mirror of
https://github.com/nmap/nmap.git
synced 2025-12-17 21:19:01 +00:00
Fix spelling neccessary -> necessary.
This commit is contained in:
@@ -260,7 +260,7 @@ static void initialize_proxy_struct(struct idle_proxy_info *proxy) {
|
||||
proxy->ethptr = NULL;
|
||||
}
|
||||
|
||||
/* takes a proxy name/IP, resolves it if neccessary, tests it for IP ID
|
||||
/* takes a proxy name/IP, resolves it if necessary, tests it for IP ID
|
||||
suitability, and fills out an idle_proxy_info structure. If the
|
||||
proxy is determined to be unsuitable, the function whines and exits
|
||||
the program */
|
||||
|
||||
2
nmap.h
2
nmap.h
@@ -431,7 +431,7 @@ void free_scan_lists(struct scan_lists *ports);
|
||||
/* socket manipulation functions */
|
||||
void init_socket(int sd);
|
||||
|
||||
/* Renamed main so that interactive mode could preprocess when neccessary */
|
||||
/* Renamed main so that interactive mode could preprocess when necessary */
|
||||
int nmap_main(int argc, char *argv[]);
|
||||
|
||||
void nmap_free_mem();
|
||||
|
||||
@@ -293,7 +293,7 @@ const void PortList::getServiceDeductions(u16 portno, int protocol, struct servi
|
||||
// will be NULL if unavailable. Note that this function makes its
|
||||
// own copy of sname and product/version/extrainfo. This function
|
||||
// also takes care of truncating the version strings to a
|
||||
// 'reasonable' length if neccessary, and cleaning up any unprintable
|
||||
// 'reasonable' length if necessary, and cleaning up any unprintable
|
||||
// chars. (these tests are to avoid annoying DOS (or other) attacks
|
||||
// by malicious services). The fingerprint should be NULL unless
|
||||
// one is available and the user should submit it. tunnel must be
|
||||
|
||||
@@ -254,7 +254,7 @@ class PortList {
|
||||
// will be NULL if unavailable. Note that this function makes its
|
||||
// own copy of sname and product/version/extrainfo. This function
|
||||
// also takes care of truncating the version strings to a
|
||||
// 'reasonable' length if neccessary, and cleaning up any unprinable
|
||||
// 'reasonable' length if necessary, and cleaning up any unprinable
|
||||
// chars. (these tests are to avoid annoying DOS (or other) attacks
|
||||
// by malicious services). The fingerprint should be NULL unless
|
||||
// one is available and the user should submit it. tunnel must be
|
||||
|
||||
@@ -127,7 +127,7 @@ struct ultra_scan_performance_vars {
|
||||
increments. */
|
||||
int initial_ssthresh;
|
||||
/* When a successful ping response comes back, it counts as this many
|
||||
"normal" responses, because the fact that pings are neccessary means
|
||||
"normal" responses, because the fact that pings are necessary means
|
||||
we aren't getting much input. */
|
||||
int ping_magnifier;
|
||||
/* Try to send a scanping if no response has been received from a target host
|
||||
@@ -498,7 +498,7 @@ public:
|
||||
unsigned int num_probes_active;
|
||||
/* Probes timed out but not yet retransmitted because of congestion
|
||||
control limits or because more retransmits may not be
|
||||
neccessary. Note that probes on probe_bench are not included
|
||||
necessary. Note that probes on probe_bench are not included
|
||||
in this value. */
|
||||
unsigned int num_probes_waiting_retransmit;
|
||||
unsigned int num_probes_outstanding() { return probes_outstanding.size(); }
|
||||
@@ -1341,7 +1341,7 @@ unsigned int HostScanStats::allowedTryno(bool *capped, bool *mayincrease) {
|
||||
/* Decide if the tryno can possibly increase. */
|
||||
if (tryno_mayincrease && num_probes_active == 0 && freshPortsLeft() == 0) {
|
||||
/* If every outstanding probe is timedout and at maxval, then no further
|
||||
retransmits are neccessary. */
|
||||
retransmits are necessary. */
|
||||
for(probeI = probes_outstanding.begin();
|
||||
probeI != probes_outstanding.end(); probeI++) {
|
||||
probe = *probeI;
|
||||
@@ -2274,7 +2274,7 @@ static void ultrascan_adjust_timing(UltraScanInfo *USI, HostScanStats *hss,
|
||||
// printf("SDELAY: increasing good to %d (bad: %d)\n", hss->sdn.goodRespSinceDelayChanged, hss->sdn.droppedRespSinceDelayChanged);
|
||||
}
|
||||
|
||||
/* Now change the send delay if neccessary */
|
||||
/* Now change the send delay if necessary */
|
||||
unsigned int oldgood = hss->sdn.goodRespSinceDelayChanged;
|
||||
unsigned int oldbad = hss->sdn.droppedRespSinceDelayChanged;
|
||||
double threshold = (o.timing_level >= 4)? 0.40 : 0.30;
|
||||
|
||||
@@ -1695,7 +1695,7 @@ ServiceGroup::~ServiceGroup() {
|
||||
|
||||
/* Called if data is read for a service or a TCP connection made. Sets the port
|
||||
state to PORT_OPEN. */
|
||||
static void adjustPortStateIfNeccessary(ServiceNFO *svc) {
|
||||
static void adjustPortStateIfNecessary(ServiceNFO *svc) {
|
||||
int oldstate;
|
||||
char host[128];
|
||||
|
||||
@@ -1744,7 +1744,7 @@ static void adjustPortStateIfNeccessary(ServiceNFO *svc) {
|
||||
|
||||
// This simple helper function is used to start the next probe. If
|
||||
// the probe exists, execution begins (and the previous one is cleaned
|
||||
// up if neccessary) . Otherwise, the service is listed as finished
|
||||
// up if necessary) . Otherwise, the service is listed as finished
|
||||
// and moved to the finished list. If you pass 'true' for alwaysrestart, a
|
||||
// new connection will be made even if the previous probe was the NULL probe.
|
||||
// You would do this, for example, if the other side has closed the connection.
|
||||
@@ -2045,7 +2045,7 @@ static void servicescan_connect_handler(nsock_pool nsp, nsock_event nse, void *m
|
||||
|
||||
/* If the port is TCP, it is now known to be open rather than openfiltered */
|
||||
if (svc->proto == IPPROTO_TCP)
|
||||
adjustPortStateIfNeccessary(svc);
|
||||
adjustPortStateIfNecessary(svc);
|
||||
|
||||
// Yeah! Connection made to the port. Send the appropriate probe
|
||||
// text (if any is needed -- might be NULL probe)
|
||||
@@ -2142,7 +2142,7 @@ static void servicescan_read_handler(nsock_pool nsp, nsock_event nse, void *myda
|
||||
} else if (status == NSE_STATUS_SUCCESS) {
|
||||
// w00p, w00p, we read something back from the port.
|
||||
readstr = (u8 *) nse_readbuf(nse, &readstrlen);
|
||||
adjustPortStateIfNeccessary(svc); /* A response means PORT_OPENFILTERED is really PORT_OPEN */
|
||||
adjustPortStateIfNecessary(svc); /* A response means PORT_OPENFILTERED is really PORT_OPEN */
|
||||
svc->appendtocurrentproberesponse(readstr, readstrlen);
|
||||
// now get the full version
|
||||
readstr = svc->getcurrentproberesponse(&readstrlen);
|
||||
|
||||
Reference in New Issue
Block a user