1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-29 01:29:22 +00:00

Spelling corrections. Fixes #1160

This commit is contained in:
dmiller
2018-03-26 14:59:41 +00:00
parent b5bd185743
commit 689ea0e05d
34 changed files with 44 additions and 44 deletions

View File

@@ -491,7 +491,7 @@ int IPv4Header::setNextProto(u8 p){
/** Sets field "next protocol" to the number that corresponds to the supplied
* protocol name. Currently onyl TCP, UDP and ICMP are supported. Any
* protocol name. Currently only TCP, UDP and ICMP are supported. Any
* help to extend this functionality would be appreciated. For a list of all
* proto names and numbers check:
* http://www.iana.org/assignments/protocol-numbers/ */

View File

@@ -471,7 +471,7 @@ u8 IPv6Header::getNextHeader() const {
/** Sets field "next header" to the number that corresponds to the supplied
* protocol name. Currently onyl TCP, UDP and ICMP are supported. Any
* protocol name. Currently only TCP, UDP and ICMP are supported. Any
* help to extend this functionality would be appreciated. For a list of all
* proto names and numbers check:
* http://www.iana.org/assignments/protocol-numbers/ */

View File

@@ -1820,7 +1820,7 @@ bool PacketParser::is_response(PacketElement *sent, PacketElement *rcvd){
*
* It returns NULL if no transport layer header is found.
*
* Note that this method onyl understands IPv4, IPv6 (and its
* Note that this method only understands IPv4, IPv6 (and its
* extension headers) and Ethernet. If the supplied packet contains
* something different before the tranport layer, NULL will be returned.
* */

View File

@@ -2806,7 +2806,7 @@ const char *ippackethdrinfo(const u8 *packet, u32 len, int detail) {
/* Basic check to ensure we have an IPv4 datagram attached */
/* TODO: We should actually check the datagram checksum to
* see if it validates becuase just checking the version number
* see if it validates because just checking the version number
* is not enough. On average, if we get random data 1 out of
* 16 (2^4bits) times we will have value 4. */
if ((ip2->ip_v != 4) || ((ip2->ip_hl * 4) < 20) || ((ip2->ip_hl * 4) > 60)) {
@@ -3402,7 +3402,7 @@ static int route_dst_generic(const struct sockaddr_storage *dst,
netutil_fatal("%s passed a NULL dst address", __func__);
if(spoofss!=NULL){
/* Throughout the rest of this function we only change rnfo->srcaddr if the source isnt spoofed */
/* Throughout the rest of this function we only change rnfo->srcaddr if the source isn't spoofed */
memcpy(&rnfo->srcaddr, spoofss, sizeof(rnfo->srcaddr));
/* The device corresponding to this spoofed address should already have been set elsewhere. */
assert(device!=NULL && device[0]!='\0');