correct function name in comment.

Submitted by:	"Bjoern A. Zeeb" <bzeeb+freebsd@zabbadoz.net>
This commit is contained in:
Hajimu UMEMOTO 2004-02-16 18:07:53 +00:00
parent 9b81514d7d
commit ce9f8a4f5a

View File

@ -423,13 +423,13 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
/* sanity check */ /* sanity check */
if (m == NULL || inp == NULL || error == NULL) if (m == NULL || inp == NULL || error == NULL)
panic("ipsec4_getpolicybysock: NULL pointer was passed."); panic("ipsec4_getpolicybypcb: NULL pointer was passed.");
pcbsp = inp->inp_sp; pcbsp = inp->inp_sp;
#ifdef DIAGNOSTIC #ifdef DIAGNOSTIC
if (pcbsp == NULL) if (pcbsp == NULL)
panic("ipsec4_getpolicybysock: pcbsp is NULL."); panic("ipsec4_getpolicybypcb: pcbsp is NULL.");
#endif #endif
tag = 0; tag = 0;
@ -451,12 +451,12 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
currsp = pcbsp->sp_out; currsp = pcbsp->sp_out;
break; break;
default: default:
panic("ipsec4_getpolicybysock: illegal direction."); panic("ipsec4_getpolicybypcb: illegal direction.");
} }
/* sanity check */ /* sanity check */
if (currsp == NULL) if (currsp == NULL)
panic("ipsec4_getpolicybysock: currsp is NULL."); panic("ipsec4_getpolicybypcb: currsp is NULL.");
/* when privileged socket */ /* when privileged socket */
if (pcbsp->priv) { if (pcbsp->priv) {
@ -473,7 +473,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) { (kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */ /* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP, KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
printf("DP ipsec4_getpolicybysock called " printf("DP ipsec4_getpolicybypcb called "
"to allocate SP:%p\n", kernsp)); "to allocate SP:%p\n", kernsp));
*error = 0; *error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir); ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@ -493,7 +493,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
return currsp; return currsp;
default: default:
ipseclog((LOG_ERR, "ipsec4_getpolicybysock: " ipseclog((LOG_ERR, "ipsec4_getpolicybypcb: "
"Invalid policy for PCB %d\n", currsp->policy)); "Invalid policy for PCB %d\n", currsp->policy));
*error = EINVAL; *error = EINVAL;
return NULL; return NULL;
@ -507,7 +507,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) { (kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */ /* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP, KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
printf("DP ipsec4_getpolicybysock called " printf("DP ipsec4_getpolicybypcb called "
"to allocate SP:%p\n", kernsp)); "to allocate SP:%p\n", kernsp));
*error = 0; *error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir); ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@ -517,7 +517,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
/* no SP found */ /* no SP found */
switch (currsp->policy) { switch (currsp->policy) {
case IPSEC_POLICY_BYPASS: case IPSEC_POLICY_BYPASS:
ipseclog((LOG_ERR, "ipsec4_getpolicybysock: " ipseclog((LOG_ERR, "ipsec4_getpolicybypcb: "
"Illegal policy for non-privileged defined %d\n", "Illegal policy for non-privileged defined %d\n",
currsp->policy)); currsp->policy));
*error = EINVAL; *error = EINVAL;
@ -536,7 +536,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
return currsp; return currsp;
default: default:
ipseclog((LOG_ERR, "ipsec4_getpolicybysock: " ipseclog((LOG_ERR, "ipsec4_getpolicybypcb: "
"Invalid policy for PCB %d\n", currsp->policy)); "Invalid policy for PCB %d\n", currsp->policy));
*error = EINVAL; *error = EINVAL;
return NULL; return NULL;
@ -627,18 +627,18 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
/* sanity check */ /* sanity check */
if (m == NULL || inp == NULL || error == NULL) if (m == NULL || inp == NULL || error == NULL)
panic("ipsec6_getpolicybysock: NULL pointer was passed."); panic("ipsec6_getpolicybypcb: NULL pointer was passed.");
#ifdef DIAGNOSTIC #ifdef DIAGNOSTIC
if ((inp->inp_vflag & INP_IPV6PROTO) == 0) if ((inp->inp_vflag & INP_IPV6PROTO) == 0)
panic("ipsec6_getpolicybysock: socket domain != inet6"); panic("ipsec6_getpolicybypcb: socket domain != inet6");
#endif #endif
pcbsp = inp->in6p_sp; pcbsp = inp->in6p_sp;
#ifdef DIAGNOSTIC #ifdef DIAGNOSTIC
if (pcbsp == NULL) if (pcbsp == NULL)
panic("ipsec6_getpolicybysock: pcbsp is NULL."); panic("ipsec6_getpolicybypcb: pcbsp is NULL.");
#endif #endif
tag = 0; tag = 0;
@ -660,12 +660,12 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
currsp = pcbsp->sp_out; currsp = pcbsp->sp_out;
break; break;
default: default:
panic("ipsec6_getpolicybysock: illegal direction."); panic("ipsec6_getpolicybypcb: illegal direction.");
} }
/* sanity check */ /* sanity check */
if (currsp == NULL) if (currsp == NULL)
panic("ipsec6_getpolicybysock: currsp is NULL."); panic("ipsec6_getpolicybypcb: currsp is NULL.");
/* when privileged socket */ /* when privileged socket */
if (pcbsp->priv) { if (pcbsp->priv) {
@ -682,7 +682,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) { (kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */ /* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP, KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
printf("DP ipsec6_getpolicybysock called " printf("DP ipsec6_getpolicybypcb called "
"to allocate SP:%p\n", kernsp)); "to allocate SP:%p\n", kernsp));
*error = 0; *error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir); ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@ -702,7 +702,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
return currsp; return currsp;
default: default:
ipseclog((LOG_ERR, "ipsec6_getpolicybysock: " ipseclog((LOG_ERR, "ipsec6_getpolicybypcb: "
"Invalid policy for PCB %d\n", currsp->policy)); "Invalid policy for PCB %d\n", currsp->policy));
*error = EINVAL; *error = EINVAL;
return NULL; return NULL;
@ -716,7 +716,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) { (kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */ /* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP, KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
printf("DP ipsec6_getpolicybysock called " printf("DP ipsec6_getpolicybypcb called "
"to allocate SP:%p\n", kernsp)); "to allocate SP:%p\n", kernsp));
*error = 0; *error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir); ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@ -726,7 +726,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
/* no SP found */ /* no SP found */
switch (currsp->policy) { switch (currsp->policy) {
case IPSEC_POLICY_BYPASS: case IPSEC_POLICY_BYPASS:
ipseclog((LOG_ERR, "ipsec6_getpolicybysock: " ipseclog((LOG_ERR, "ipsec6_getpolicybypcb: "
"Illegal policy for non-privileged defined %d\n", "Illegal policy for non-privileged defined %d\n",
currsp->policy)); currsp->policy));
*error = EINVAL; *error = EINVAL;