1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-15 20:29:03 +00:00

Fixed more typos.

This commit is contained in:
henri
2012-01-09 13:47:58 +00:00
parent fe566432c7
commit d0a17f430f
6 changed files with 13 additions and 13 deletions

View File

@@ -281,7 +281,7 @@ static int iod_add_event(msiod *iod, msevent *nse) {
/* A handler function is defined for each of the main event types (read, write,
* connect, timer, etc) -- the handler is called when new information is
* available for the event. The handler makes any neccessary updates to the
* available for the event. The handler makes any necessary updates to the
* event based on any new information available. If the event becomes ready for
* delivery, the handler sets nse->event_done and fills out the relevant event
* fields (status, errnum) as applicable. The handlers also take care of event
@@ -638,7 +638,7 @@ static int do_actual_read(mspool *ms, msevent *nse) {
return FILESPACE_LENGTH(&nse->iobuf) - startlen;
/* No good reason to read again if we we were successful in the read but
* didn't fill up the buffer. Espcecially for UDP, where we want to
* didn't fill up the buffer. Especially for UDP, where we want to
* return only one datagram at a time. The consistency of the above
* assignment of iod->peer depends on not consolidating more than one
* UDP read buffer. */
@@ -1071,7 +1071,7 @@ void process_iod_events(mspool *nsp, msiod *nsi, int ev) {
NULL
};
/* We keep the events seperate because we want to handle them in the
/* We keep the events separate because we want to handle them in the
* order: connect => read => write => timer for several reasons:
*
* 1) Makes sure we have gone through all the net i/o events before
@@ -1102,7 +1102,7 @@ void process_iod_events(mspool *nsp, msiod *nsi, int ev) {
next = GH_LIST_ELEM_NEXT(current);
if (nse->event_done) {
/* event is done, remove it from the event list and udpate IOD pointers
/* event is done, remove it from the event list and update IOD pointers
* to the first events of each kind */
update_first_events(nse);
gh_list_remove_elem(evlists[i], current);
@@ -1136,7 +1136,7 @@ void nsp_add_event(mspool *nsp, msevent *nse) {
if (nsp->tracelevel > 5)
nsock_trace(nsp, "NSE #%lu: Adding event", nse->id);
/* First lets do the event-type independant stuff, starting with timeouts */
/* First lets do the event-type independent stuff, starting with timeouts */
if (nse->event_done) {
nsp->next_ev = nsock_tod;
} else {

View File

@@ -242,7 +242,7 @@ int nsock_event_cancel(nsock_pool ms_pool, nsock_event_id id, int notify ) {
return msevent_cancel(nsp, nse, event_list, current, notify);
}
/* An inernal function for cancelling an event when you already have a pointer
/* An internal function for cancelling an event when you already have a pointer
* to the msevent (use nsock_event_cancel if you just have an ID). The
* event_list passed in should correspond to the type of the event. For example,
* with NSE_TYPE_READ, you would pass in &nsp->read_events;. elem is the list

View File

@@ -176,7 +176,7 @@ void nsi_delete(nsock_iod nsockiod, int pending_response) {
if (nsi->events_pending > 0) {
/* shit -- they killed the msiod while an event was still pending on it.
* Maybe I should store the pending events in the msiod. On the other hand,
* this should be a pretty rare occurance and so I'll save space and hassle
* this should be a pretty rare occurrence and so I'll save space and hassle
* by just locating the events here by searching through the active events
* list */
if (pending_response == NSOCK_PENDING_ERROR)
@@ -392,7 +392,7 @@ int nsi_set_ipoptions(nsock_iod nsi, void *opts, size_t optslen) {
}
/* I didn't want to do this. Its an ugly hack, but I suspect it will be
* neccessary. I certainly can't reproduce in nsock EVERYTHING you might want
* necessary. I certainly can't reproduce in nsock EVERYTHING you might want
* to do with a socket. So I'm offering you this function to obtain the socket
* descriptor which is (usually) wrapped in a nsock_iod). You can do
* "reasonable" things with it, like setting socket receive buffers. But don't

View File

@@ -86,7 +86,7 @@ static char * nsock_pcap_set_filter(pcap_t *pt, const char *device, const char *
* as for pcap_open_live in pcap(3).
* device : pcap-style device name
* snaplen : size of packet to be copied to hanler
* promisc : whether to open device in promiscous mode
* promisc : whether to open device in promiscuous mode
* bpf_fmt : berkeley filter
* return value: NULL if everything was okay, or error string if error occurred. */
char* nsock_pcap_open(nsock_pool nsp, nsock_iod nsiod, const char *pcap_device, int snaplen,
@@ -154,7 +154,7 @@ char* nsock_pcap_open(nsock_pool nsp, nsock_iod nsiod, const char *pcap_device,
"*WINDOWS: Nmap only supports ethernet interfaces on Windows for most operations because Microsoft disabled raw sockets as of Windows XP SP2. Depending on the reason for this error, it is possible that the --unprivileged command-line argument will help.\n"
"SOLARIS: If you are trying to scan localhost and getting '/dev/lo0: No such file or directory', complain to Sun. I don't think Solaris can support advanced localhost scans. You can probably use \"-PN -sT localhost\" though.\n\n",
pcap_device, snaplen, promisc, to_ms, err0r);
return "nsock-pcap: can't open pcap! are you root?";
return "nsock-pcap: can't open pcap! Are you root?";
}
fprintf(stderr,
@@ -332,7 +332,7 @@ int nsock_pcap_get_l3_offset(pcap_t *pt, int *dl) {
return (offset);
}
/* Requests exacly one packet to be captured. */
/* Requests exactly one packet to be captured. */
nsock_event_id nsock_pcap_read_packet(nsock_pool nsp, nsock_iod nsiod,
nsock_ev_handler handler, int timeout_msecs, void *userdata) {
msiod *nsi = (msiod *)nsiod;

View File

@@ -72,7 +72,7 @@
* do select() on descriptor -> this one is of course the best, but
* there are systems that don't support this like WIN32
* This works perfectly for Linux.
* do select() but whith some hacks -> this one is hack for older bsd
* do select() but with some hacks -> this one is hack for older bsd
* systems, Descriptor *must* be set in nonblocking mode.
* never do select() -> this one is for WIN32 and other systems that
* return descriptor -1 from pcap_get_selectable_fd()

View File

@@ -58,7 +58,7 @@
#include "nsock_internal.h"
/* Read up to nlines lines (terminated with \n, which of course inclues \r\n),
/* Read up to nlines lines (terminated with \n, which of course includes \r\n),
* or until EOF, or until the timeout, whichever comes first. Note that
* NSE_STATUS_SUCCESS will be returned in the case of EOF or tiemout if at least
* 1 char has been read. Also note that you may get more than 'nlines' back --