1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-16 03:19:01 +00:00

removed BSDFIX/BSDUFIX macros for good

This commit is contained in:
fyodor
2005-07-27 02:38:38 +00:00
parent f071c68e07
commit 9ea1ad84d2
2 changed files with 1 additions and 10 deletions

View File

@@ -461,15 +461,6 @@ void initialize_idleproxy(struct idle_proxy_info *proxy, char *proxyName,
SYN|ACK, but then are slightly less stealthy and have less chance
of sneaking through the firewall. Plus SYN|ACK is what they will
be receiving back from the target */
/* seq_response_num = (ntohl(tcp->th_ack) - 2 - sequence_base);
if (seq_response_num < 0 || seq_response_num >= probes_sent) {
if (o.debugging) {
error("Unable to associate IPID proxy probe response with sent packet (received ack: %lX; sequence base: %lX. Packet:", ntohl(tcp->th_ack), sequence_base);
readtcppacket((char *)ip,BSDUFIX(ip->ip_len));
}
seq_response_num = probes_returned;
}
*/
probes_returned++;
ipids[seq_response_num] = (u16) ntohs(ip->ip_id);
probe_returned[seq_response_num] = 1;

View File

@@ -455,7 +455,7 @@ if (o.verbose && openport != (unsigned long) -1)
/* BzzT! Value out of range */
if (o.debugging) {
error("Unable to associate os scan response with sent packet (received ack: %lX; sequence base: %lX. Packet:", (unsigned long) ntohl(tcp->th_ack), (unsigned long) sequence_base);
readtcppacket((unsigned char *)ip,BSDUFIX(ip->ip_len));
readtcppacket((unsigned char *)ip,ntohs(ip->ip_len));
}
seq_response_num = si->responses;
}