diff options
Diffstat (limited to 'sys/dev')
-rw-r--r-- | sys/dev/ramdisk.c | 6 | ||||
-rw-r--r-- | sys/dev/rnd.c | 4 | ||||
-rw-r--r-- | sys/dev/systrace.c | 6 |
3 files changed, 8 insertions, 8 deletions
diff --git a/sys/dev/ramdisk.c b/sys/dev/ramdisk.c index 4387993ff04..0a1530e9a0e 100644 --- a/sys/dev/ramdisk.c +++ b/sys/dev/ramdisk.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ramdisk.c,v 1.21 2003/04/19 12:59:13 krw Exp $ */ +/* $OpenBSD: ramdisk.c,v 1.22 2003/10/21 05:24:40 jmc Exp $ */ /* $NetBSD: ramdisk.c,v 1.8 1996/04/12 08:30:09 leo Exp $ */ /* @@ -33,7 +33,7 @@ */ /* - * This implements a general-puspose RAM-disk. + * This implements a general-purpose RAM-disk. * See ramdisk.h for notes on the config types. * * Note that this driver provides the same functionality @@ -75,7 +75,7 @@ * XXX: the "control" unit is (base unit + 16). * We should just use the cdev as the "control", but * that interferes with the security stuff preventing - * simulatneous use of raw and block devices. + * simultaneous use of raw and block devices. * * XXX Assumption: 16 RAM-disks are enough! */ diff --git a/sys/dev/rnd.c b/sys/dev/rnd.c index 54b692e47a8..a99dfb30c8a 100644 --- a/sys/dev/rnd.c +++ b/sys/dev/rnd.c @@ -1,4 +1,4 @@ -/* $OpenBSD: rnd.c,v 1.64 2003/09/23 16:51:12 millert Exp $ */ +/* $OpenBSD: rnd.c,v 1.65 2003/10/21 05:24:40 jmc Exp $ */ /* * rnd.c -- A strong random number generator @@ -343,7 +343,7 @@ int rnd_debug = 0x0000; * decrease the uncertainty). * * The chosen system lets the state of the pool be (essentially) the input - * modulo the generator polymnomial. Now, for random primitive polynomials, + * modulo the generator polynomial. Now, for random primitive polynomials, * this is a universal class of hash functions, meaning that the chance * of a collision is limited by the attacker's knowledge of the generator * polynomial, so if it is chosen at random, an attacker can never force diff --git a/sys/dev/systrace.c b/sys/dev/systrace.c index db645caef15..6faadffc21b 100644 --- a/sys/dev/systrace.c +++ b/sys/dev/systrace.c @@ -1,4 +1,4 @@ -/* $OpenBSD: systrace.c,v 1.33 2003/10/08 16:30:01 sturm Exp $ */ +/* $OpenBSD: systrace.c,v 1.34 2003/10/21 05:24:40 jmc Exp $ */ /* * Copyright 2002 Niels Provos <provos@citi.umich.edu> * All rights reserved. @@ -1164,8 +1164,8 @@ systrace_attach(struct fsystrace *fst, pid_t pid) * * [Note: once P_SUGID gets set in execve(), it stays * set until the process does another execve(). Hence - * this prevents a setuid process which revokes it's - * special privilidges using setuid() from being + * this prevents a setuid process which revokes its + * special privileges using setuid() from being * traced. This is good security.] */ if ((proc->p_cred->p_ruid != p->p_cred->p_ruid || |