diff options
-rw-r--r-- | lib/libcrypto/des/fcrypt.c | 4 | ||||
-rw-r--r-- | regress/usr.sbin/ospfd/Client.pm | 4 | ||||
-rw-r--r-- | sys/arch/arm64/arm64/trap.c | 4 | ||||
-rw-r--r-- | sys/netinet/tcp_usrreq.c | 4 | ||||
-rw-r--r-- | sys/netinet6/ip6_input.c | 4 | ||||
-rw-r--r-- | usr.sbin/bgpd/parse.y | 4 |
6 files changed, 12 insertions, 12 deletions
diff --git a/lib/libcrypto/des/fcrypt.c b/lib/libcrypto/des/fcrypt.c index e2675fa4511..f8c9935a468 100644 --- a/lib/libcrypto/des/fcrypt.c +++ b/lib/libcrypto/des/fcrypt.c @@ -1,4 +1,4 @@ -/* $OpenBSD: fcrypt.c,v 1.11 2014/06/12 15:49:28 deraadt Exp $ */ +/* $OpenBSD: fcrypt.c,v 1.12 2016/12/26 21:30:10 jca Exp $ */ #include <stdio.h> @@ -10,7 +10,7 @@ /* Modification by Jens Kupferschmidt (Cu) * I have included directive PARA for shared memory computers. * I have included a directive LONGCRYPT to using this routine to cipher - * passwords with more then 8 bytes like HP-UX 10.x it used. The MAXPLEN + * passwords with more than 8 bytes like HP-UX 10.x it used. The MAXPLEN * definition is the maximum of length of password and can changed. I have * defined 24. */ diff --git a/regress/usr.sbin/ospfd/Client.pm b/regress/usr.sbin/ospfd/Client.pm index 3c57559cf94..36d5545a1bc 100644 --- a/regress/usr.sbin/ospfd/Client.pm +++ b/regress/usr.sbin/ospfd/Client.pm @@ -1,4 +1,4 @@ -# $OpenBSD: Client.pm,v 1.5 2016/09/28 12:40:35 bluhm Exp $ +# $OpenBSD: Client.pm,v 1.6 2016/12/26 21:30:10 jca Exp $ # Copyright (c) 2010-2015 Alexander Bluhm <bluhm@openbsd.org> # Copyright (c) 2014-2015 Florian Riehm <mail@friehm.de> @@ -353,7 +353,7 @@ sub child { $handle = AnyEvent::Handle->new( fh => $tap, - read_size => 70000, # little more then max ip size + read_size => 70000, # little more than max ip size on_error => sub { $cv->croak("error on tap device $tap_number: $!"); $handle->destroy(); diff --git a/sys/arch/arm64/arm64/trap.c b/sys/arch/arm64/arm64/trap.c index de0fc2e5f0a..306e5854f5e 100644 --- a/sys/arch/arm64/arm64/trap.c +++ b/sys/arch/arm64/arm64/trap.c @@ -1,4 +1,4 @@ -/* $OpenBSD: trap.c,v 1.2 2016/12/18 17:46:52 patrick Exp $ */ +/* $OpenBSD: trap.c,v 1.3 2016/12/26 21:30:10 jca Exp $ */ /*- * Copyright (c) 2014 Andrew Turner * All rights reserved. @@ -100,7 +100,7 @@ cpu_fetch_syscall_args(struct thread *td, struct syscall_args *sa) sa->narg = sa->callp->sy_narg; memcpy(sa->args, ap, nap * sizeof(register_t)); if (sa->narg > nap) - panic("TODO: Could we have more then 8 args?"); + panic("TODO: Could we have more than 8 args?"); td->td_retval[0] = 0; td->td_retval[1] = 0; diff --git a/sys/netinet/tcp_usrreq.c b/sys/netinet/tcp_usrreq.c index 5cd71d38c04..e61d6545970 100644 --- a/sys/netinet/tcp_usrreq.c +++ b/sys/netinet/tcp_usrreq.c @@ -1,4 +1,4 @@ -/* $OpenBSD: tcp_usrreq.c,v 1.139 2016/12/20 18:33:43 bluhm Exp $ */ +/* $OpenBSD: tcp_usrreq.c,v 1.140 2016/12/26 21:30:10 jca Exp $ */ /* $NetBSD: tcp_usrreq.c,v 1.20 1996/02/13 23:44:16 christos Exp $ */ /* @@ -1027,7 +1027,7 @@ tcp_update_sndspace(struct tcpcb *tp) /* * Scale the recv buffer by looking at how much data was transferred in - * on approximated RTT. If more then a big part of the recv buffer was + * on approximated RTT. If more than a big part of the recv buffer was * transferred during that time we increase the buffer by a constant. * In low memory situation try to shrink the buffer to the initial size. */ diff --git a/sys/netinet6/ip6_input.c b/sys/netinet6/ip6_input.c index ee25a811a43..4b57e07f6ad 100644 --- a/sys/netinet6/ip6_input.c +++ b/sys/netinet6/ip6_input.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ip6_input.c,v 1.172 2016/12/20 18:33:43 bluhm Exp $ */ +/* $OpenBSD: ip6_input.c,v 1.173 2016/12/26 21:30:10 jca Exp $ */ /* $KAME: ip6_input.c,v 1.188 2001/03/29 05:34:31 itojun Exp $ */ /* @@ -664,7 +664,7 @@ ip6_check_rh0hdr(struct mbuf *m, int *offp) case IPPROTO_ROUTING: *offp = off; if (rh_cnt++) { - /* more then one rh header present */ + /* more than one rh header present */ return (1); } diff --git a/usr.sbin/bgpd/parse.y b/usr.sbin/bgpd/parse.y index f3f17d3ed8d..c3d25c8a928 100644 --- a/usr.sbin/bgpd/parse.y +++ b/usr.sbin/bgpd/parse.y @@ -1,4 +1,4 @@ -/* $OpenBSD: parse.y,v 1.290 2016/10/14 16:05:36 phessler Exp $ */ +/* $OpenBSD: parse.y,v 1.291 2016/12/26 21:30:10 jca Exp $ */ /* * Copyright (c) 2002, 2003, 2004 Henning Brauer <henning@openbsd.org> @@ -3066,7 +3066,7 @@ parseextvalue(char *s, u_int32_t *v) *v = uval | (uvalh << 16); return (EXT_COMMUNITY_FOUR_AS); } else { - /* more then one dot -> IP address */ + /* more than one dot -> IP address */ if (inet_aton(s, &ip) == 0) { yyerror("Bad ext-community %s not parseable", s); return (-1); |