diff options
author | Kenneth R Westerback <krw@cvs.openbsd.org> | 2010-05-10 02:00:51 +0000 |
---|---|---|
committer | Kenneth R Westerback <krw@cvs.openbsd.org> | 2010-05-10 02:00:51 +0000 |
commit | e4dc71b9fd4a33715b07f881315d244cf5790dce (patch) | |
tree | ef3d541f654538fb428589bcde9e9b73c688157d /regress | |
parent | 5323f19923d178a32640441002e11d28b3d960df (diff) |
Various comment typos. 'wether' -> 'whether' (most popular), 'possiblity' ->
'possibility', 'optins' -> 'options', 'resposne' -> 'response', 'unecessary' -> 'unnecessary', 'desination' -> 'destination'. Collected from various misc@
and tech@ postings, many by Brad Tilley.
Diffstat (limited to 'regress')
-rw-r--r-- | regress/sbin/ipsecctl/Makefile | 4 | ||||
-rw-r--r-- | regress/sbin/pfctl/Makefile | 6 |
2 files changed, 5 insertions, 5 deletions
diff --git a/regress/sbin/ipsecctl/Makefile b/regress/sbin/ipsecctl/Makefile index 5cc945af13f..16b298b16be 100644 --- a/regress/sbin/ipsecctl/Makefile +++ b/regress/sbin/ipsecctl/Makefile @@ -1,8 +1,8 @@ -# $OpenBSD: Makefile,v 1.57 2009/08/04 15:07:54 jsing Exp $ +# $OpenBSD: Makefile,v 1.58 2010/05/10 02:00:49 krw Exp $ # you can update the *.ok files with: make -i | patch # TARGETS -# ipsec: feed ipsecNN.in through ipsecctl and check wether the output matches +# ipsec: feed ipsecNN.in through ipsecctl and check whether the output matches # ipsecNN.ok # tcpmd5: same as above, but for tcpmd5 rules # sa: same as above, but for SA rules. diff --git a/regress/sbin/pfctl/Makefile b/regress/sbin/pfctl/Makefile index cb72f701999..f6d743e0063 100644 --- a/regress/sbin/pfctl/Makefile +++ b/regress/sbin/pfctl/Makefile @@ -1,12 +1,12 @@ -# $OpenBSD: Makefile,v 1.209 2010/01/13 00:52:14 mcbride Exp $ +# $OpenBSD: Makefile,v 1.210 2010/05/10 02:00:50 krw Exp $ # TARGETS -# pf: feed pfNN.in through pfctl and check wether the output matches pfNN.ok +# pf: feed pfNN.in through pfctl and check whether the output matches pfNN.ok # selfpf: feed pfctl output through pfctl again and verify it stays the same # pfail: invalid rulesets pfctl must reject; pfailNN.in and pfailNN.ok # pfsetup: set up lo1 and perform more tests # pfr: table tests -# pfsimple: just check wether pfctl accepts a given ruleset, not checking output +# pfsimple: just check whether pfctl accepts a given ruleset, not checking output # pfload: load ruleset into anchor regress and verify pfctl -vvsr # pfoptimize: as pfload, with -o flag to pfctl # pfopt: as target pf, but supply extra command line options |