diff options
author | rwatson <rwatson@FreeBSD.org> | 2007-04-10 16:09:00 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2007-04-10 16:09:00 +0000 |
commit | 922d6e13fa2f0f3f7fdb5aa9e7c14de9aa802970 (patch) | |
tree | 95b46cbff4a6da64079acf9ced99440215accd86 /sys/netipsec | |
parent | 2a4022384113c27d927221bb9d4dddb654a88036 (diff) | |
download | FreeBSD-src-922d6e13fa2f0f3f7fdb5aa9e7c14de9aa802970.zip FreeBSD-src-922d6e13fa2f0f3f7fdb5aa9e7c14de9aa802970.tar.gz |
Update comment regarding how we check privilege on FreeBSD: we now use
priv_check().
Diffstat (limited to 'sys/netipsec')
-rw-r--r-- | sys/netipsec/ipsec_osdep.h | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/sys/netipsec/ipsec_osdep.h b/sys/netipsec/ipsec_osdep.h index e1a3926..c1e11b49 100644 --- a/sys/netipsec/ipsec_osdep.h +++ b/sys/netipsec/ipsec_osdep.h @@ -211,7 +211,8 @@ if_handoff(struct ifqueue *ifq, struct mbuf *m, struct ifnet *ifp, int adjust) /* * 8. Test for "privileged" socket opened by superuser. - * FreeBSD tests ((so)->so_cred != NULL && suser_cred((so)->so_cred, SUSER_ALLOWJAIL == 0)) + * FreeBSD tests ((so)->so_cred != NULL && priv_check_cred((so)->so_cred, + * PRIV_NETINET_IPSEC, SUSER_ALLOWJAIL) == 0). * NetBSD (1.6N) tests (so)->so_uid == 0). * This difference is wrapped inside the IPSEC_PRIVILEGED_SO() macro. * |