diff options
-rw-r--r-- | contrib/libpcap/pcap-snoop.c | 2 | ||||
-rw-r--r-- | sys/contrib/ipfilter/netinet/ip_auth.c | 2 | ||||
-rw-r--r-- | sys/netinet/libalias/alias_skinny.c | 2 |
3 files changed, 3 insertions, 3 deletions
diff --git a/contrib/libpcap/pcap-snoop.c b/contrib/libpcap/pcap-snoop.c index 330e01d..e9de318 100644 --- a/contrib/libpcap/pcap-snoop.c +++ b/contrib/libpcap/pcap-snoop.c @@ -100,7 +100,7 @@ again: /* * XXX - Sigh, snoop_packetlen is a 16 bit quantity. If we - * got a short length, but read a full sized snoop pakcet, + * got a short length, but read a full sized snoop packet, * assume we overflowed and add back the 64K... */ if (cc == (p->snapshot + sizeof(struct snoopheader)) && diff --git a/sys/contrib/ipfilter/netinet/ip_auth.c b/sys/contrib/ipfilter/netinet/ip_auth.c index 42d29d4..2957845 100644 --- a/sys/contrib/ipfilter/netinet/ip_auth.c +++ b/sys/contrib/ipfilter/netinet/ip_auth.c @@ -712,7 +712,7 @@ int fr_authflush() /* ------------------------------------------------------------------------ */ /* Function: fr_auth_waiting */ -/* Returns: int - 0 = no pakcets wiating, 1 = packets waiting. */ +/* Returns: int - 0 = no packets waiting, 1 = packets waiting. */ /* Parameters: None */ /* */ /* Simple truth check to see if there are any packets waiting in the auth */ diff --git a/sys/netinet/libalias/alias_skinny.c b/sys/netinet/libalias/alias_skinny.c index 12be97a..011dda5 100644 --- a/sys/netinet/libalias/alias_skinny.c +++ b/sys/netinet/libalias/alias_skinny.c @@ -340,7 +340,7 @@ AliasHandleSkinny(struct libalias *la, struct ip *pip, struct alias_link *lnk) * through the packet using len to determine message boundaries. * This comes into play big time with port messages being in the * same packet as register messages. Also, open receive channel - * acks are usually buried in a pakcet some 400 bytes long. + * acks are usually buried in a packet some 400 bytes long. */ while (dlen >= skinny_hdr_len) { len = (sd->len); |