From 9ea1ad84d2f39b2278ef81f6ca8b8fc837dd3e0a Mon Sep 17 00:00:00 2001 From: fyodor Date: Wed, 27 Jul 2005 02:38:38 +0000 Subject: [PATCH] removed BSDFIX/BSDUFIX macros for good --- idle_scan.cc | 9 --------- osscan.cc | 2 +- 2 files changed, 1 insertion(+), 10 deletions(-) diff --git a/idle_scan.cc b/idle_scan.cc index e331feb7d..dbbbd2d72 100644 --- a/idle_scan.cc +++ b/idle_scan.cc @@ -461,15 +461,6 @@ void initialize_idleproxy(struct idle_proxy_info *proxy, char *proxyName, SYN|ACK, but then are slightly less stealthy and have less chance of sneaking through the firewall. Plus SYN|ACK is what they will be receiving back from the target */ - /* seq_response_num = (ntohl(tcp->th_ack) - 2 - sequence_base); - if (seq_response_num < 0 || seq_response_num >= probes_sent) { - if (o.debugging) { - error("Unable to associate IPID proxy probe response with sent packet (received ack: %lX; sequence base: %lX. Packet:", ntohl(tcp->th_ack), sequence_base); - readtcppacket((char *)ip,BSDUFIX(ip->ip_len)); - } - seq_response_num = probes_returned; - } - */ probes_returned++; ipids[seq_response_num] = (u16) ntohs(ip->ip_id); probe_returned[seq_response_num] = 1; diff --git a/osscan.cc b/osscan.cc index 40ba4e5e4..c161f12da 100644 --- a/osscan.cc +++ b/osscan.cc @@ -455,7 +455,7 @@ if (o.verbose && openport != (unsigned long) -1) /* BzzT! Value out of range */ if (o.debugging) { error("Unable to associate os scan response with sent packet (received ack: %lX; sequence base: %lX. Packet:", (unsigned long) ntohl(tcp->th_ack), (unsigned long) sequence_base); - readtcppacket((unsigned char *)ip,BSDUFIX(ip->ip_len)); + readtcppacket((unsigned char *)ip,ntohs(ip->ip_len)); } seq_response_num = si->responses; }