mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
sed -i 's/if ( /if (/g' *.cc *.h; sed -i 's/for ( /for (/g' *.cc *.h; sed -i 's/( /(/g' nmap_amigaos.h tcpip.h service_scan.cc
There's still quite a lot of code like this, nse_openssl.cc being most messy IMHO. Also, I left out "if( something )" syntax.
This commit is contained in:
@@ -219,7 +219,7 @@ int ipv6_get_fragment_id(const struct ip6_hdr *ip6, unsigned int len) {
|
||||
p += (*(p + 1) + 1) * 8;
|
||||
}
|
||||
|
||||
if ( hdr != IP_PROTO_FRAGMENT || (p + 2 + sizeof(ip6_ext_data_fragment)) > end)
|
||||
if (hdr != IP_PROTO_FRAGMENT || (p + 2 + sizeof(ip6_ext_data_fragment)) > end)
|
||||
return -1;
|
||||
|
||||
frag_header = (struct ip6_ext_data_fragment *)( p + 2 );
|
||||
@@ -1081,7 +1081,7 @@ static int idlescan_countopen2(struct idle_proxy_info *proxy,
|
||||
but doing it the straightforward way (using the same decoys as
|
||||
we use in probing the proxy box is risky. I'll have to think
|
||||
about this more. */
|
||||
if ( o.af() == AF_INET ) {
|
||||
if (o.af() == AF_INET ) {
|
||||
send_tcp_raw(proxy->rawsd, eth.ethsd ? ð : NULL,
|
||||
proxy->host.v4hostip(), target->v4hostip(),
|
||||
o.ttl, false,
|
||||
|
||||
Reference in New Issue
Block a user