diff options
author | Angelos D. Keromytis <angelos@cvs.openbsd.org> | 2001-06-27 03:31:49 +0000 |
---|---|---|
committer | Angelos D. Keromytis <angelos@cvs.openbsd.org> | 2001-06-27 03:31:49 +0000 |
commit | b424c44170215a41cec4997da3abdb50ee4cfb16 (patch) | |
tree | 9504499ef7d6a712457f490e1b7cf10f45e98a4f /sbin/photurisd/kernel.c | |
parent | 907ab59423a444adb2780803c37f5b5424d4390c (diff) |
Consistently use "IPsec" capitalization (jsyn@nthought.com)
Diffstat (limited to 'sbin/photurisd/kernel.c')
-rw-r--r-- | sbin/photurisd/kernel.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/sbin/photurisd/kernel.c b/sbin/photurisd/kernel.c index 598843f17ff..b3c2784a300 100644 --- a/sbin/photurisd/kernel.c +++ b/sbin/photurisd/kernel.c @@ -1,4 +1,4 @@ -/* $OpenBSD: kernel.c,v 1.22 2001/06/05 00:17:48 niklas Exp $ */ +/* $OpenBSD: kernel.c,v 1.23 2001/06/27 03:31:46 angelos Exp $ */ /* * Copyright 1997-2000 Niels Provos <provos@citi.umich.edu> @@ -33,7 +33,7 @@ /* * The following functions handle the interaction of the Photuris daemon - * with the PF_ENCAP interface as used by OpenBSD's IPSec implementation. + * with the PF_ENCAP interface as used by OpenBSD's IPsec implementation. * This is the only file which needs to be changed for making Photuris * work with other kernel interfaces. * The SPI object here can actually hold two SPIs, one for encryption @@ -41,7 +41,7 @@ */ #ifndef lint -static char rcsid[] = "$OpenBSD: kernel.c,v 1.22 2001/06/05 00:17:48 niklas Exp $"; +static char rcsid[] = "$OpenBSD: kernel.c,v 1.23 2001/06/27 03:31:46 angelos Exp $"; #endif #include <time.h> @@ -230,7 +230,7 @@ init_kernel(void) TAILQ_INIT(&pfqueue); if ((sd = socket(PF_KEY, SOCK_RAW, PF_KEY_V2)) == -1) - log_fatal(__FUNCTION__": socket(PF_KEY) for IPSec keyengine"); + log_fatal(__FUNCTION__": socket(PF_KEY) for IPsec key engine"); if ((regsd = socket(PF_KEY, SOCK_RAW, PF_KEY_V2)) == -1) log_fatal(__FUNCTION__": socket() for PFKEY register"); @@ -262,13 +262,13 @@ kernel_set_socket_policy(int sd) level = IPSEC_LEVEL_BYPASS; /* Did I mention I'm privileged? */ if (setsockopt(sd, IPPROTO_IP, IP_AUTH_LEVEL, (char *)&level, sizeof (int)) == -1) - log_fatal("setsockopt: can not bypass ipsec authentication policy"); + log_fatal("setsockopt: can not bypass IPsec authentication policy"); if (setsockopt(sd, IPPROTO_IP, IP_ESP_TRANS_LEVEL, (char *)&level, sizeof (int)) == -1) - log_fatal("setsockopt: can not bypass ipsec esp transport policy"); + log_fatal("setsockopt: can not bypass IPsec ESP transport policy"); if (setsockopt(sd, IPPROTO_IP, IP_ESP_NETWORK_LEVEL, (char *)&level, sizeof (int)) == -1) - log_fatal("setsockopt: can not bypass ipsec esp network policy"); + log_fatal("setsockopt: can not bypass IPsec ESP network policy"); } struct sadb_ext * |