diff --git a/.travis/test.sh b/.travis/test.sh
index 10f6e1487..627584440 100644
--- a/.travis/test.sh
+++ b/.travis/test.sh
@@ -8,7 +8,7 @@ then
TRAVIS_SUDO=""
fi
-# Test AEAD modes in IPSec if available
+# Test AEAD modes in IPsec if available
if [ "$TEST_COMBINED_MODES" != "yes" ]
then
UT_FLAGS+="-K combined_modes "
diff --git a/doc/scapy/installation.rst b/doc/scapy/installation.rst
index 78a4663dc..c53866ece 100644
--- a/doc/scapy/installation.rst
+++ b/doc/scapy/installation.rst
@@ -190,7 +190,7 @@ Here are the topics involved and some examples that you can use to try if your i
* VOIP. ``voip_play()`` needs `SoX `_.
-* IPSec Crypto Support. ``SecurityAssociation()`` needs `Pycrypto `_. Combined AEAD modes such as GCM and CCM require pycrypto2.7a1, which is only available from source (no pip or package).
+* IPsec Crypto Support. ``SecurityAssociation()`` needs `Pycrypto `_. Combined AEAD modes such as GCM and CCM require pycrypto2.7a1, which is only available from source (no pip or package).
.. code-block:: text
diff --git a/scapy/layers/ipsec.py b/scapy/layers/ipsec.py
index 431bc20aa..c6670d388 100644
--- a/scapy/layers/ipsec.py
+++ b/scapy/layers/ipsec.py
@@ -1,5 +1,5 @@
#############################################################################
-## ipsec.py --- IPSec support for Scapy ##
+## ipsec.py --- IPsec support for Scapy ##
## ##
## Copyright (C) 2014 6WIND ##
## ##
@@ -13,7 +13,7 @@
## General Public License for more details. ##
#############################################################################
"""
-IPSec layer
+IPsec layer
===========
Example of use:
@@ -154,7 +154,7 @@ try:
from Crypto import Random
except ImportError:
# no error if pycrypto is not available but encryption won't be supported
- warning("IPSec encryption not supported (pycrypto required).")
+ warning("IPsec encryption not supported (pycrypto required).")
AES = None
DES = None
DES3 = None
@@ -166,7 +166,7 @@ try:
from Crypto.Cipher.AES import MODE_GCM
from Crypto.Cipher.AES import MODE_CCM
except ImportError:
- warning("Combined crypto modes not available for IPSec (pycrypto 2.7a1 required).")
+ warning("Combined crypto modes not available for IPsec (pycrypto 2.7a1 required).")
#------------------------------------------------------------------------------
def _lcm(a, b):
@@ -180,7 +180,7 @@ def _lcm(a, b):
class CryptAlgo(object):
"""
- IPSec encryption algorithm
+ IPsec encryption algorithm
"""
def __init__(self, name, cipher, mode, block_size=None, iv_size=None, key_size=None, icv_size=None):
@@ -466,7 +466,7 @@ class IPSecIntegrityError(Exception):
class AuthAlgo(object):
"""
- IPSec integrity algorithm
+ IPsec integrity algorithm
"""
def __init__(self, name, mac, digestmod, icv_size, key_size=None):
@@ -508,7 +508,7 @@ class AuthAlgo(object):
def sign(self, pkt, key):
"""
- Sign an IPSec (ESP or AH) packet with this algo.
+ Sign an IPsec (ESP or AH) packet with this algo.
@param pkt: a packet that contains a valid encrypted ESP or AH layer
@param key: the authentication key, a byte string
@@ -619,7 +619,7 @@ def split_for_transport(orig_pkt, transport_proto):
header.
@param orig_pkt: the packet to split. Must be an IP or IPv6 packet
- @param transport_proto: the IPSec protocol number that will be inserted
+ @param transport_proto: the IPsec protocol number that will be inserted
at the split position.
@return: a tuple (header, nh, payload) where nh is the protocol number of
payload.
@@ -744,7 +744,7 @@ def zero_mutable_fields(pkt, sending=False):
#------------------------------------------------------------------------------
class SecurityAssociation(object):
"""
- This class is responsible of "encryption" and "decryption" of IPSec packets.
+ This class is responsible of "encryption" and "decryption" of IPsec packets.
"""
SUPPORTED_PROTOS = (IP, IPv6)
@@ -752,7 +752,7 @@ class SecurityAssociation(object):
def __init__(self, proto, spi, seq_num=1, crypt_algo=None, crypt_key=None,
auth_algo=None, auth_key=None, tunnel_header=None, nat_t_header=None):
"""
- @param proto: the IPSec proto to use (ESP or AH)
+ @param proto: the IPsec proto to use (ESP or AH)
@param spi: the Security Parameters Index of this SA
@param seq_num: the initial value for the sequence number on encrypted
packets