summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--lib/libcrypto/des/fcrypt.c4
-rw-r--r--regress/usr.sbin/ospfd/Client.pm4
-rw-r--r--sys/arch/arm64/arm64/trap.c4
-rw-r--r--sys/netinet/tcp_usrreq.c4
-rw-r--r--sys/netinet6/ip6_input.c4
-rw-r--r--usr.sbin/bgpd/parse.y4
6 files changed, 12 insertions, 12 deletions
diff --git a/lib/libcrypto/des/fcrypt.c b/lib/libcrypto/des/fcrypt.c
index e2675fa4511..f8c9935a468 100644
--- a/lib/libcrypto/des/fcrypt.c
+++ b/lib/libcrypto/des/fcrypt.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: fcrypt.c,v 1.11 2014/06/12 15:49:28 deraadt Exp $ */
+/* $OpenBSD: fcrypt.c,v 1.12 2016/12/26 21:30:10 jca Exp $ */
#include <stdio.h>
@@ -10,7 +10,7 @@
/* Modification by Jens Kupferschmidt (Cu)
* I have included directive PARA for shared memory computers.
* I have included a directive LONGCRYPT to using this routine to cipher
- * passwords with more then 8 bytes like HP-UX 10.x it used. The MAXPLEN
+ * passwords with more than 8 bytes like HP-UX 10.x it used. The MAXPLEN
* definition is the maximum of length of password and can changed. I have
* defined 24.
*/
diff --git a/regress/usr.sbin/ospfd/Client.pm b/regress/usr.sbin/ospfd/Client.pm
index 3c57559cf94..36d5545a1bc 100644
--- a/regress/usr.sbin/ospfd/Client.pm
+++ b/regress/usr.sbin/ospfd/Client.pm
@@ -1,4 +1,4 @@
-# $OpenBSD: Client.pm,v 1.5 2016/09/28 12:40:35 bluhm Exp $
+# $OpenBSD: Client.pm,v 1.6 2016/12/26 21:30:10 jca Exp $
# Copyright (c) 2010-2015 Alexander Bluhm <bluhm@openbsd.org>
# Copyright (c) 2014-2015 Florian Riehm <mail@friehm.de>
@@ -353,7 +353,7 @@ sub child {
$handle = AnyEvent::Handle->new(
fh => $tap,
- read_size => 70000, # little more then max ip size
+ read_size => 70000, # little more than max ip size
on_error => sub {
$cv->croak("error on tap device $tap_number: $!");
$handle->destroy();
diff --git a/sys/arch/arm64/arm64/trap.c b/sys/arch/arm64/arm64/trap.c
index de0fc2e5f0a..306e5854f5e 100644
--- a/sys/arch/arm64/arm64/trap.c
+++ b/sys/arch/arm64/arm64/trap.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: trap.c,v 1.2 2016/12/18 17:46:52 patrick Exp $ */
+/* $OpenBSD: trap.c,v 1.3 2016/12/26 21:30:10 jca Exp $ */
/*-
* Copyright (c) 2014 Andrew Turner
* All rights reserved.
@@ -100,7 +100,7 @@ cpu_fetch_syscall_args(struct thread *td, struct syscall_args *sa)
sa->narg = sa->callp->sy_narg;
memcpy(sa->args, ap, nap * sizeof(register_t));
if (sa->narg > nap)
- panic("TODO: Could we have more then 8 args?");
+ panic("TODO: Could we have more than 8 args?");
td->td_retval[0] = 0;
td->td_retval[1] = 0;
diff --git a/sys/netinet/tcp_usrreq.c b/sys/netinet/tcp_usrreq.c
index 5cd71d38c04..e61d6545970 100644
--- a/sys/netinet/tcp_usrreq.c
+++ b/sys/netinet/tcp_usrreq.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: tcp_usrreq.c,v 1.139 2016/12/20 18:33:43 bluhm Exp $ */
+/* $OpenBSD: tcp_usrreq.c,v 1.140 2016/12/26 21:30:10 jca Exp $ */
/* $NetBSD: tcp_usrreq.c,v 1.20 1996/02/13 23:44:16 christos Exp $ */
/*
@@ -1027,7 +1027,7 @@ tcp_update_sndspace(struct tcpcb *tp)
/*
* Scale the recv buffer by looking at how much data was transferred in
- * on approximated RTT. If more then a big part of the recv buffer was
+ * on approximated RTT. If more than a big part of the recv buffer was
* transferred during that time we increase the buffer by a constant.
* In low memory situation try to shrink the buffer to the initial size.
*/
diff --git a/sys/netinet6/ip6_input.c b/sys/netinet6/ip6_input.c
index ee25a811a43..4b57e07f6ad 100644
--- a/sys/netinet6/ip6_input.c
+++ b/sys/netinet6/ip6_input.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ip6_input.c,v 1.172 2016/12/20 18:33:43 bluhm Exp $ */
+/* $OpenBSD: ip6_input.c,v 1.173 2016/12/26 21:30:10 jca Exp $ */
/* $KAME: ip6_input.c,v 1.188 2001/03/29 05:34:31 itojun Exp $ */
/*
@@ -664,7 +664,7 @@ ip6_check_rh0hdr(struct mbuf *m, int *offp)
case IPPROTO_ROUTING:
*offp = off;
if (rh_cnt++) {
- /* more then one rh header present */
+ /* more than one rh header present */
return (1);
}
diff --git a/usr.sbin/bgpd/parse.y b/usr.sbin/bgpd/parse.y
index f3f17d3ed8d..c3d25c8a928 100644
--- a/usr.sbin/bgpd/parse.y
+++ b/usr.sbin/bgpd/parse.y
@@ -1,4 +1,4 @@
-/* $OpenBSD: parse.y,v 1.290 2016/10/14 16:05:36 phessler Exp $ */
+/* $OpenBSD: parse.y,v 1.291 2016/12/26 21:30:10 jca Exp $ */
/*
* Copyright (c) 2002, 2003, 2004 Henning Brauer <henning@openbsd.org>
@@ -3066,7 +3066,7 @@ parseextvalue(char *s, u_int32_t *v)
*v = uval | (uvalh << 16);
return (EXT_COMMUNITY_FOUR_AS);
} else {
- /* more then one dot -> IP address */
+ /* more than one dot -> IP address */
if (inet_aton(s, &ip) == 0) {
yyerror("Bad ext-community %s not parseable", s);
return (-1);