Hi all,

As per jmc's commit message[0], would anyone be so kind as to comment
on this, please?

Thanks again to Jason for fixing the non-code bits.

[0] https://marc.info/?m=151993729713231

Cheers,

Raf

On Wed, Feb 28, 2018 at 08:38:35PM GMT, Jason McIntyre wrote:
> On Mon, Feb 26, 2018 at 12:15:28PM +0000, Raf Czlonka wrote:
> > Hi all,
> > 
> > Fix capitalisation of IPsec as per the RFC[0] - obviously, only
> > where this makes sense.
> > 
> > The remaining one in cert.pem[1] will get fixed automatically once
> > the file is regenerated, after the object identifiers' description
> > changes.
> > 
> > If this gets in, I'd like to submit a patch for www - *not* individual
> > presentations or papers, though.
> > 
> > [0] https://tools.ietf.org/html/rfc4301#page-4
> > [1] https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/libcrypto/cert.pem
> > 
> > Regards,
> > 
> > Raf
> > 
> 
> i'm ok with this diff. i don;t want to commit it as-is though, because
> of the code bits.
> 
> if no one shows any interest in taking it, i'll look at at least fixing the
> man/calendar parts.
> 
> jmc
> 
> > Index: include/arpa/nameser.h
> > ===================================================================
> > RCS file: /cvs/src/include/arpa/nameser.h,v
> > retrieving revision 1.13
> > diff -u -p -r1.13 nameser.h
> > --- include/arpa/nameser.h  16 Jan 2015 00:01:28 -0000      1.13
> > +++ include/arpa/nameser.h  26 Feb 2018 11:03:07 -0000
> > @@ -223,7 +223,7 @@
> >  #define    KEYFLAG_USERACCOUNT     0x0400  /* key is assoc. with a user 
> > acct */
> >  #define    KEYFLAG_ENTITY          0x0200  /* key is assoc. with entity eg 
> > host */
> >  #define    KEYFLAG_ZONEKEY         0x0100  /* key is zone key for the zone 
> > named */
> > -#define    KEYFLAG_IPSEC           0x0080  /* key is for IPSEC use (host 
> > or user)*/
> > +#define    KEYFLAG_IPSEC           0x0080  /* key is for IPsec use (host 
> > or user)*/
> >  #define    KEYFLAG_EMAIL           0x0040  /* key is for email (MIME 
> > security) */
> >  #define    KEYFLAG_RESERVED10      0x0020  /* reserved - must be zero */
> >  #define    KEYFLAG_RESERVED11      0x0010  /* reserved - must be zero */
> > Index: lib/libcrypto/ec/ec_curve.c
> > ===================================================================
> > RCS file: /cvs/src/lib/libcrypto/ec/ec_curve.c,v
> > retrieving revision 1.15
> > diff -u -p -r1.15 ec_curve.c
> > --- lib/libcrypto/ec/ec_curve.c     29 Jan 2017 17:49:23 -0000      1.15
> > +++ lib/libcrypto/ec/ec_curve.c     26 Feb 2018 11:03:09 -0000
> > @@ -2135,7 +2135,7 @@ static const struct {
> >     }
> >  };
> >  
> > -/* IPSec curves */
> > +/* IPsec curves */
> >  /* NOTE: The of curves over a extension field of non prime degree
> >   * is not recommended (Weil-descent).
> >   * As the group order is not a prime this curve is not suitable
> > @@ -3116,10 +3116,10 @@ static const ec_list_element curve_list[
> >  #endif
> >     {NID_wap_wsg_idm_ecid_wtls12, &_EC_WTLS_12.h, 0, "WTLS curve over a 224 
> > bit prime field"},
> >  #ifndef OPENSSL_NO_EC2M
> > -   /* IPSec curves */
> > -   {NID_ipsec3, &_EC_IPSEC_155_ID3.h, 0, "\n\tIPSec/IKE/Oakley curve #3 
> > over a 155 bit binary field.\n"
> > +   /* IPsec curves */
> > +   {NID_ipsec3, &_EC_IPSEC_155_ID3.h, 0, "\n\tIPsec/IKE/Oakley curve #3 
> > over a 155 bit binary field.\n"
> >     "\tNot suitable for ECDSA.\n\tQuestionable extension field!"},
> > -   {NID_ipsec4, &_EC_IPSEC_185_ID4.h, 0, "\n\tIPSec/IKE/Oakley curve #4 
> > over a 185 bit binary field.\n"
> > +   {NID_ipsec4, &_EC_IPSEC_185_ID4.h, 0, "\n\tIPsec/IKE/Oakley curve #4 
> > over a 185 bit binary field.\n"
> >     "\tNot suitable for ECDSA.\n\tQuestionable extension field!"},
> >  #endif
> >     /* RFC 5639 curves */
> > Index: lib/libcrypto/objects/objects.txt
> > ===================================================================
> > RCS file: /cvs/src/lib/libcrypto/objects/objects.txt,v
> > retrieving revision 1.19
> > diff -u -p -r1.19 objects.txt
> > --- lib/libcrypto/objects/objects.txt       25 May 2017 17:00:24 -0000      
> > 1.19
> > +++ lib/libcrypto/objects/objects.txt       26 Feb 2018 11:03:09 -0000
> > @@ -486,9 +486,9 @@ id-kp 2                 : clientAuth            : TLS 
> > Web Client
> >  id-kp 3                    : codeSigning           : Code Signing
> >  !Cname email-protect
> >  id-kp 4                    : emailProtection       : E-mail Protection
> > -id-kp 5                    : ipsecEndSystem        : IPSec End System
> > -id-kp 6                    : ipsecTunnel           : IPSec Tunnel
> > -id-kp 7                    : ipsecUser             : IPSec User
> > +id-kp 5                    : ipsecEndSystem        : IPsec End System
> > +id-kp 6                    : ipsecTunnel           : IPsec Tunnel
> > +id-kp 7                    : ipsecUser             : IPsec User
> >  !Cname time-stamp
> >  id-kp 8                    : timeStamping          : Time Stamping
> >  # From OCSP spec RFC2560
> > Index: sbin/iked/iked.h
> > ===================================================================
> > RCS file: /cvs/src/sbin/iked/iked.h,v
> > retrieving revision 1.117
> > diff -u -p -r1.117 iked.h
> > --- sbin/iked/iked.h        30 Nov 2017 12:18:44 -0000      1.117
> > +++ sbin/iked/iked.h        26 Feb 2018 11:03:14 -0000
> > @@ -165,7 +165,7 @@ RB_HEAD(iked_flows, iked_flow);
> >  TAILQ_HEAD(iked_saflows, iked_flow);
> >  
> >  struct iked_childsa {
> > -   uint8_t                          csa_saproto;   /* IPSec protocol */
> > +   uint8_t                          csa_saproto;   /* IPsec protocol */
> >     unsigned int                     csa_dir;       /* in/out */
> >  
> >     uint64_t                         csa_peerspi;   /* peer relation */
> > @@ -432,8 +432,8 @@ struct iked_sa {
> >     struct ibuf                     *sa_eapmsk;     /* EAK session key */
> >  
> >     struct iked_proposals            sa_proposals;  /* SA proposals */
> > -   struct iked_childsas             sa_childsas;   /* IPSec Child SAs */
> > -   struct iked_saflows              sa_flows;      /* IPSec flows */
> > +   struct iked_childsas             sa_childsas;   /* IPsec Child SAs */
> > +   struct iked_saflows              sa_flows;      /* IPsec flows */
> >  
> >     struct iked_sa                  *sa_nexti;      /* initiated IKE SA */
> >     struct iked_sa                  *sa_nextr;      /* simultaneous rekey */
> > Index: share/man/man4/ubsec.4
> > ===================================================================
> > RCS file: /cvs/src/share/man/man4/ubsec.4,v
> > retrieving revision 1.36
> > diff -u -p -r1.36 ubsec.4
> > --- share/man/man4/ubsec.4  10 Dec 2015 21:00:51 -0000      1.36
> > +++ share/man/man4/ubsec.4  26 Feb 2018 11:03:14 -0000
> > @@ -62,7 +62,7 @@ Faster version of the BCM5822 that also 
> >  .It Broadcom BCM5825
> >  Faster PCI Express or PCI-X version of the chip.
> >  .It Broadcom BCM5860
> > -IPSec/SSL Security Processor that is faster and has more features.
> > +IPsec/SSL Security Processor that is faster and has more features.
> >  .It Broadcom BCM5861
> >  Faster version of the BCM5860.
> >  .It Broadcom BCM5862
> > Index: sys/dev/pci/ixgbe_type.h
> > ===================================================================
> > RCS file: /cvs/src/sys/dev/pci/ixgbe_type.h,v
> > retrieving revision 1.31
> > diff -u -p -r1.31 ixgbe_type.h
> > --- sys/dev/pci/ixgbe_type.h        18 Nov 2016 14:16:10 -0000      1.31
> > +++ sys/dev/pci/ixgbe_type.h        26 Feb 2018 11:03:17 -0000
> > @@ -650,7 +650,7 @@
> >  #define IXGBE_LSECRXCTRL_RP                0x00000080
> >  #define IXGBE_LSECRXCTRL_RSV_MASK  0xFFFFFF33
> >  
> > -/* IpSec Registers */
> > +/* IPsec Registers */
> >  #define IXGBE_IPSTXIDX             0x08900
> >  #define IXGBE_IPSTXSALT            0x08904
> >  #define IXGBE_IPSTXKEY(_i) (0x08908 + (4 * (_i))) /* 4 of these (0-3) */
> > @@ -2496,8 +2496,8 @@ enum {
> >  #define IXGBE_RXDADV_PKTTYPE_NFS   0x00000800 /* NFS hdr present */
> >  #define IXGBE_RXDADV_PKTTYPE_VXLAN 0x00000800 /* VXLAN hdr present */
> >  #define IXGBE_RXDADV_PKTTYPE_TUNNEL        0x00010000 /* Tunnel type */
> > -#define IXGBE_RXDADV_PKTTYPE_IPSEC_ESP     0x00001000 /* IPSec ESP */
> > -#define IXGBE_RXDADV_PKTTYPE_IPSEC_AH      0x00002000 /* IPSec AH */
> > +#define IXGBE_RXDADV_PKTTYPE_IPSEC_ESP     0x00001000 /* IPsec ESP */
> > +#define IXGBE_RXDADV_PKTTYPE_IPSEC_AH      0x00002000 /* IPsec AH */
> >  #define IXGBE_RXDADV_PKTTYPE_LINKSEC       0x00004000 /* LinkSec Encap */
> >  #define IXGBE_RXDADV_PKTTYPE_ETQF  0x00008000 /* PKTTYPE is ETQF index */
> >  #define IXGBE_RXDADV_PKTTYPE_ETQF_MASK     0x00000070 /* ETQF has 8 
> > indices */
> > @@ -2863,8 +2863,8 @@ struct ixgbe_adv_tx_context_desc {
> >  #define IXGBE_ADVTXD_DTALEN_MASK   0x0000FFFF /* Data buf length(bytes) */
> >  #define IXGBE_ADVTXD_MAC_LINKSEC   0x00040000 /* Insert LinkSec */
> >  #define IXGBE_ADVTXD_MAC_TSTAMP            0x00080000 /* IEEE1588 time 
> > stamp */
> > -#define IXGBE_ADVTXD_IPSEC_SA_INDEX_MASK 0x000003FF /* IPSec SA index */
> > -#define IXGBE_ADVTXD_IPSEC_ESP_LEN_MASK    0x000001FF /* IPSec ESP length 
> > */
> > +#define IXGBE_ADVTXD_IPSEC_SA_INDEX_MASK 0x000003FF /* IPsec SA index */
> > +#define IXGBE_ADVTXD_IPSEC_ESP_LEN_MASK    0x000001FF /* IPsec ESP length 
> > */
> >  #define IXGBE_ADVTXD_DTYP_MASK             0x00F00000 /* DTYP mask */
> >  #define IXGBE_ADVTXD_DTYP_CTXT             0x00200000 /* Adv Context Desc 
> > */
> >  #define IXGBE_ADVTXD_DTYP_DATA             0x00300000 /* Adv Data 
> > Descriptor */
> > @@ -2900,8 +2900,8 @@ struct ixgbe_adv_tx_context_desc {
> >  #define IXGBE_ADVTXD_TUCMD_L4T_TCP 0x00000800 /* L4 Packet TYPE of TCP */
> >  #define IXGBE_ADVTXD_TUCMD_L4T_SCTP        0x00001000 /* L4 Packet TYPE of 
> > SCTP */
> >  #define IXGBE_ADVTXD_TUCMD_MKRREQ  0x00002000 /* req Markers and CRC */
> > -#define IXGBE_ADVTXD_POPTS_IPSEC   0x00000400 /* IPSec offload request */
> > -#define IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP 0x00002000 /* IPSec Type ESP */
> > +#define IXGBE_ADVTXD_POPTS_IPSEC   0x00000400 /* IPsec offload request */
> > +#define IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP 0x00002000 /* IPsec Type ESP */
> >  #define IXGBE_ADVTXD_TUCMD_IPSEC_ENCRYPT_EN 0x00004000/* ESP Encrypt 
> > Enable */
> >  #define IXGBE_ADVTXT_TUCMD_FCOE            0x00008000 /* FCoE Frame Type */
> >  #define IXGBE_ADVTXD_FCOEF_EOF_MASK        (0x3 << 10) /* FC EOF index */
> > Index: sys/netinet6/ip6_output.c
> > ===================================================================
> > RCS file: /cvs/src/sys/netinet6/ip6_output.c,v
> > retrieving revision 1.234
> > diff -u -p -r1.234 ip6_output.c
> > --- sys/netinet6/ip6_output.c       19 Feb 2018 08:59:53 -0000      1.234
> > +++ sys/netinet6/ip6_output.c       26 Feb 2018 11:03:17 -0000
> > @@ -1040,7 +1040,7 @@ ip6_ctloutput(int op, struct socket *so,
> >     void *optdata;
> >     struct inpcb *inp = sotoinpcb(so);
> >     int error, optval;
> > -   struct proc *p = curproc; /* For IPSec and rdomain */
> > +   struct proc *p = curproc; /* For IPsec and rdomain */
> >     u_int rtid = 0;
> >  
> >     error = optval = 0;
> > Index: usr.bin/calendar/calendars/calendar.openbsd
> > ===================================================================
> > RCS file: /cvs/src/usr.bin/calendar/calendars/calendar.openbsd,v
> > retrieving revision 1.38
> > diff -u -p -r1.38 calendar.openbsd
> > --- usr.bin/calendar/calendars/calendar.openbsd     3 Sep 2016 13:37:45 
> > -0000       1.38
> > +++ usr.bin/calendar/calendars/calendar.openbsd     26 Feb 2018 11:03:18 
> > -0000
> > @@ -53,7 +53,7 @@ May 29    t2k13: General hackathon, Toronto
> >  May 30     c2k9: General hackathon, Edmonton, Alberta, 46 developers, 2009
> >  May 31     Initial cut at OpenNTP, 2004
> >  Jun 01     OpenBSD 2.1 released, first time on CD (double set), 1997
> > -Jun 04     c99: First hackathon (IPSec), Calgary, Alberta, 10 developers, 
> > 1999
> > +Jun 04     c99: First hackathon (IPsec), Calgary, Alberta, 10 developers, 
> > 1999
> >  Jun 04     c2k2: General hackathon, Calgary, Alberta, 42 developers, 2002
> >  Jun 06     c2k8: General hackathon, Edmonton, Alberta, 55 developers, 2008
> >  Jun 14     r2k6: First network hackathon, Hamburg, Germany, 6 developers, 
> > 2006
> > @@ -79,7 +79,7 @@ Aug 12    OpenBSD/sparc is switched to wsco
> >  Aug 16     IPX network stack added to OpenBSD, from FreeBSD, 1996
> >  Aug 17     c2k1-2: Sparc64 hackathon, Washington D.C., 12 developers, 2001
> >  Aug 17     OpenBSD/sparc64 port is added, from NetBSD, 2001
> > -Aug 28     k2k6: IPSec hackathon, Schloss Kransberg, Germany, 14 
> > developers, 2006
> > +Aug 28     k2k6: IPsec hackathon, Schloss Kransberg, Germany, 14 
> > developers, 2006
> >  Sep 01     Support for the sparc (32bit) architecture removed, 2016
> >  Sep 03     Support for the zaurus architecture removed, 2016
> >  Sep 16     s2k11: General hackathon, Ljubljana, Slovenia, 25 developers, 
> > 2011
> > Index: usr.sbin/dhcpd/dhcpd.conf.5
> > ===================================================================
> > RCS file: /cvs/src/usr.sbin/dhcpd/dhcpd.conf.5,v
> > retrieving revision 1.22
> > diff -u -p -r1.22 dhcpd.conf.5
> > --- usr.sbin/dhcpd/dhcpd.conf.5     28 Jun 2017 14:07:11 -0000      1.22
> > +++ usr.sbin/dhcpd/dhcpd.conf.5     26 Feb 2018 11:03:19 -0000
> > @@ -566,7 +566,7 @@ Currently, the
> >  and
> >  .Cm fddi
> >  physical interface types are recognized,
> > -although support for DHCP-over-IPSec virtual interface type
> > +although support for DHCP-over-IPsec virtual interface type
> >  .Cm ipsec-tunnel
> >  is provided.
> >  The
> > Index: usr.sbin/dhcrelay/dhcrelay.c
> > ===================================================================
> > RCS file: /cvs/src/usr.sbin/dhcrelay/dhcrelay.c,v
> > retrieving revision 1.63
> > diff -u -p -r1.63 dhcrelay.c
> > --- usr.sbin/dhcrelay/dhcrelay.c    5 Jul 2017 11:11:56 -0000       1.63
> > +++ usr.sbin/dhcrelay/dhcrelay.c    26 Feb 2018 11:03:19 -0000
> > @@ -174,7 +174,7 @@ main(int argc, char *argv[])
> >                             fatalx("don't mix interfaces with hosts");
> >  
> >                     if (sp->intf->hw_address.htype == HTYPE_IPSEC_TUNNEL)
> > -                           fatalx("can't use IPSec with layer 2");
> > +                           fatalx("can't use IPsec with layer 2");
> >  
> >                     sp->next = servers;
> >                     servers = sp;
> > Index: usr.sbin/npppd/l2tp/l2tp_ctrl.c
> > ===================================================================
> > RCS file: /cvs/src/usr.sbin/npppd/l2tp/l2tp_ctrl.c,v
> > retrieving revision 1.21
> > diff -u -p -r1.21 l2tp_ctrl.c
> > --- usr.sbin/npppd/l2tp/l2tp_ctrl.c 5 Dec 2015 18:43:36 -0000       1.21
> > +++ usr.sbin/npppd/l2tp/l2tp_ctrl.c 26 Feb 2018 11:03:20 -0000
> > @@ -442,7 +442,7 @@ l2tp_ctrl_purge_ipsec_sa(l2tp_ctrl *_thi
> >  #endif
> >     if (ipsec_util_purge_transport_sa((struct sockaddr *)&peer,
> >         (struct sockaddr *)&sock, proto, IPSEC_UTIL_DIRECTION_BOTH) != 0)
> > -           l2tp_ctrl_log(_this, LOG_NOTICE, "failed to purge IPSec SA");
> > +           l2tp_ctrl_log(_this, LOG_NOTICE, "failed to purge IPsec SA");
> >  }
> >  #endif
> >  
> > 
> 

Reply via email to