1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00
Commit Graph

6 Commits

Author SHA1 Message Date
d33tah
e3d1c178e3 Add newlines at the EOF in conformance to Daniel's coding standards
proposal. This only affects Nmap's root directory. We might also need to
modify the code which autogenerates Nmap's source code files such as IPv6
fingerprinting code.
2014-06-18 10:18:58 +00:00
david
8fbc54e86d Use a HAVE_STDINT_H guard.
This include file isn't present when building with Visual C++ 2008, but
the file compiles without it.
2013-02-09 22:46:47 +00:00
david
9b28bc8ed5 Add an nseU_opttarget function. 2012-09-15 17:56:17 +00:00
batrick
000f6dc4d9 Lua 5.2 upgrade [1] for NSE.
[1] http://seclists.org/nmap-dev/2012/q2/34
2012-05-27 08:53:32 +00:00
kris
e39eeea8ba Since r20267 (NSE Nsock maintenance), failures in raw IP sends from NSE cause
scripts to bail.  (This is why Ron saw a backtrace when path-mtu elicited an
EMSGSIZE [a separate issue I'm still working on] instead of path-mtu
recognizing the failure and resending with a smaller MTU like it would do
before.)  I'm changing this back to the original design of returning false to
scripts (just like connect-mode send failures).  

I've changed safe_error() in nse_utility.cc to support varargs.
2010-11-11 01:11:13 +00:00
batrick
de4ba536de Merge from /nmap-exp/patrick/nse-nsock-maintenance.
This is a maintenance fix for the NSE Nsock library binding. The patch focuses
on code correctness and simplicity. The patch also brings some initial updates
with an eye towards the upcoming Lua 5.2 release. See [1] for a post concerning
this branch.

[1] http://seclists.org/nmap-dev/2010/q3/710
2010-09-18 20:35:09 +00:00