From 1012c19191db10049b26de7225117ed77f83124f Mon Sep 17 00:00:00 2001 From: ume Date: Tue, 13 Jan 2004 05:39:07 +0000 Subject: correct spelling Submitted by: "Bjoern A. Zeeb" Reviewed by: itojun --- sys/netinet6/ipsec.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) (limited to 'sys/netinet6/ipsec.c') diff --git a/sys/netinet6/ipsec.c b/sys/netinet6/ipsec.c index 917fa33..240cc29 100644 --- a/sys/netinet6/ipsec.c +++ b/sys/netinet6/ipsec.c @@ -1,5 +1,5 @@ /* $FreeBSD$ */ -/* $KAME: ipsec.c,v 1.204 2003/09/19 10:53:38 jinmei Exp $ */ +/* $KAME: ipsec.c,v 1.207 2004/01/13 03:30:42 itojun Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -469,7 +469,7 @@ ipsec4_getpolicybysock(m, dir, so, error) if (currsp == NULL) panic("ipsec4_getpolicybysock: currsp is NULL."); - /* when privilieged socket */ + /* when privileged socket */ if (pcbsp->priv) { switch (currsp->policy) { case IPSEC_POLICY_BYPASS: @@ -512,7 +512,7 @@ ipsec4_getpolicybysock(m, dir, so, error) /* NOTREACHED */ } - /* when non-privilieged socket */ + /* when non-privileged socket */ /* look for a policy in SPD */ if (ipsec_setspidx_mbuf(&spidx, AF_INET, m, 1) == 0 && (kernsp = key_allocsp(tag, &spidx, dir)) != NULL) { @@ -529,7 +529,7 @@ ipsec4_getpolicybysock(m, dir, so, error) switch (currsp->policy) { case IPSEC_POLICY_BYPASS: ipseclog((LOG_ERR, "ipsec4_getpolicybysock: " - "Illegal policy for non-priviliged defined %d\n", + "Illegal policy for non-privileged defined %d\n", currsp->policy)); *error = EINVAL; return NULL; @@ -678,7 +678,7 @@ ipsec6_getpolicybysock(m, dir, so, error) if (currsp == NULL) panic("ipsec6_getpolicybysock: currsp is NULL."); - /* when privilieged socket */ + /* when privileged socket */ if (pcbsp->priv) { switch (currsp->policy) { case IPSEC_POLICY_BYPASS: @@ -721,7 +721,7 @@ ipsec6_getpolicybysock(m, dir, so, error) /* NOTREACHED */ } - /* when non-privilieged socket */ + /* when non-privileged socket */ /* look for a policy in SPD */ if (ipsec_setspidx_mbuf(&spidx, AF_INET6, m, 1) == 0 && (kernsp = key_allocsp(tag, &spidx, dir)) != NULL) { @@ -738,7 +738,7 @@ ipsec6_getpolicybysock(m, dir, so, error) switch (currsp->policy) { case IPSEC_POLICY_BYPASS: ipseclog((LOG_ERR, "ipsec6_getpolicybysock: " - "Illegal policy for non-priviliged defined %d\n", + "Illegal policy for non-privileged defined %d\n", currsp->policy)); *error = EINVAL; return NULL; -- cgit v1.1