mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Handle ENETRESET/WSAENETRESET on WIN32
When this case was added in r29097, the #ifndef was mistaken for #ifdef. The error, which was only discovered on Windows, was therefore not handled only on Windows systems. This commit makes the check unconditional. http://seclists.org/nmap-dev/2015/q4/217
This commit is contained in:
@@ -2564,13 +2564,13 @@ static void servicescan_read_handler(nsock_pool nsp, nsock_event nse, void *myda
|
||||
*/
|
||||
#ifndef WIN32
|
||||
case EPIPE:
|
||||
#endif
|
||||
|
||||
case ENETRESET:
|
||||
//This error (same as WSAENETRESET according to nbase_winunix) is Microsoft only error, where the connected host crashes and then resets during the communication
|
||||
//More information can be found at http://www.sockets.com/err_lst1.htm#WSAENETRESET.
|
||||
//I assume that we shouldn't bother doing anything beyond catching it, and then going on to the next probe.
|
||||
|
||||
#endif
|
||||
#ifdef EPROTO
|
||||
case EPROTO:
|
||||
// EPROTO is suspected to be caused by an active IDS/IPS that forges ICMP
|
||||
|
||||
Reference in New Issue
Block a user