correct spelling
Submitted by: "Bjoern A. Zeeb" <bzeeb+freebsd@zabbadoz.net> Reviewed by: itojun
This commit is contained in:
parent
fca4bcad4d
commit
1012c19191
@ -1,5 +1,5 @@
|
|||||||
/* $FreeBSD$ */
|
/* $FreeBSD$ */
|
||||||
/* $KAME: ipsec.c,v 1.204 2003/09/19 10:53:38 jinmei Exp $ */
|
/* $KAME: ipsec.c,v 1.207 2004/01/13 03:30:42 itojun Exp $ */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
||||||
@ -469,7 +469,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
|
|||||||
if (currsp == NULL)
|
if (currsp == NULL)
|
||||||
panic("ipsec4_getpolicybysock: currsp is NULL.");
|
panic("ipsec4_getpolicybysock: currsp is NULL.");
|
||||||
|
|
||||||
/* when privilieged socket */
|
/* when privileged socket */
|
||||||
if (pcbsp->priv) {
|
if (pcbsp->priv) {
|
||||||
switch (currsp->policy) {
|
switch (currsp->policy) {
|
||||||
case IPSEC_POLICY_BYPASS:
|
case IPSEC_POLICY_BYPASS:
|
||||||
@ -512,7 +512,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
|
|||||||
/* NOTREACHED */
|
/* NOTREACHED */
|
||||||
}
|
}
|
||||||
|
|
||||||
/* when non-privilieged socket */
|
/* when non-privileged socket */
|
||||||
/* look for a policy in SPD */
|
/* look for a policy in SPD */
|
||||||
if (ipsec_setspidx_mbuf(&spidx, AF_INET, m, 1) == 0 &&
|
if (ipsec_setspidx_mbuf(&spidx, AF_INET, m, 1) == 0 &&
|
||||||
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
|
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
|
||||||
@ -529,7 +529,7 @@ ipsec4_getpolicybysock(m, dir, so, error)
|
|||||||
switch (currsp->policy) {
|
switch (currsp->policy) {
|
||||||
case IPSEC_POLICY_BYPASS:
|
case IPSEC_POLICY_BYPASS:
|
||||||
ipseclog((LOG_ERR, "ipsec4_getpolicybysock: "
|
ipseclog((LOG_ERR, "ipsec4_getpolicybysock: "
|
||||||
"Illegal policy for non-priviliged defined %d\n",
|
"Illegal policy for non-privileged defined %d\n",
|
||||||
currsp->policy));
|
currsp->policy));
|
||||||
*error = EINVAL;
|
*error = EINVAL;
|
||||||
return NULL;
|
return NULL;
|
||||||
@ -678,7 +678,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
|
|||||||
if (currsp == NULL)
|
if (currsp == NULL)
|
||||||
panic("ipsec6_getpolicybysock: currsp is NULL.");
|
panic("ipsec6_getpolicybysock: currsp is NULL.");
|
||||||
|
|
||||||
/* when privilieged socket */
|
/* when privileged socket */
|
||||||
if (pcbsp->priv) {
|
if (pcbsp->priv) {
|
||||||
switch (currsp->policy) {
|
switch (currsp->policy) {
|
||||||
case IPSEC_POLICY_BYPASS:
|
case IPSEC_POLICY_BYPASS:
|
||||||
@ -721,7 +721,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
|
|||||||
/* NOTREACHED */
|
/* NOTREACHED */
|
||||||
}
|
}
|
||||||
|
|
||||||
/* when non-privilieged socket */
|
/* when non-privileged socket */
|
||||||
/* look for a policy in SPD */
|
/* look for a policy in SPD */
|
||||||
if (ipsec_setspidx_mbuf(&spidx, AF_INET6, m, 1) == 0 &&
|
if (ipsec_setspidx_mbuf(&spidx, AF_INET6, m, 1) == 0 &&
|
||||||
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
|
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
|
||||||
@ -738,7 +738,7 @@ ipsec6_getpolicybysock(m, dir, so, error)
|
|||||||
switch (currsp->policy) {
|
switch (currsp->policy) {
|
||||||
case IPSEC_POLICY_BYPASS:
|
case IPSEC_POLICY_BYPASS:
|
||||||
ipseclog((LOG_ERR, "ipsec6_getpolicybysock: "
|
ipseclog((LOG_ERR, "ipsec6_getpolicybysock: "
|
||||||
"Illegal policy for non-priviliged defined %d\n",
|
"Illegal policy for non-privileged defined %d\n",
|
||||||
currsp->policy));
|
currsp->policy));
|
||||||
*error = EINVAL;
|
*error = EINVAL;
|
||||||
return NULL;
|
return NULL;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user