1
0
mirror of https://github.com/nmap/nmap.git synced 2026-02-01 19:19:09 +00:00

Spellcheck for Ncat, Nping source files

This commit is contained in:
dmiller
2014-02-20 21:22:22 +00:00
parent 3f0d0c16f9
commit 1575c63d7d
36 changed files with 77 additions and 77 deletions

View File

@@ -131,7 +131,7 @@ static int b64enc_internal(const unsigned char *data, int len, char *dest)
char *buf = dest;
/* Encode three bytes per iteration ala rfc3548. */
/* Encode three bytes per iteration a la rfc3548. */
while (len >= 3) {
buf[0] = b64alpha[(data[0] >> 2) & 0x3f];
buf[1] = b64alpha[((data[0] << 4) & 0x30) | ((data[1] >> 4) & 0xf)];

View File

@@ -570,7 +570,7 @@ static int field_name_equal(const char *a, const char *b)
/* Get the value of every header with the given name, separated by commas. If
you only want the first value for header fields that should not be
concatentated in this way, use http_header_get_first. The returned string
concatenated in this way, use http_header_get_first. The returned string
must be freed. */
char *http_header_get(const struct http_header *header, const char *name)
{

View File

@@ -378,7 +378,7 @@ char *http_digest_proxy_authorization(const struct http_challenge *challenge,
}
/* Check that a nonce is one that we issued, and that the response is what is
expected. This doesn't do any checking aginst the lifetime of the nonce. */
expected. This doesn't do any checking against the lifetime of the nonce. */
int http_digest_check_credentials(const char *username, const char *realm,
const char *password, const char *method,
const struct http_credentials *credentials)

View File

@@ -705,7 +705,7 @@ static int do_proxy_socks5(void)
/*
* For username/password authentication the client's authentication request is
* field 1: version number, 1 byte (must be 0x01 -- version of subnegotion)
* field 1: version number, 1 byte (must be 0x01 -- version of subnegotiation)
* field 2: username length, 1 byte
* field 3: username
* field 4: password length, 1 byte
@@ -861,7 +861,7 @@ int ncat_connect(void)
nsock_pool mypool;
int rc;
/* Unless explicitely asked not to do so, ncat uses the
/* Unless explicitly asked not to do so, ncat uses the
* fallback nsock engine to maximize compatibility between
* operating systems and the different use cases.
*/

View File

@@ -1,5 +1,5 @@
/***************************************************************************
* ncat_core.c -- Contains option defintions and miscellaneous functions. *
* ncat_core.c -- Contains option definitions and miscellaneous functions. *
***********************IMPORTANT NMAP LICENSE TERMS************************
* *
* The Nmap Security Scanner is (C) 1996-2013 Insecure.Com LLC. Nmap is *

View File

@@ -508,7 +508,7 @@ static DWORD WINAPI subprocess_thread_func(void *data)
break;
/* Restore the select event (and non-block the socket again.) */
WSAEventSelect(info->fdn.fd, events[0], FD_READ | FD_CLOSE);
/* Queue another ansychronous read. */
/* Queue another asychronous read. */
ReadFile(info->child_out_r, pipe_buffer, sizeof(pipe_buffer), NULL, &overlap);
} else {
if (GetLastError() != ERROR_IO_PENDING)

View File

@@ -165,7 +165,7 @@
from us, like a pending ssl negotiation. */
static fd_set master_readfds, master_writefds, master_broadcastfds;
#ifdef HAVE_OPENSSL
/* sslpending_fds containts the list of ssl sockets that are waiting to complete
/* sslpending_fds contains the list of ssl sockets that are waiting to complete
the ssl handshake */
static fd_set sslpending_fds;
#endif

View File

@@ -429,7 +429,7 @@ int main(int argc, char *argv[])
o.proto = IPPROTO_UDP;
break;
case 'v':
/* One -v activites verbose, after that it's debugging. */
/* One -v activates verbose, after that it's debugging. */
if (o.verbose == 0)
o.verbose++;
else

View File

@@ -258,7 +258,7 @@ void netexec(struct fdinfo *info, char *cmdexec)
maxfd = info->fd;
/* This is the parent process. Enter a "caretaker" loop that reads from the
socket and writes to the suprocess, and reads from the subprocess and
socket and writes to the subprocess, and reads from the subprocess and
writes to the socket. We exit the loop on any read error (or EOF). On a
write error we just close the opposite side of the conversation. */
crlf_state = 0;

View File

@@ -226,7 +226,7 @@ int ncat_http_server(void)
continue;
}
/* make us not block on accepts in wierd cases. See ncat_listen.c:209 */
/* make us not block on accepts in weird cases. See ncat_listen.c:209 */
unblock_socket(listen_socket[num_sockets]);
/* setup select sets and max fd */

View File

@@ -192,7 +192,7 @@ static struct lstr *check(SSL *ssl, const struct lstr names[])
return results;
}
/* Make a certificate object trusted by an SSL_CTX. I coulnd't find a way to do
/* Make a certificate object trusted by an SSL_CTX. I couldn't find a way to do
this directly, so the certificate is written in PEM format to a temporary
file and then loaded with SSL_CTX_load_verify_locations. Returns 1 on success
and 0 on failure. */