1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-20 13:19:01 +00:00

Use one, not two, spaces after "WARNING:".

There were more cases of one space than two.
This commit is contained in:
david
2012-06-20 20:13:51 +00:00
parent d6015faec5
commit 42f71759c2
5 changed files with 12 additions and 12 deletions

View File

@@ -401,7 +401,7 @@ dialog where you can start NPF if you have administrator privileges.";
}
if (pingtype != PINGTYPE_NONE && spoofsource) {
error("WARNING: If -S is being used to fake your source address, you may also have to use -e <interface> and -Pn . If you are using it to specify your real source address, you can ignore this warning.");
error("WARNING: If -S is being used to fake your source address, you may also have to use -e <interface> and -Pn . If you are using it to specify your real source address, you can ignore this warning.");
}
if (pingtype != PINGTYPE_NONE && idlescan) {
@@ -414,7 +414,7 @@ dialog where you can start NPF if you have administrator privileges.";
}
if (connectscan && spoofsource) {
error("WARNING: -S will only affect the source address used in a connect() scan if you specify one of your own addresses. Use -sS or another raw scan if you want to completely spoof your source address, but then you need to know what you're doing to obtain meaningful results.");
error("WARNING: -S will only affect the source address used in a connect() scan if you specify one of your own addresses. Use -sS or another raw scan if you want to completely spoof your source address, but then you need to know what you're doing to obtain meaningful results.");
}
if ((pingtype & PINGTYPE_UDP) && (!isr00t)) {
@@ -495,7 +495,7 @@ dialog where you can start NPF if you have administrator privileges.";
#endif
if (osscan && noportscan) {
fatal("WARNING: OS Scan is unreliable without a port scan. You need to use a scan type along with it, such as -sS, -sT, -sF, etc instead of -sn");
fatal("WARNING: OS Scan is unreliable without a port scan. You need to use a scan type along with it, such as -sS, -sT, -sF, etc instead of -sn");
}
if (osscan && ipprotscan) {
@@ -519,7 +519,7 @@ dialog where you can start NPF if you have administrator privileges.";
resume_ip.s_addr = 0;
if (magic_port_set && connectscan) {
error("WARNING: -g is incompatible with the default connect() scan (-sT). Use a raw scan such as -sS if you want to set the source port.");
error("WARNING: -g is incompatible with the default connect() scan (-sT). Use a raw scan such as -sS if you want to set the source port.");
}
if (max_parallelism && min_parallelism && (min_parallelism > max_parallelism)) {

View File

@@ -1682,7 +1682,7 @@ int nmap_main(int argc, char *argv[]) {
#endif
if (o.max_parallelism && (i = max_sd()) && i < o.max_parallelism) {
error("WARNING: Your specified max_parallel_sockets of %d, but your system says it might only give us %d. Trying anyway", o.max_parallelism, i);
error("WARNING: Your specified max_parallel_sockets of %d, but your system says it might only give us %d. Trying anyway", o.max_parallelism, i);
}
if (o.debugging > 1) log_write(LOG_STDOUT, "The max # of sockets we are using is: %d\n", o.max_parallelism);
@@ -1869,7 +1869,7 @@ int nmap_main(int argc, char *argv[]) {
o.setSourceSockAddr(&ss, sslen);
currenths->setSourceSockAddr(&ss, sslen);
if (! sourceaddrwarning) {
error("WARNING: We could not determine for sure which interface to use, so we are guessing %s . If this is wrong, use -S <my_IP_address>.",
error("WARNING: We could not determine for sure which interface to use, so we are guessing %s . If this is wrong, use -S <my_IP_address>.",
inet_socktop(&ss));
sourceaddrwarning = 1;
}
@@ -2200,7 +2200,7 @@ int gather_logfile_resumption_state(char *fname, int *myargc, char ***myargv) {
nmap_arg_buffer[21 + q-p] = '\0';
if (strstr(nmap_arg_buffer, "--randomize-hosts") != NULL) {
error("WARNING: You are attempting to resume a scan which used --randomize-hosts. Some hosts in the last randomized batch may be missed and others may be repeated once");
error("WARNING: You are attempting to resume a scan which used --randomize-hosts. Some hosts in the last randomized batch may be missed and others may be repeated once");
}
*myargc = arg_parse(nmap_arg_buffer, myargv);
@@ -2574,7 +2574,7 @@ static void getpts_aux(const char *origexpr, int nested, u8 *porttbl, int range_
while(rangestart <= rangeend) {
if (porttbl[rangestart] & range_type) {
if (!(*portwarning)) {
error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).");
error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).");
(*portwarning)++;
}
} else {

View File

@@ -701,7 +701,7 @@ void getpts_aux(const char *origexpr, int nested, u8 *porttbl, int *portwarning)
while(rangestart <= rangeend) {
if (porttbl[rangestart]) {
if (!(*portwarning)) {
error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nping? Have some coffee or grab a RedBull(tm).");
error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nping? Have some coffee or grab a RedBull(tm).");
(*portwarning)++;
}
} else {

View File

@@ -761,7 +761,7 @@ static void endRound(OsScanInfo *OSI, HostOsScan *HOS, int roundNum) {
memcpy(&(hsi->target->seq), &hsi->hss->si, sizeof(struct seq_info));
if (roundNum > 0) {
if (o.verbose)
log_write(LOG_STDOUT, "WARNING: OS didn't match until try #%d\n", roundNum + 1);
log_write(LOG_STDOUT, "WARNING: OS didn't match until try #%d\n", roundNum + 1);
}
match_fingerprint(hsi->FPR->FPs[roundNum], hsi->FPR,
o.reference_FPs, OSSCAN_GUESS_THRESHOLD);
@@ -2554,7 +2554,7 @@ bool HostOsScan::processTSeqResp(HostOsScanStats *hss, struct ip *ip, int replyN
if ((tcp->th_flags & TH_RST)) {
if (hss->si.responses == 0) {
error("WARNING: RST from %s port %d -- is this port really open?",
error("WARNING: RST from %s port %d -- is this port really open?",
hss->target->targetipstr(), hss->openTCPPort);
}
return false;

View File

@@ -3120,7 +3120,7 @@ static UltraProbe *sendArpScanProbe(UltraScanInfo *USI, HostScanStats *hss,
hss->probeSent(sizeof(frame));
if ((rc = eth_send(USI->ethsd, frame, sizeof(frame))) != sizeof(frame)) {
int err = socket_errno();
error("WARNING: eth_send of ARP packet returned %i rather than expected %d (errno=%i: %s)", rc, (int) sizeof(frame), err, strerror(err));
error("WARNING: eth_send of ARP packet returned %i rather than expected %d (errno=%i: %s)", rc, (int) sizeof(frame), err, strerror(err));
}
PacketTrace::traceArp(PacketTrace::SENT, (u8 *) frame + ETH_HDR_LEN, sizeof(frame) - ETH_HDR_LEN, &USI->now);
probe->tryno = tryno;