mirror of
https://github.com/nmap/nmap.git
synced 2026-01-16 03:19:01 +00:00
removed BSDFIX/BSDUFIX macros for good
This commit is contained in:
@@ -461,15 +461,6 @@ void initialize_idleproxy(struct idle_proxy_info *proxy, char *proxyName,
|
||||
SYN|ACK, but then are slightly less stealthy and have less chance
|
||||
of sneaking through the firewall. Plus SYN|ACK is what they will
|
||||
be receiving back from the target */
|
||||
/* seq_response_num = (ntohl(tcp->th_ack) - 2 - sequence_base);
|
||||
if (seq_response_num < 0 || seq_response_num >= probes_sent) {
|
||||
if (o.debugging) {
|
||||
error("Unable to associate IPID proxy probe response with sent packet (received ack: %lX; sequence base: %lX. Packet:", ntohl(tcp->th_ack), sequence_base);
|
||||
readtcppacket((char *)ip,BSDUFIX(ip->ip_len));
|
||||
}
|
||||
seq_response_num = probes_returned;
|
||||
}
|
||||
*/
|
||||
probes_returned++;
|
||||
ipids[seq_response_num] = (u16) ntohs(ip->ip_id);
|
||||
probe_returned[seq_response_num] = 1;
|
||||
|
||||
@@ -455,7 +455,7 @@ if (o.verbose && openport != (unsigned long) -1)
|
||||
/* BzzT! Value out of range */
|
||||
if (o.debugging) {
|
||||
error("Unable to associate os scan response with sent packet (received ack: %lX; sequence base: %lX. Packet:", (unsigned long) ntohl(tcp->th_ack), (unsigned long) sequence_base);
|
||||
readtcppacket((unsigned char *)ip,BSDUFIX(ip->ip_len));
|
||||
readtcppacket((unsigned char *)ip,ntohs(ip->ip_len));
|
||||
}
|
||||
seq_response_num = si->responses;
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user