Hi all,

Fix capitalisation of IPsec as per the RFC[0] - obviously, only
where this makes sense.

The remaining one in cert.pem[1] will get fixed automatically once
the file is regenerated, after the object identifiers' description
changes.

If this gets in, I'd like to submit a patch for www - *not* individual
presentations or papers, though.

[0] https://tools.ietf.org/html/rfc4301#page-4
[1] https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libcrypto/cert.pem

Regards,

Raf

Index: include/arpa/nameser.h
===================================================================
RCS file: /cvs/src/include/arpa/nameser.h,v
retrieving revision 1.13
diff -u -p -r1.13 nameser.h
--- include/arpa/nameser.h      16 Jan 2015 00:01:28 -0000      1.13
+++ include/arpa/nameser.h      26 Feb 2018 11:03:07 -0000
@@ -223,7 +223,7 @@
 #define        KEYFLAG_USERACCOUNT     0x0400  /* key is assoc. with a user 
acct */
 #define        KEYFLAG_ENTITY          0x0200  /* key is assoc. with entity eg 
host */
 #define        KEYFLAG_ZONEKEY         0x0100  /* key is zone key for the zone 
named */
-#define        KEYFLAG_IPSEC           0x0080  /* key is for IPSEC use (host 
or user)*/
+#define        KEYFLAG_IPSEC           0x0080  /* key is for IPsec use (host 
or user)*/
 #define        KEYFLAG_EMAIL           0x0040  /* key is for email (MIME 
security) */
 #define        KEYFLAG_RESERVED10      0x0020  /* reserved - must be zero */
 #define        KEYFLAG_RESERVED11      0x0010  /* reserved - must be zero */
Index: lib/libcrypto/ec/ec_curve.c
===================================================================
RCS file: /cvs/src/lib/libcrypto/ec/ec_curve.c,v
retrieving revision 1.15
diff -u -p -r1.15 ec_curve.c
--- lib/libcrypto/ec/ec_curve.c 29 Jan 2017 17:49:23 -0000      1.15
+++ lib/libcrypto/ec/ec_curve.c 26 Feb 2018 11:03:09 -0000
@@ -2135,7 +2135,7 @@ static const struct {
        }
 };
 
-/* IPSec curves */
+/* IPsec curves */
 /* NOTE: The of curves over a extension field of non prime degree
  * is not recommended (Weil-descent).
  * As the group order is not a prime this curve is not suitable
@@ -3116,10 +3116,10 @@ static const ec_list_element curve_list[
 #endif
        {NID_wap_wsg_idm_ecid_wtls12, &_EC_WTLS_12.h, 0, "WTLS curve over a 224 
bit prime field"},
 #ifndef OPENSSL_NO_EC2M
-       /* IPSec curves */
-       {NID_ipsec3, &_EC_IPSEC_155_ID3.h, 0, "\n\tIPSec/IKE/Oakley curve #3 
over a 155 bit binary field.\n"
+       /* IPsec curves */
+       {NID_ipsec3, &_EC_IPSEC_155_ID3.h, 0, "\n\tIPsec/IKE/Oakley curve #3 
over a 155 bit binary field.\n"
        "\tNot suitable for ECDSA.\n\tQuestionable extension field!"},
-       {NID_ipsec4, &_EC_IPSEC_185_ID4.h, 0, "\n\tIPSec/IKE/Oakley curve #4 
over a 185 bit binary field.\n"
+       {NID_ipsec4, &_EC_IPSEC_185_ID4.h, 0, "\n\tIPsec/IKE/Oakley curve #4 
over a 185 bit binary field.\n"
        "\tNot suitable for ECDSA.\n\tQuestionable extension field!"},
 #endif
        /* RFC 5639 curves */
Index: lib/libcrypto/objects/objects.txt
===================================================================
RCS file: /cvs/src/lib/libcrypto/objects/objects.txt,v
retrieving revision 1.19
diff -u -p -r1.19 objects.txt
--- lib/libcrypto/objects/objects.txt   25 May 2017 17:00:24 -0000      1.19
+++ lib/libcrypto/objects/objects.txt   26 Feb 2018 11:03:09 -0000
@@ -486,9 +486,9 @@ id-kp 2                     : clientAuth            : TLS 
Web Client
 id-kp 3                        : codeSigning           : Code Signing
 !Cname email-protect
 id-kp 4                        : emailProtection       : E-mail Protection
-id-kp 5                        : ipsecEndSystem        : IPSec End System
-id-kp 6                        : ipsecTunnel           : IPSec Tunnel
-id-kp 7                        : ipsecUser             : IPSec User
+id-kp 5                        : ipsecEndSystem        : IPsec End System
+id-kp 6                        : ipsecTunnel           : IPsec Tunnel
+id-kp 7                        : ipsecUser             : IPsec User
 !Cname time-stamp
 id-kp 8                        : timeStamping          : Time Stamping
 # From OCSP spec RFC2560
Index: sbin/iked/iked.h
===================================================================
RCS file: /cvs/src/sbin/iked/iked.h,v
retrieving revision 1.117
diff -u -p -r1.117 iked.h
--- sbin/iked/iked.h    30 Nov 2017 12:18:44 -0000      1.117
+++ sbin/iked/iked.h    26 Feb 2018 11:03:14 -0000
@@ -165,7 +165,7 @@ RB_HEAD(iked_flows, iked_flow);
 TAILQ_HEAD(iked_saflows, iked_flow);
 
 struct iked_childsa {
-       uint8_t                          csa_saproto;   /* IPSec protocol */
+       uint8_t                          csa_saproto;   /* IPsec protocol */
        unsigned int                     csa_dir;       /* in/out */
 
        uint64_t                         csa_peerspi;   /* peer relation */
@@ -432,8 +432,8 @@ struct iked_sa {
        struct ibuf                     *sa_eapmsk;     /* EAK session key */
 
        struct iked_proposals            sa_proposals;  /* SA proposals */
-       struct iked_childsas             sa_childsas;   /* IPSec Child SAs */
-       struct iked_saflows              sa_flows;      /* IPSec flows */
+       struct iked_childsas             sa_childsas;   /* IPsec Child SAs */
+       struct iked_saflows              sa_flows;      /* IPsec flows */
 
        struct iked_sa                  *sa_nexti;      /* initiated IKE SA */
        struct iked_sa                  *sa_nextr;      /* simultaneous rekey */
Index: share/man/man4/ubsec.4
===================================================================
RCS file: /cvs/src/share/man/man4/ubsec.4,v
retrieving revision 1.36
diff -u -p -r1.36 ubsec.4
--- share/man/man4/ubsec.4      10 Dec 2015 21:00:51 -0000      1.36
+++ share/man/man4/ubsec.4      26 Feb 2018 11:03:14 -0000
@@ -62,7 +62,7 @@ Faster version of the BCM5822 that also 
 .It Broadcom BCM5825
 Faster PCI Express or PCI-X version of the chip.
 .It Broadcom BCM5860
-IPSec/SSL Security Processor that is faster and has more features.
+IPsec/SSL Security Processor that is faster and has more features.
 .It Broadcom BCM5861
 Faster version of the BCM5860.
 .It Broadcom BCM5862
Index: sys/dev/pci/ixgbe_type.h
===================================================================
RCS file: /cvs/src/sys/dev/pci/ixgbe_type.h,v
retrieving revision 1.31
diff -u -p -r1.31 ixgbe_type.h
--- sys/dev/pci/ixgbe_type.h    18 Nov 2016 14:16:10 -0000      1.31
+++ sys/dev/pci/ixgbe_type.h    26 Feb 2018 11:03:17 -0000
@@ -650,7 +650,7 @@
 #define IXGBE_LSECRXCTRL_RP            0x00000080
 #define IXGBE_LSECRXCTRL_RSV_MASK      0xFFFFFF33
 
-/* IpSec Registers */
+/* IPsec Registers */
 #define IXGBE_IPSTXIDX         0x08900
 #define IXGBE_IPSTXSALT                0x08904
 #define IXGBE_IPSTXKEY(_i)     (0x08908 + (4 * (_i))) /* 4 of these (0-3) */
@@ -2496,8 +2496,8 @@ enum {
 #define IXGBE_RXDADV_PKTTYPE_NFS       0x00000800 /* NFS hdr present */
 #define IXGBE_RXDADV_PKTTYPE_VXLAN     0x00000800 /* VXLAN hdr present */
 #define IXGBE_RXDADV_PKTTYPE_TUNNEL    0x00010000 /* Tunnel type */
-#define IXGBE_RXDADV_PKTTYPE_IPSEC_ESP 0x00001000 /* IPSec ESP */
-#define IXGBE_RXDADV_PKTTYPE_IPSEC_AH  0x00002000 /* IPSec AH */
+#define IXGBE_RXDADV_PKTTYPE_IPSEC_ESP 0x00001000 /* IPsec ESP */
+#define IXGBE_RXDADV_PKTTYPE_IPSEC_AH  0x00002000 /* IPsec AH */
 #define IXGBE_RXDADV_PKTTYPE_LINKSEC   0x00004000 /* LinkSec Encap */
 #define IXGBE_RXDADV_PKTTYPE_ETQF      0x00008000 /* PKTTYPE is ETQF index */
 #define IXGBE_RXDADV_PKTTYPE_ETQF_MASK 0x00000070 /* ETQF has 8 indices */
@@ -2863,8 +2863,8 @@ struct ixgbe_adv_tx_context_desc {
 #define IXGBE_ADVTXD_DTALEN_MASK       0x0000FFFF /* Data buf length(bytes) */
 #define IXGBE_ADVTXD_MAC_LINKSEC       0x00040000 /* Insert LinkSec */
 #define IXGBE_ADVTXD_MAC_TSTAMP                0x00080000 /* IEEE1588 time 
stamp */
-#define IXGBE_ADVTXD_IPSEC_SA_INDEX_MASK 0x000003FF /* IPSec SA index */
-#define IXGBE_ADVTXD_IPSEC_ESP_LEN_MASK        0x000001FF /* IPSec ESP length 
*/
+#define IXGBE_ADVTXD_IPSEC_SA_INDEX_MASK 0x000003FF /* IPsec SA index */
+#define IXGBE_ADVTXD_IPSEC_ESP_LEN_MASK        0x000001FF /* IPsec ESP length 
*/
 #define IXGBE_ADVTXD_DTYP_MASK         0x00F00000 /* DTYP mask */
 #define IXGBE_ADVTXD_DTYP_CTXT         0x00200000 /* Adv Context Desc */
 #define IXGBE_ADVTXD_DTYP_DATA         0x00300000 /* Adv Data Descriptor */
@@ -2900,8 +2900,8 @@ struct ixgbe_adv_tx_context_desc {
 #define IXGBE_ADVTXD_TUCMD_L4T_TCP     0x00000800 /* L4 Packet TYPE of TCP */
 #define IXGBE_ADVTXD_TUCMD_L4T_SCTP    0x00001000 /* L4 Packet TYPE of SCTP */
 #define IXGBE_ADVTXD_TUCMD_MKRREQ      0x00002000 /* req Markers and CRC */
-#define IXGBE_ADVTXD_POPTS_IPSEC       0x00000400 /* IPSec offload request */
-#define IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP 0x00002000 /* IPSec Type ESP */
+#define IXGBE_ADVTXD_POPTS_IPSEC       0x00000400 /* IPsec offload request */
+#define IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP 0x00002000 /* IPsec Type ESP */
 #define IXGBE_ADVTXD_TUCMD_IPSEC_ENCRYPT_EN 0x00004000/* ESP Encrypt Enable */
 #define IXGBE_ADVTXT_TUCMD_FCOE                0x00008000 /* FCoE Frame Type */
 #define IXGBE_ADVTXD_FCOEF_EOF_MASK    (0x3 << 10) /* FC EOF index */
Index: sys/netinet6/ip6_output.c
===================================================================
RCS file: /cvs/src/sys/netinet6/ip6_output.c,v
retrieving revision 1.234
diff -u -p -r1.234 ip6_output.c
--- sys/netinet6/ip6_output.c   19 Feb 2018 08:59:53 -0000      1.234
+++ sys/netinet6/ip6_output.c   26 Feb 2018 11:03:17 -0000
@@ -1040,7 +1040,7 @@ ip6_ctloutput(int op, struct socket *so,
        void *optdata;
        struct inpcb *inp = sotoinpcb(so);
        int error, optval;
-       struct proc *p = curproc; /* For IPSec and rdomain */
+       struct proc *p = curproc; /* For IPsec and rdomain */
        u_int rtid = 0;
 
        error = optval = 0;
Index: usr.bin/calendar/calendars/calendar.openbsd
===================================================================
RCS file: /cvs/src/usr.bin/calendar/calendars/calendar.openbsd,v
retrieving revision 1.38
diff -u -p -r1.38 calendar.openbsd
--- usr.bin/calendar/calendars/calendar.openbsd 3 Sep 2016 13:37:45 -0000       
1.38
+++ usr.bin/calendar/calendars/calendar.openbsd 26 Feb 2018 11:03:18 -0000
@@ -53,7 +53,7 @@ May 29        t2k13: General hackathon, Toronto
 May 30 c2k9: General hackathon, Edmonton, Alberta, 46 developers, 2009
 May 31 Initial cut at OpenNTP, 2004
 Jun 01 OpenBSD 2.1 released, first time on CD (double set), 1997
-Jun 04 c99: First hackathon (IPSec), Calgary, Alberta, 10 developers, 1999
+Jun 04 c99: First hackathon (IPsec), Calgary, Alberta, 10 developers, 1999
 Jun 04 c2k2: General hackathon, Calgary, Alberta, 42 developers, 2002
 Jun 06 c2k8: General hackathon, Edmonton, Alberta, 55 developers, 2008
 Jun 14 r2k6: First network hackathon, Hamburg, Germany, 6 developers, 2006
@@ -79,7 +79,7 @@ Aug 12        OpenBSD/sparc is switched to wsco
 Aug 16 IPX network stack added to OpenBSD, from FreeBSD, 1996
 Aug 17 c2k1-2: Sparc64 hackathon, Washington D.C., 12 developers, 2001
 Aug 17 OpenBSD/sparc64 port is added, from NetBSD, 2001
-Aug 28 k2k6: IPSec hackathon, Schloss Kransberg, Germany, 14 developers, 2006
+Aug 28 k2k6: IPsec hackathon, Schloss Kransberg, Germany, 14 developers, 2006
 Sep 01 Support for the sparc (32bit) architecture removed, 2016
 Sep 03 Support for the zaurus architecture removed, 2016
 Sep 16 s2k11: General hackathon, Ljubljana, Slovenia, 25 developers, 2011
Index: usr.sbin/dhcpd/dhcpd.conf.5
===================================================================
RCS file: /cvs/src/usr.sbin/dhcpd/dhcpd.conf.5,v
retrieving revision 1.22
diff -u -p -r1.22 dhcpd.conf.5
--- usr.sbin/dhcpd/dhcpd.conf.5 28 Jun 2017 14:07:11 -0000      1.22
+++ usr.sbin/dhcpd/dhcpd.conf.5 26 Feb 2018 11:03:19 -0000
@@ -566,7 +566,7 @@ Currently, the
 and
 .Cm fddi
 physical interface types are recognized,
-although support for DHCP-over-IPSec virtual interface type
+although support for DHCP-over-IPsec virtual interface type
 .Cm ipsec-tunnel
 is provided.
 The
Index: usr.sbin/dhcrelay/dhcrelay.c
===================================================================
RCS file: /cvs/src/usr.sbin/dhcrelay/dhcrelay.c,v
retrieving revision 1.63
diff -u -p -r1.63 dhcrelay.c
--- usr.sbin/dhcrelay/dhcrelay.c        5 Jul 2017 11:11:56 -0000       1.63
+++ usr.sbin/dhcrelay/dhcrelay.c        26 Feb 2018 11:03:19 -0000
@@ -174,7 +174,7 @@ main(int argc, char *argv[])
                                fatalx("don't mix interfaces with hosts");
 
                        if (sp->intf->hw_address.htype == HTYPE_IPSEC_TUNNEL)
-                               fatalx("can't use IPSec with layer 2");
+                               fatalx("can't use IPsec with layer 2");
 
                        sp->next = servers;
                        servers = sp;
Index: usr.sbin/npppd/l2tp/l2tp_ctrl.c
===================================================================
RCS file: /cvs/src/usr.sbin/npppd/l2tp/l2tp_ctrl.c,v
retrieving revision 1.21
diff -u -p -r1.21 l2tp_ctrl.c
--- usr.sbin/npppd/l2tp/l2tp_ctrl.c     5 Dec 2015 18:43:36 -0000       1.21
+++ usr.sbin/npppd/l2tp/l2tp_ctrl.c     26 Feb 2018 11:03:20 -0000
@@ -442,7 +442,7 @@ l2tp_ctrl_purge_ipsec_sa(l2tp_ctrl *_thi
 #endif
        if (ipsec_util_purge_transport_sa((struct sockaddr *)&peer,
            (struct sockaddr *)&sock, proto, IPSEC_UTIL_DIRECTION_BOTH) != 0)
-               l2tp_ctrl_log(_this, LOG_NOTICE, "failed to purge IPSec SA");
+               l2tp_ctrl_log(_this, LOG_NOTICE, "failed to purge IPsec SA");
 }
 #endif
 

Reply via email to