mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-14 10:09:48 +00:00
correct spelling
Submitted by: "Bjoern A. Zeeb" <bzeeb+freebsd@zabbadoz.net> Reviewed by: itojun
This commit is contained in:
parent
7495684aca
commit
22acb4fa32
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=124456
@ -1,5 +1,5 @@
|
||||
/* $FreeBSD$ */
|
||||
/* $KAME: ipsec.c,v 1.204 2003/09/19 10:53:38 jinmei Exp $ */
|
||||
/* $KAME: ipsec.c,v 1.207 2004/01/13 03:30:42 itojun Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
||||
@ -469,7 +469,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
|
||||
if (currsp == NULL)
|
||||
panic("ipsec4_getpolicybysock: currsp is NULL.");
|
||||
|
||||
/* when privilieged socket */
|
||||
/* when privileged socket */
|
||||
if (pcbsp->priv) {
|
||||
switch (currsp->policy) {
|
||||
case IPSEC_POLICY_BYPASS:
|
||||
@ -512,7 +512,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
|
||||
/* NOTREACHED */
|
||||
}
|
||||
|
||||
/* when non-privilieged socket */
|
||||
/* when non-privileged socket */
|
||||
/* look for a policy in SPD */
|
||||
if (ipsec_setspidx_mbuf(&spidx, AF_INET, m, 1) == 0 &&
|
||||
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
|
||||
@ -529,7 +529,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
|
||||
switch (currsp->policy) {
|
||||
case IPSEC_POLICY_BYPASS:
|
||||
ipseclog((LOG_ERR, "ipsec4_getpolicybysock: "
|
||||
"Illegal policy for non-priviliged defined %d\n",
|
||||
"Illegal policy for non-privileged defined %d\n",
|
||||
currsp->policy));
|
||||
*error = EINVAL;
|
||||
return NULL;
|
||||
@ -678,7 +678,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
|
||||
if (currsp == NULL)
|
||||
panic("ipsec6_getpolicybysock: currsp is NULL.");
|
||||
|
||||
/* when privilieged socket */
|
||||
/* when privileged socket */
|
||||
if (pcbsp->priv) {
|
||||
switch (currsp->policy) {
|
||||
case IPSEC_POLICY_BYPASS:
|
||||
@ -721,7 +721,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
|
||||
/* NOTREACHED */
|
||||
}
|
||||
|
||||
/* when non-privilieged socket */
|
||||
/* when non-privileged socket */
|
||||
/* look for a policy in SPD */
|
||||
if (ipsec_setspidx_mbuf(&spidx, AF_INET6, m, 1) == 0 &&
|
||||
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
|
||||
@ -738,7 +738,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
|
||||
switch (currsp->policy) {
|
||||
case IPSEC_POLICY_BYPASS:
|
||||
ipseclog((LOG_ERR, "ipsec6_getpolicybysock: "
|
||||
"Illegal policy for non-priviliged defined %d\n",
|
||||
"Illegal policy for non-privileged defined %d\n",
|
||||
currsp->policy));
|
||||
*error = EINVAL;
|
||||
return NULL;
|
||||
|
Loading…
Reference in New Issue
Block a user