summaryrefslogtreecommitdiffstats
path: root/sys/netipsec
diff options
context:
space:
mode:
authorpfg <pfg@FreeBSD.org>2016-05-03 18:05:43 +0000
committerpfg <pfg@FreeBSD.org>2016-05-03 18:05:43 +0000
commitd9c9113377a2f19d01848ae8dcc470e9306ce932 (patch)
tree3bd5a1b080e3f0e8e4c5ca5a06e77b298320c545 /sys/netipsec
parent28c014925a3f81792d7e34d604dec6030f5c5121 (diff)
downloadFreeBSD-src-d9c9113377a2f19d01848ae8dcc470e9306ce932.zip
FreeBSD-src-d9c9113377a2f19d01848ae8dcc470e9306ce932.tar.gz
sys/net*: minor spelling fixes.
No functional change.
Diffstat (limited to 'sys/netipsec')
-rw-r--r--sys/netipsec/ipsec.c6
-rw-r--r--sys/netipsec/ipsec_output.c2
-rw-r--r--sys/netipsec/key.c12
3 files changed, 10 insertions, 10 deletions
diff --git a/sys/netipsec/ipsec.c b/sys/netipsec/ipsec.c
index e03fc02..fbe4b1a 100644
--- a/sys/netipsec/ipsec.c
+++ b/sys/netipsec/ipsec.c
@@ -290,7 +290,7 @@ key_allocsp_default(const char* where, int tag)
* 0 : bypass
* EACCES : discard packet.
* ENOENT : ipsec_acquire() in progress, maybe.
- * others : error occured.
+ * others : error occurred.
* others: a pointer to SP
*
* NOTE: IPv6 mapped adddress concern is implemented here.
@@ -318,7 +318,7 @@ ipsec_getpolicy(struct tdb_ident *tdbi, u_int dir)
* 0 : bypass
* EACCES : discard packet.
* ENOENT : ipsec_acquire() in progress, maybe.
- * others : error occured.
+ * others : error occurred.
* others: a pointer to SP
*
* NOTE: IPv6 mapped adddress concern is implemented here.
@@ -425,7 +425,7 @@ ipsec_getpolicybysock(const struct mbuf *m, u_int dir, struct inpcb *inp,
* 0 : bypass
* EACCES : discard packet.
* ENOENT : ipsec_acquire() in progress, maybe.
- * others : error occured.
+ * others : error occurred.
*/
struct secpolicy *
ipsec_getpolicybyaddr(const struct mbuf *m, u_int dir, int *error)
diff --git a/sys/netipsec/ipsec_output.c b/sys/netipsec/ipsec_output.c
index e0523d4..24d8f4e 100644
--- a/sys/netipsec/ipsec_output.c
+++ b/sys/netipsec/ipsec_output.c
@@ -589,7 +589,7 @@ ipsec4_process_packet(struct mbuf *m, struct ipsecrequest *isr)
* packet will be returned for transmission after crypto
* processing, etc. are completed.
*
- * NB: m & sav are ``passed to caller'' who's reponsible for
+ * NB: m & sav are ``passed to caller'' who's responsible for
* for reclaiming their resources.
*/
switch(dst->sa.sa_family) {
diff --git a/sys/netipsec/key.c b/sys/netipsec/key.c
index 7d58d84..db7defd 100644
--- a/sys/netipsec/key.c
+++ b/sys/netipsec/key.c
@@ -933,7 +933,7 @@ key_do_allocsa_policy(struct secashead *sah, u_int state)
{
struct secasvar *sav, *nextsav, *candidate, *d;
- /* initilize */
+ /* initialize */
candidate = NULL;
SAHTREE_LOCK();
@@ -1058,7 +1058,7 @@ key_do_allocsa_policy(struct secashead *sah, u_int state)
* allocating a usable SA entry for a *INBOUND* packet.
* Must call key_freesav() later.
* OUT: positive: pointer to a usable sav (i.e. MATURE or DYING state).
- * NULL: not found, or error occured.
+ * NULL: not found, or error occurred.
*
* In the comparison, no source address is used--for RFC2401 conformance.
* To quote, from section 4.1:
@@ -2335,7 +2335,7 @@ key_spdget(struct socket *so, struct mbuf *m, const struct sadb_msghdr *mhp)
* send
* <base, policy(*)>
* to KMD, and expect to receive
- * <base> with SADB_X_SPDACQUIRE if error occured,
+ * <base> with SADB_X_SPDACQUIRE if error occurred,
* or
* <base, policy>
* with SADB_X_SPDUPDATE from KMD by PF_KEY.
@@ -6153,7 +6153,7 @@ key_getprop(const struct secasindex *saidx)
* <base, SA, address(SD), (address(P)), x_policy,
* (identity(SD),) (sensitivity,) proposal>
* to KMD, and expect to receive
- * <base> with SADB_ACQUIRE if error occured,
+ * <base> with SADB_ACQUIRE if error occurred,
* or
* <base, src address, dst address, (SPI range)> with SADB_GETSPI
* from KMD by PF_KEY.
@@ -6517,9 +6517,9 @@ key_acquire2(struct socket *so, struct mbuf *m, const struct sadb_msghdr *mhp)
/*
* Error message from KMd.
- * We assume that if error was occured in IKEd, the length of PFKEY
+ * We assume that if error was occurred in IKEd, the length of PFKEY
* message is equal to the size of sadb_msg structure.
- * We do not raise error even if error occured in this function.
+ * We do not raise error even if error occurred in this function.
*/
if (mhp->msg->sadb_msg_len == PFKEY_UNIT64(sizeof(struct sadb_msg))) {
struct secacq *acq;
OpenPOWER on IntegriCloud