (by separating out whitespace)
|
||||
into an argv[] style char **, which it sets the argv parameter to.
|
||||
The function returns the number of items filled up in the array
|
||||
(argc), or -1 in the case of an error. This function allocates
|
||||
|
||||
Reference in New Issue
Block a user