mirror of
https://github.com/nmap/nmap.git
synced 2026-02-01 19:19:09 +00:00
Spellcheck for Ncat, Nping source files
This commit is contained in:
@@ -131,7 +131,7 @@ static int b64enc_internal(const unsigned char *data, int len, char *dest)
|
||||
|
||||
char *buf = dest;
|
||||
|
||||
/* Encode three bytes per iteration ala rfc3548. */
|
||||
/* Encode three bytes per iteration a la rfc3548. */
|
||||
while (len >= 3) {
|
||||
buf[0] = b64alpha[(data[0] >> 2) & 0x3f];
|
||||
buf[1] = b64alpha[((data[0] << 4) & 0x30) | ((data[1] >> 4) & 0xf)];
|
||||
|
||||
@@ -570,7 +570,7 @@ static int field_name_equal(const char *a, const char *b)
|
||||
|
||||
/* Get the value of every header with the given name, separated by commas. If
|
||||
you only want the first value for header fields that should not be
|
||||
concatentated in this way, use http_header_get_first. The returned string
|
||||
concatenated in this way, use http_header_get_first. The returned string
|
||||
must be freed. */
|
||||
char *http_header_get(const struct http_header *header, const char *name)
|
||||
{
|
||||
|
||||
@@ -378,7 +378,7 @@ char *http_digest_proxy_authorization(const struct http_challenge *challenge,
|
||||
}
|
||||
|
||||
/* Check that a nonce is one that we issued, and that the response is what is
|
||||
expected. This doesn't do any checking aginst the lifetime of the nonce. */
|
||||
expected. This doesn't do any checking against the lifetime of the nonce. */
|
||||
int http_digest_check_credentials(const char *username, const char *realm,
|
||||
const char *password, const char *method,
|
||||
const struct http_credentials *credentials)
|
||||
|
||||
@@ -705,7 +705,7 @@ static int do_proxy_socks5(void)
|
||||
|
||||
/*
|
||||
* For username/password authentication the client's authentication request is
|
||||
* field 1: version number, 1 byte (must be 0x01 -- version of subnegotion)
|
||||
* field 1: version number, 1 byte (must be 0x01 -- version of subnegotiation)
|
||||
* field 2: username length, 1 byte
|
||||
* field 3: username
|
||||
* field 4: password length, 1 byte
|
||||
@@ -861,7 +861,7 @@ int ncat_connect(void)
|
||||
nsock_pool mypool;
|
||||
int rc;
|
||||
|
||||
/* Unless explicitely asked not to do so, ncat uses the
|
||||
/* Unless explicitly asked not to do so, ncat uses the
|
||||
* fallback nsock engine to maximize compatibility between
|
||||
* operating systems and the different use cases.
|
||||
*/
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
/***************************************************************************
|
||||
* ncat_core.c -- Contains option defintions and miscellaneous functions. *
|
||||
* ncat_core.c -- Contains option definitions and miscellaneous functions. *
|
||||
***********************IMPORTANT NMAP LICENSE TERMS************************
|
||||
* *
|
||||
* The Nmap Security Scanner is (C) 1996-2013 Insecure.Com LLC. Nmap is *
|
||||
|
||||
@@ -508,7 +508,7 @@ static DWORD WINAPI subprocess_thread_func(void *data)
|
||||
break;
|
||||
/* Restore the select event (and non-block the socket again.) */
|
||||
WSAEventSelect(info->fdn.fd, events[0], FD_READ | FD_CLOSE);
|
||||
/* Queue another ansychronous read. */
|
||||
/* Queue another asychronous read. */
|
||||
ReadFile(info->child_out_r, pipe_buffer, sizeof(pipe_buffer), NULL, &overlap);
|
||||
} else {
|
||||
if (GetLastError() != ERROR_IO_PENDING)
|
||||
|
||||
@@ -165,7 +165,7 @@
|
||||
from us, like a pending ssl negotiation. */
|
||||
static fd_set master_readfds, master_writefds, master_broadcastfds;
|
||||
#ifdef HAVE_OPENSSL
|
||||
/* sslpending_fds containts the list of ssl sockets that are waiting to complete
|
||||
/* sslpending_fds contains the list of ssl sockets that are waiting to complete
|
||||
the ssl handshake */
|
||||
static fd_set sslpending_fds;
|
||||
#endif
|
||||
|
||||
@@ -429,7 +429,7 @@ int main(int argc, char *argv[])
|
||||
o.proto = IPPROTO_UDP;
|
||||
break;
|
||||
case 'v':
|
||||
/* One -v activites verbose, after that it's debugging. */
|
||||
/* One -v activates verbose, after that it's debugging. */
|
||||
if (o.verbose == 0)
|
||||
o.verbose++;
|
||||
else
|
||||
|
||||
@@ -258,7 +258,7 @@ void netexec(struct fdinfo *info, char *cmdexec)
|
||||
maxfd = info->fd;
|
||||
|
||||
/* This is the parent process. Enter a "caretaker" loop that reads from the
|
||||
socket and writes to the suprocess, and reads from the subprocess and
|
||||
socket and writes to the subprocess, and reads from the subprocess and
|
||||
writes to the socket. We exit the loop on any read error (or EOF). On a
|
||||
write error we just close the opposite side of the conversation. */
|
||||
crlf_state = 0;
|
||||
|
||||
@@ -226,7 +226,7 @@ int ncat_http_server(void)
|
||||
continue;
|
||||
}
|
||||
|
||||
/* make us not block on accepts in wierd cases. See ncat_listen.c:209 */
|
||||
/* make us not block on accepts in weird cases. See ncat_listen.c:209 */
|
||||
unblock_socket(listen_socket[num_sockets]);
|
||||
|
||||
/* setup select sets and max fd */
|
||||
|
||||
@@ -192,7 +192,7 @@ static struct lstr *check(SSL *ssl, const struct lstr names[])
|
||||
return results;
|
||||
}
|
||||
|
||||
/* Make a certificate object trusted by an SSL_CTX. I coulnd't find a way to do
|
||||
/* Make a certificate object trusted by an SSL_CTX. I couldn't find a way to do
|
||||
this directly, so the certificate is written in PEM format to a temporary
|
||||
file and then loaded with SSL_CTX_load_verify_locations. Returns 1 on success
|
||||
and 0 on failure. */
|
||||
|
||||
Reference in New Issue
Block a user