summaryrefslogtreecommitdiff
path: root/sbin/photurisd
diff options
context:
space:
mode:
Diffstat (limited to 'sbin/photurisd')
-rw-r--r--sbin/photurisd/README2
-rw-r--r--sbin/photurisd/README.howtouse12
-rw-r--r--sbin/photurisd/kernel.c14
-rw-r--r--sbin/photurisd/photurisd.84
4 files changed, 16 insertions, 16 deletions
diff --git a/sbin/photurisd/README b/sbin/photurisd/README
index 59f7880e55e..3d421aa4211 100644
--- a/sbin/photurisd/README
+++ b/sbin/photurisd/README
@@ -7,7 +7,7 @@ For quick installation instructions read INSTALL, or otherwise
README.howtouse for more complete information.
At the moment only the PF_ENCAP kernel interface for John Ioannidis'
-and Angelos D. Keromytis' IPSec as to be found in OpenBSD is supported.
+and Angelos D. Keromytis' IPsec as to be found in OpenBSD is supported.
It should be fairly easy to adapt the daemon to other implementations,
just look at the sections found by 'grep IPSEC *.c'
diff --git a/sbin/photurisd/README.howtouse b/sbin/photurisd/README.howtouse
index 49c0c819741..12a93fa10ba 100644
--- a/sbin/photurisd/README.howtouse
+++ b/sbin/photurisd/README.howtouse
@@ -1,13 +1,13 @@
- How to use Photuris with IPSec ?
+ How to use Photuris with IPsec ?
-What is IPSec ?
+What is IPsec ?
IP Security is a framework providing authentication/integrity and
privacy to network traffic. Authenticated data can not be modified by
third parties and encryption conceals the content of packets.
-What has Photuris to do with IPSec ?
+What has Photuris to do with IPsec ?
In order to transmit encrypted or authenticated data between two
hosts, those two hosts have to agree on session keys which are used
@@ -40,8 +40,8 @@ How to get it working ?
exchange of values now and finally the shared secret from which the
session keys are derived.
- If you compiled the photuris daemon with -IPSEC and also have a kernel
- with IPSEC compiled into it, you could start for example
+ If you compiled the photuris daemon with -DIPSEC and also have a kernel
+ with IPsec compiled into it, you could start for example
8. tcpdump proto 51 &
9. telnet host1
@@ -54,7 +54,7 @@ How to get it working ?
will show you some information also.
- Enabling IPSEC in the OpenBSD kernel
+ Enabling IPsec in the OpenBSD kernel
Add the following two lines into your kernel config file:
config IPSEC
diff --git a/sbin/photurisd/kernel.c b/sbin/photurisd/kernel.c
index 598843f17ff..b3c2784a300 100644
--- a/sbin/photurisd/kernel.c
+++ b/sbin/photurisd/kernel.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: kernel.c,v 1.22 2001/06/05 00:17:48 niklas Exp $ */
+/* $OpenBSD: kernel.c,v 1.23 2001/06/27 03:31:46 angelos Exp $ */
/*
* Copyright 1997-2000 Niels Provos <provos@citi.umich.edu>
@@ -33,7 +33,7 @@
/*
* The following functions handle the interaction of the Photuris daemon
- * with the PF_ENCAP interface as used by OpenBSD's IPSec implementation.
+ * with the PF_ENCAP interface as used by OpenBSD's IPsec implementation.
* This is the only file which needs to be changed for making Photuris
* work with other kernel interfaces.
* The SPI object here can actually hold two SPIs, one for encryption
@@ -41,7 +41,7 @@
*/
#ifndef lint
-static char rcsid[] = "$OpenBSD: kernel.c,v 1.22 2001/06/05 00:17:48 niklas Exp $";
+static char rcsid[] = "$OpenBSD: kernel.c,v 1.23 2001/06/27 03:31:46 angelos Exp $";
#endif
#include <time.h>
@@ -230,7 +230,7 @@ init_kernel(void)
TAILQ_INIT(&pfqueue);
if ((sd = socket(PF_KEY, SOCK_RAW, PF_KEY_V2)) == -1)
- log_fatal(__FUNCTION__": socket(PF_KEY) for IPSec keyengine");
+ log_fatal(__FUNCTION__": socket(PF_KEY) for IPsec key engine");
if ((regsd = socket(PF_KEY, SOCK_RAW, PF_KEY_V2)) == -1)
log_fatal(__FUNCTION__": socket() for PFKEY register");
@@ -262,13 +262,13 @@ kernel_set_socket_policy(int sd)
level = IPSEC_LEVEL_BYPASS; /* Did I mention I'm privileged? */
if (setsockopt(sd, IPPROTO_IP, IP_AUTH_LEVEL, (char *)&level,
sizeof (int)) == -1)
- log_fatal("setsockopt: can not bypass ipsec authentication policy");
+ log_fatal("setsockopt: can not bypass IPsec authentication policy");
if (setsockopt(sd, IPPROTO_IP, IP_ESP_TRANS_LEVEL,
(char *)&level, sizeof (int)) == -1)
- log_fatal("setsockopt: can not bypass ipsec esp transport policy");
+ log_fatal("setsockopt: can not bypass IPsec ESP transport policy");
if (setsockopt(sd, IPPROTO_IP, IP_ESP_NETWORK_LEVEL,
(char *)&level, sizeof (int)) == -1)
- log_fatal("setsockopt: can not bypass ipsec esp network policy");
+ log_fatal("setsockopt: can not bypass IPsec ESP network policy");
}
struct sadb_ext *
diff --git a/sbin/photurisd/photurisd.8 b/sbin/photurisd/photurisd.8
index 706b370807d..496042dbd22 100644
--- a/sbin/photurisd/photurisd.8
+++ b/sbin/photurisd/photurisd.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: photurisd.8,v 1.8 2000/12/11 20:32:15 provos Exp $
+.\" $OpenBSD: photurisd.8,v 1.9 2001/06/27 03:31:48 angelos Exp $
.\"
.\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
.\" All rights reserved.
@@ -35,7 +35,7 @@
.Os
.Sh NAME
.Nm photurisd
-.Nd IPSec key management daemon
+.Nd IPsec key management daemon
.Sh SYNOPSIS
.Nm photurisd
.Op Fl ci