From 42f71759c27fdb8a92a755fcd0d9001d7ef9cb18 Mon Sep 17 00:00:00 2001 From: david Date: Wed, 20 Jun 2012 20:13:51 +0000 Subject: [PATCH] Use one, not two, spaces after "WARNING:". There were more cases of one space than two. --- NmapOps.cc | 8 ++++---- nmap.cc | 8 ++++---- nping/common_modified.cc | 2 +- osscan2.cc | 4 ++-- scan_engine.cc | 2 +- 5 files changed, 12 insertions(+), 12 deletions(-) diff --git a/NmapOps.cc b/NmapOps.cc index 10d83dfd9..b539b2772 100644 --- a/NmapOps.cc +++ b/NmapOps.cc @@ -401,7 +401,7 @@ dialog where you can start NPF if you have administrator privileges."; } if (pingtype != PINGTYPE_NONE && spoofsource) { - error("WARNING: If -S is being used to fake your source address, you may also have to use -e and -Pn . If you are using it to specify your real source address, you can ignore this warning."); + error("WARNING: If -S is being used to fake your source address, you may also have to use -e and -Pn . If you are using it to specify your real source address, you can ignore this warning."); } if (pingtype != PINGTYPE_NONE && idlescan) { @@ -414,7 +414,7 @@ dialog where you can start NPF if you have administrator privileges."; } if (connectscan && spoofsource) { - error("WARNING: -S will only affect the source address used in a connect() scan if you specify one of your own addresses. Use -sS or another raw scan if you want to completely spoof your source address, but then you need to know what you're doing to obtain meaningful results."); + error("WARNING: -S will only affect the source address used in a connect() scan if you specify one of your own addresses. Use -sS or another raw scan if you want to completely spoof your source address, but then you need to know what you're doing to obtain meaningful results."); } if ((pingtype & PINGTYPE_UDP) && (!isr00t)) { @@ -495,7 +495,7 @@ dialog where you can start NPF if you have administrator privileges."; #endif if (osscan && noportscan) { - fatal("WARNING: OS Scan is unreliable without a port scan. You need to use a scan type along with it, such as -sS, -sT, -sF, etc instead of -sn"); + fatal("WARNING: OS Scan is unreliable without a port scan. You need to use a scan type along with it, such as -sS, -sT, -sF, etc instead of -sn"); } if (osscan && ipprotscan) { @@ -519,7 +519,7 @@ dialog where you can start NPF if you have administrator privileges."; resume_ip.s_addr = 0; if (magic_port_set && connectscan) { - error("WARNING: -g is incompatible with the default connect() scan (-sT). Use a raw scan such as -sS if you want to set the source port."); + error("WARNING: -g is incompatible with the default connect() scan (-sT). Use a raw scan such as -sS if you want to set the source port."); } if (max_parallelism && min_parallelism && (min_parallelism > max_parallelism)) { diff --git a/nmap.cc b/nmap.cc index 886d65139..4b3f883fb 100644 --- a/nmap.cc +++ b/nmap.cc @@ -1682,7 +1682,7 @@ int nmap_main(int argc, char *argv[]) { #endif if (o.max_parallelism && (i = max_sd()) && i < o.max_parallelism) { - error("WARNING: Your specified max_parallel_sockets of %d, but your system says it might only give us %d. Trying anyway", o.max_parallelism, i); + error("WARNING: Your specified max_parallel_sockets of %d, but your system says it might only give us %d. Trying anyway", o.max_parallelism, i); } if (o.debugging > 1) log_write(LOG_STDOUT, "The max # of sockets we are using is: %d\n", o.max_parallelism); @@ -1869,7 +1869,7 @@ int nmap_main(int argc, char *argv[]) { o.setSourceSockAddr(&ss, sslen); currenths->setSourceSockAddr(&ss, sslen); if (! sourceaddrwarning) { - error("WARNING: We could not determine for sure which interface to use, so we are guessing %s . If this is wrong, use -S .", + error("WARNING: We could not determine for sure which interface to use, so we are guessing %s . If this is wrong, use -S .", inet_socktop(&ss)); sourceaddrwarning = 1; } @@ -2200,7 +2200,7 @@ int gather_logfile_resumption_state(char *fname, int *myargc, char ***myargv) { nmap_arg_buffer[21 + q-p] = '\0'; if (strstr(nmap_arg_buffer, "--randomize-hosts") != NULL) { - error("WARNING: You are attempting to resume a scan which used --randomize-hosts. Some hosts in the last randomized batch may be missed and others may be repeated once"); + error("WARNING: You are attempting to resume a scan which used --randomize-hosts. Some hosts in the last randomized batch may be missed and others may be repeated once"); } *myargc = arg_parse(nmap_arg_buffer, myargv); @@ -2574,7 +2574,7 @@ static void getpts_aux(const char *origexpr, int nested, u8 *porttbl, int range_ while(rangestart <= rangeend) { if (porttbl[rangestart] & range_type) { if (!(*portwarning)) { - error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm)."); + error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm)."); (*portwarning)++; } } else { diff --git a/nping/common_modified.cc b/nping/common_modified.cc index 0c46b9074..cf4ce19e6 100644 --- a/nping/common_modified.cc +++ b/nping/common_modified.cc @@ -701,7 +701,7 @@ void getpts_aux(const char *origexpr, int nested, u8 *porttbl, int *portwarning) while(rangestart <= rangeend) { if (porttbl[rangestart]) { if (!(*portwarning)) { - error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nping? Have some coffee or grab a RedBull(tm)."); + error("WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nping? Have some coffee or grab a RedBull(tm)."); (*portwarning)++; } } else { diff --git a/osscan2.cc b/osscan2.cc index fa3e735bb..ac4f4b7ad 100644 --- a/osscan2.cc +++ b/osscan2.cc @@ -761,7 +761,7 @@ static void endRound(OsScanInfo *OSI, HostOsScan *HOS, int roundNum) { memcpy(&(hsi->target->seq), &hsi->hss->si, sizeof(struct seq_info)); if (roundNum > 0) { if (o.verbose) - log_write(LOG_STDOUT, "WARNING: OS didn't match until try #%d\n", roundNum + 1); + log_write(LOG_STDOUT, "WARNING: OS didn't match until try #%d\n", roundNum + 1); } match_fingerprint(hsi->FPR->FPs[roundNum], hsi->FPR, o.reference_FPs, OSSCAN_GUESS_THRESHOLD); @@ -2554,7 +2554,7 @@ bool HostOsScan::processTSeqResp(HostOsScanStats *hss, struct ip *ip, int replyN if ((tcp->th_flags & TH_RST)) { if (hss->si.responses == 0) { - error("WARNING: RST from %s port %d -- is this port really open?", + error("WARNING: RST from %s port %d -- is this port really open?", hss->target->targetipstr(), hss->openTCPPort); } return false; diff --git a/scan_engine.cc b/scan_engine.cc index 93b91d222..ca36fc68e 100644 --- a/scan_engine.cc +++ b/scan_engine.cc @@ -3120,7 +3120,7 @@ static UltraProbe *sendArpScanProbe(UltraScanInfo *USI, HostScanStats *hss, hss->probeSent(sizeof(frame)); if ((rc = eth_send(USI->ethsd, frame, sizeof(frame))) != sizeof(frame)) { int err = socket_errno(); - error("WARNING: eth_send of ARP packet returned %i rather than expected %d (errno=%i: %s)", rc, (int) sizeof(frame), err, strerror(err)); + error("WARNING: eth_send of ARP packet returned %i rather than expected %d (errno=%i: %s)", rc, (int) sizeof(frame), err, strerror(err)); } PacketTrace::traceArp(PacketTrace::SENT, (u8 *) frame + ETH_HDR_LEN, sizeof(frame) - ETH_HDR_LEN, &USI->now); probe->tryno = tryno;