diff options
author | pfg <pfg@FreeBSD.org> | 2016-05-03 18:05:43 +0000 |
---|---|---|
committer | pfg <pfg@FreeBSD.org> | 2016-05-03 18:05:43 +0000 |
commit | d9c9113377a2f19d01848ae8dcc470e9306ce932 (patch) | |
tree | 3bd5a1b080e3f0e8e4c5ca5a06e77b298320c545 /sys/netipsec | |
parent | 28c014925a3f81792d7e34d604dec6030f5c5121 (diff) | |
download | FreeBSD-src-d9c9113377a2f19d01848ae8dcc470e9306ce932.zip FreeBSD-src-d9c9113377a2f19d01848ae8dcc470e9306ce932.tar.gz |
sys/net*: minor spelling fixes.
No functional change.
Diffstat (limited to 'sys/netipsec')
-rw-r--r-- | sys/netipsec/ipsec.c | 6 | ||||
-rw-r--r-- | sys/netipsec/ipsec_output.c | 2 | ||||
-rw-r--r-- | sys/netipsec/key.c | 12 |
3 files changed, 10 insertions, 10 deletions
diff --git a/sys/netipsec/ipsec.c b/sys/netipsec/ipsec.c index e03fc02..fbe4b1a 100644 --- a/sys/netipsec/ipsec.c +++ b/sys/netipsec/ipsec.c @@ -290,7 +290,7 @@ key_allocsp_default(const char* where, int tag) * 0 : bypass * EACCES : discard packet. * ENOENT : ipsec_acquire() in progress, maybe. - * others : error occured. + * others : error occurred. * others: a pointer to SP * * NOTE: IPv6 mapped adddress concern is implemented here. @@ -318,7 +318,7 @@ ipsec_getpolicy(struct tdb_ident *tdbi, u_int dir) * 0 : bypass * EACCES : discard packet. * ENOENT : ipsec_acquire() in progress, maybe. - * others : error occured. + * others : error occurred. * others: a pointer to SP * * NOTE: IPv6 mapped adddress concern is implemented here. @@ -425,7 +425,7 @@ ipsec_getpolicybysock(const struct mbuf *m, u_int dir, struct inpcb *inp, * 0 : bypass * EACCES : discard packet. * ENOENT : ipsec_acquire() in progress, maybe. - * others : error occured. + * others : error occurred. */ struct secpolicy * ipsec_getpolicybyaddr(const struct mbuf *m, u_int dir, int *error) diff --git a/sys/netipsec/ipsec_output.c b/sys/netipsec/ipsec_output.c index e0523d4..24d8f4e 100644 --- a/sys/netipsec/ipsec_output.c +++ b/sys/netipsec/ipsec_output.c @@ -589,7 +589,7 @@ ipsec4_process_packet(struct mbuf *m, struct ipsecrequest *isr) * packet will be returned for transmission after crypto * processing, etc. are completed. * - * NB: m & sav are ``passed to caller'' who's reponsible for + * NB: m & sav are ``passed to caller'' who's responsible for * for reclaiming their resources. */ switch(dst->sa.sa_family) { diff --git a/sys/netipsec/key.c b/sys/netipsec/key.c index 7d58d84..db7defd 100644 --- a/sys/netipsec/key.c +++ b/sys/netipsec/key.c @@ -933,7 +933,7 @@ key_do_allocsa_policy(struct secashead *sah, u_int state) { struct secasvar *sav, *nextsav, *candidate, *d; - /* initilize */ + /* initialize */ candidate = NULL; SAHTREE_LOCK(); @@ -1058,7 +1058,7 @@ key_do_allocsa_policy(struct secashead *sah, u_int state) * allocating a usable SA entry for a *INBOUND* packet. * Must call key_freesav() later. * OUT: positive: pointer to a usable sav (i.e. MATURE or DYING state). - * NULL: not found, or error occured. + * NULL: not found, or error occurred. * * In the comparison, no source address is used--for RFC2401 conformance. * To quote, from section 4.1: @@ -2335,7 +2335,7 @@ key_spdget(struct socket *so, struct mbuf *m, const struct sadb_msghdr *mhp) * send * <base, policy(*)> * to KMD, and expect to receive - * <base> with SADB_X_SPDACQUIRE if error occured, + * <base> with SADB_X_SPDACQUIRE if error occurred, * or * <base, policy> * with SADB_X_SPDUPDATE from KMD by PF_KEY. @@ -6153,7 +6153,7 @@ key_getprop(const struct secasindex *saidx) * <base, SA, address(SD), (address(P)), x_policy, * (identity(SD),) (sensitivity,) proposal> * to KMD, and expect to receive - * <base> with SADB_ACQUIRE if error occured, + * <base> with SADB_ACQUIRE if error occurred, * or * <base, src address, dst address, (SPI range)> with SADB_GETSPI * from KMD by PF_KEY. @@ -6517,9 +6517,9 @@ key_acquire2(struct socket *so, struct mbuf *m, const struct sadb_msghdr *mhp) /* * Error message from KMd. - * We assume that if error was occured in IKEd, the length of PFKEY + * We assume that if error was occurred in IKEd, the length of PFKEY * message is equal to the size of sadb_msg structure. - * We do not raise error even if error occured in this function. + * We do not raise error even if error occurred in this function. */ if (mhp->msg->sadb_msg_len == PFKEY_UNIT64(sizeof(struct sadb_msg))) { struct secacq *acq; |