summaryrefslogtreecommitdiffstats
path: root/sys/netinet6/ipsec.c
diff options
context:
space:
mode:
authorume <ume@FreeBSD.org>2004-02-16 18:07:53 +0000
committerume <ume@FreeBSD.org>2004-02-16 18:07:53 +0000
commit1cfd0c3b385f7123976d8b9df470b0f665e4e0fa (patch)
tree9c5af15d06df26f34e72a0bd142d230f59f4d08e /sys/netinet6/ipsec.c
parent23f27f388b35279bd6bbc5a52527033dbe8977df (diff)
downloadFreeBSD-src-1cfd0c3b385f7123976d8b9df470b0f665e4e0fa.zip
FreeBSD-src-1cfd0c3b385f7123976d8b9df470b0f665e4e0fa.tar.gz
correct function name in comment.
Submitted by: "Bjoern A. Zeeb" <bzeeb+freebsd@zabbadoz.net>
Diffstat (limited to 'sys/netinet6/ipsec.c')
-rw-r--r--sys/netinet6/ipsec.c36
1 files changed, 18 insertions, 18 deletions
diff --git a/sys/netinet6/ipsec.c b/sys/netinet6/ipsec.c
index acc41b8..f57a7db 100644
--- a/sys/netinet6/ipsec.c
+++ b/sys/netinet6/ipsec.c
@@ -423,13 +423,13 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
/* sanity check */
if (m == NULL || inp == NULL || error == NULL)
- panic("ipsec4_getpolicybysock: NULL pointer was passed.");
+ panic("ipsec4_getpolicybypcb: NULL pointer was passed.");
pcbsp = inp->inp_sp;
#ifdef DIAGNOSTIC
if (pcbsp == NULL)
- panic("ipsec4_getpolicybysock: pcbsp is NULL.");
+ panic("ipsec4_getpolicybypcb: pcbsp is NULL.");
#endif
tag = 0;
@@ -451,12 +451,12 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
currsp = pcbsp->sp_out;
break;
default:
- panic("ipsec4_getpolicybysock: illegal direction.");
+ panic("ipsec4_getpolicybypcb: illegal direction.");
}
/* sanity check */
if (currsp == NULL)
- panic("ipsec4_getpolicybysock: currsp is NULL.");
+ panic("ipsec4_getpolicybypcb: currsp is NULL.");
/* when privileged socket */
if (pcbsp->priv) {
@@ -473,7 +473,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
- printf("DP ipsec4_getpolicybysock called "
+ printf("DP ipsec4_getpolicybypcb called "
"to allocate SP:%p\n", kernsp));
*error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@@ -493,7 +493,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
return currsp;
default:
- ipseclog((LOG_ERR, "ipsec4_getpolicybysock: "
+ ipseclog((LOG_ERR, "ipsec4_getpolicybypcb: "
"Invalid policy for PCB %d\n", currsp->policy));
*error = EINVAL;
return NULL;
@@ -507,7 +507,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
- printf("DP ipsec4_getpolicybysock called "
+ printf("DP ipsec4_getpolicybypcb called "
"to allocate SP:%p\n", kernsp));
*error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@@ -517,7 +517,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
/* no SP found */
switch (currsp->policy) {
case IPSEC_POLICY_BYPASS:
- ipseclog((LOG_ERR, "ipsec4_getpolicybysock: "
+ ipseclog((LOG_ERR, "ipsec4_getpolicybypcb: "
"Illegal policy for non-privileged defined %d\n",
currsp->policy));
*error = EINVAL;
@@ -536,7 +536,7 @@ ipsec4_getpolicybypcb(m, dir, inp, error)
return currsp;
default:
- ipseclog((LOG_ERR, "ipsec4_getpolicybysock: "
+ ipseclog((LOG_ERR, "ipsec4_getpolicybypcb: "
"Invalid policy for PCB %d\n", currsp->policy));
*error = EINVAL;
return NULL;
@@ -627,18 +627,18 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
/* sanity check */
if (m == NULL || inp == NULL || error == NULL)
- panic("ipsec6_getpolicybysock: NULL pointer was passed.");
+ panic("ipsec6_getpolicybypcb: NULL pointer was passed.");
#ifdef DIAGNOSTIC
if ((inp->inp_vflag & INP_IPV6PROTO) == 0)
- panic("ipsec6_getpolicybysock: socket domain != inet6");
+ panic("ipsec6_getpolicybypcb: socket domain != inet6");
#endif
pcbsp = inp->in6p_sp;
#ifdef DIAGNOSTIC
if (pcbsp == NULL)
- panic("ipsec6_getpolicybysock: pcbsp is NULL.");
+ panic("ipsec6_getpolicybypcb: pcbsp is NULL.");
#endif
tag = 0;
@@ -660,12 +660,12 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
currsp = pcbsp->sp_out;
break;
default:
- panic("ipsec6_getpolicybysock: illegal direction.");
+ panic("ipsec6_getpolicybypcb: illegal direction.");
}
/* sanity check */
if (currsp == NULL)
- panic("ipsec6_getpolicybysock: currsp is NULL.");
+ panic("ipsec6_getpolicybypcb: currsp is NULL.");
/* when privileged socket */
if (pcbsp->priv) {
@@ -682,7 +682,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
- printf("DP ipsec6_getpolicybysock called "
+ printf("DP ipsec6_getpolicybypcb called "
"to allocate SP:%p\n", kernsp));
*error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@@ -702,7 +702,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
return currsp;
default:
- ipseclog((LOG_ERR, "ipsec6_getpolicybysock: "
+ ipseclog((LOG_ERR, "ipsec6_getpolicybypcb: "
"Invalid policy for PCB %d\n", currsp->policy));
*error = EINVAL;
return NULL;
@@ -716,7 +716,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
(kernsp = key_allocsp(tag, &spidx, dir)) != NULL) {
/* SP found */
KEYDEBUG(KEYDEBUG_IPSEC_STAMP,
- printf("DP ipsec6_getpolicybysock called "
+ printf("DP ipsec6_getpolicybypcb called "
"to allocate SP:%p\n", kernsp));
*error = 0;
ipsec_fillpcbcache(pcbsp, m, kernsp, dir);
@@ -726,7 +726,7 @@ ipsec6_getpolicybypcb(m, dir, inp, error)
/* no SP found */
switch (currsp->policy) {
case IPSEC_POLICY_BYPASS:
- ipseclog((LOG_ERR, "ipsec6_getpolicybysock: "
+ ipseclog((LOG_ERR, "ipsec6_getpolicybypcb: "
"Illegal policy for non-privileged defined %d\n",
currsp->policy));
*error = EINVAL;
OpenPOWER on IntegriCloud