1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-12-08 23:33:07 +01:00

Comment fixes

This commit is contained in:
OJ 2013-11-26 06:56:34 +10:00
parent 9f4a66ba8a
commit 31fdf23f7b
3 changed files with 3 additions and 3 deletions

View File

@ -187,7 +187,7 @@ DWORD command_deregister(Command *command)
return res;
}
/*! * @brief A list of all command threads currenlty executing. */
/*! @brief A list of all command threads currenlty executing. */
LIST * commandThreadList = NULL;
/*!

View File

@ -250,7 +250,7 @@ DWORD tcp_channel_server_notify(Remote * remote, TcpServerContext * serverCtx)
* @param remote Pointer to the remote instance.
* @param packet Pointer to the request packet.
* @returns Indication of success or failure.
* @retval ERROR_SUCCESS Notification completed successfully.
* @retval ERROR_SUCCESS Opening the server channel completed successfully.
*/
DWORD request_net_tcp_server_channel_open(Remote * remote, Packet * packet)
{

View File

@ -46,7 +46,7 @@ const unsigned int hAppInstance = 0x504b5320; // 'PKS '
#define PREPEND_INFO "### Info : "
#define PREPEND_WARN "### Warn : "
/*! * @breif This thread is the main server thread. */
/*! @brief This thread is the main server thread. */
static THREAD * serverThread = NULL;
/*! @brief An array of locks for use by OpenSSL. */