1
0
mirror of https://git.FreeBSD.org/src.git synced 2024-12-14 10:09:48 +00:00

correct spelling

Submitted by:	"Bjoern A. Zeeb" <bzeeb+freebsd@zabbadoz.net>
Reviewed by:	itojun
This commit is contained in:
Hajimu UMEMOTO 2004-01-13 05:39:07 +00:00
parent 7495684aca
commit 22acb4fa32
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=124456

View File

@ -1,5 +1,5 @@
/* $FreeBSD$ */
/* $KAME: ipsec.c,v 1.204 2003/09/19 10:53:38 jinmei Exp $ */
/* $KAME: ipsec.c,v 1.207 2004/01/13 03:30:42 itojun Exp $ */
/*
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
@ -469,7 +469,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
if (currsp == NULL)
panic("ipsec4_getpolicybysock: currsp is NULL.");
/* when privilieged socket */
/* when privileged socket */
if (pcbsp->priv) {
switch (currsp->policy) {
case IPSEC_POLICY_BYPASS:
@ -512,7 +512,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
/* NOTREACHED */
}
/* when non-privilieged socket */
/* when non-privileged socket */
/* look for a policy in SPD */
if (ipsec_setspidx_mbuf(&spidx, AF_INET, m, 1) == 0 &&
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
@ -529,7 +529,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
switch (currsp->policy) {
case IPSEC_POLICY_BYPASS:
ipseclog((LOG_ERR, "ipsec4_getpolicybysock: "
"Illegal policy for non-priviliged defined %d\n",
"Illegal policy for non-privileged defined %d\n",
currsp->policy));
*error = EINVAL;
return NULL;
@ -678,7 +678,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
if (currsp == NULL)
panic("ipsec6_getpolicybysock: currsp is NULL.");
/* when privilieged socket */
/* when privileged socket */
if (pcbsp->priv) {
switch (currsp->policy) {
case IPSEC_POLICY_BYPASS:
@ -721,7 +721,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
/* NOTREACHED */
}
/* when non-privilieged socket */
/* when non-privileged socket */
/* look for a policy in SPD */
if (ipsec_setspidx_mbuf(&spidx, AF_INET6, m, 1) == 0 &&
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
@ -738,7 +738,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
switch (currsp->policy) {
case IPSEC_POLICY_BYPASS:
ipseclog((LOG_ERR, "ipsec6_getpolicybysock: "
"Illegal policy for non-priviliged defined %d\n",
"Illegal policy for non-privileged defined %d\n",
currsp->policy));
*error = EINVAL;
return NULL;