1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-15 20:29:03 +00:00

Re-indent some scripts. Whitespace-only commit

https://secwiki.org/w/Nmap/Code_Standards
This commit is contained in:
dmiller
2014-01-31 13:02:29 +00:00
parent 64fb5b3482
commit d36c08dcf5
137 changed files with 3977 additions and 3977 deletions

View File

@@ -33,67 +33,67 @@ author = "Patrik Karlsson, David Fifield, Fyodor"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
local COMMAND = {
SubCommand = 0xFA,
Will = 0xFB,
Do = 0xFD,
Dont = 0xFE,
Wont = 0xFC,
SubCommand = 0xFA,
Will = 0xFB,
Do = 0xFD,
Dont = 0xFE,
Wont = 0xFC,
}
local function processOptions(data)
local pos = 1
local result = {}
while ( pos < #data ) do
local iac, cmd, option
pos, iac, cmd = bin.unpack("CC", data, pos)
if ( 0xFF ~= iac ) then
break
end
if ( COMMAND.SubCommand == cmd ) then
repeat
pos, iac = bin.unpack("C", data, pos)
until( pos == #data or 0xFF == iac )
pos, cmd = bin.unpack("C", data, pos)
if ( not(cmd) == 0xF0 ) then
return false, "Failed to parse options"
end
else
pos, option = bin.unpack("H", data, pos)
result[option] = result[option] or {}
table.insert(result[option], cmd)
end
end
return true, { done=( not(#data == pos - 1) ), cmds = result }
local pos = 1
local result = {}
while ( pos < #data ) do
local iac, cmd, option
pos, iac, cmd = bin.unpack("CC", data, pos)
if ( 0xFF ~= iac ) then
break
end
if ( COMMAND.SubCommand == cmd ) then
repeat
pos, iac = bin.unpack("C", data, pos)
until( pos == #data or 0xFF == iac )
pos, cmd = bin.unpack("C", data, pos)
if ( not(cmd) == 0xF0 ) then
return false, "Failed to parse options"
end
else
pos, option = bin.unpack("H", data, pos)
result[option] = result[option] or {}
table.insert(result[option], cmd)
end
end
return true, { done=( not(#data == pos - 1) ), cmds = result }
end
action = function(host, port)
local socket = nmap.new_socket()
local status = socket:connect(host, port)
local data = bin.pack("H", "FFFD26FFFB26")
local result
local socket = nmap.new_socket()
local status = socket:connect(host, port)
local data = bin.pack("H", "FFFD26FFFB26")
local result
socket:set_timeout(7500)
status, result = socket:send(data)
if ( not(status) ) then
return ("\n ERROR: Failed to send packet: %s"):format(result)
end
socket:set_timeout(7500)
status, result = socket:send(data)
if ( not(status) ) then
return ("\n ERROR: Failed to send packet: %s"):format(result)
end
repeat
status, data = socket:receive()
if ( not(status) ) then
return ("\n ERROR: Receiving packet: %s"):format(data)
end
status, result = processOptions(data)
if ( not(status) ) then
return "\n ERROR: Failed to process telnet options"
end
until( result.done or result.cmds['26'] )
repeat
status, data = socket:receive()
if ( not(status) ) then
return ("\n ERROR: Receiving packet: %s"):format(data)
end
status, result = processOptions(data)
if ( not(status) ) then
return "\n ERROR: Failed to process telnet options"
end
until( result.done or result.cmds['26'] )
for _, cmd in ipairs(result.cmds['26'] or {}) do
if ( COMMAND.Will == cmd or COMMAND.Do == cmd ) then
return "\n Telnet server supports encryption"
end
end
return "\n Telnet server does not support encryption"
for _, cmd in ipairs(result.cmds['26'] or {}) do
if ( COMMAND.Will == cmd or COMMAND.Do == cmd ) then
return "\n Telnet server supports encryption"
end
end
return "\n Telnet server does not support encryption"
end