mirror of
https://github.com/nmap/nmap.git
synced 2025-12-22 07:29:01 +00:00
52de87b9749469767e651466ac988f636d26598c
Previously it was hardcoded to be sockaddr_in, which is obviously wrong for IPv6. This was only used to filter out packets from other than the host we are scanning. It may have still been succeeding by accident if part of the IPv6 address had the bytes 00000000, because for me the port number is at the same offset in sockaddr_in and sockaddr_in6, and target->v4host().s_addr returns 00000000 for an IPv6 host.
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.8%
Lua
28.1%
C++
16.7%
Shell
5.8%
Python
4.2%
Other
7.2%