diff --git a/crypto/dist/kame/racoon/handler.h b/crypto/dist/kame/racoon/handler.h index e1c282fd78c1..5b2c7fca7308 100644 --- a/crypto/dist/kame/racoon/handler.h +++ b/crypto/dist/kame/racoon/handler.h @@ -90,7 +90,7 @@ * phase 1 handler I R R I * phase 2 handler I R R I * getspi msg R I I R - * aquire msg I R + * acquire msg I R * ID payload I R I R */ struct ph1handle { diff --git a/dist/dhcp/includes/dhcpd.h b/dist/dhcp/includes/dhcpd.h index d9d8e01c63fd..0f8fe25daf6f 100644 --- a/dist/dhcp/includes/dhcpd.h +++ b/dist/dhcp/includes/dhcpd.h @@ -648,7 +648,7 @@ struct client_lease { struct auth_key *key; /* Key used in basic DHCP authentication. */ unsigned int is_static : 1; /* If set, lease is from config file. */ - unsigned int is_bootp: 1; /* If set, lease was aquired with BOOTP. */ + unsigned int is_bootp: 1; /* If set, lease was acquired with BOOTP. */ struct option_state *options; /* Options supplied with lease. */ }; diff --git a/gnu/libexec/uucp/uucico/uucico.c b/gnu/libexec/uucp/uucico/uucico.c index f63355fe9a28..addfeafe0e85 100644 --- a/gnu/libexec/uucp/uucico/uucico.c +++ b/gnu/libexec/uucp/uucico/uucico.c @@ -26,7 +26,7 @@ #include "uucp.h" #if USE_RCS_ID -const char uucico_rcsid[] = "$Id: uucico.c,v 1.3 1995/08/24 05:23:12 jtc Exp $"; +const char uucico_rcsid[] = "$Id: uucico.c,v 1.4 2002/07/10 23:16:33 wiz Exp $"; #endif #include @@ -995,7 +995,7 @@ fcall (puuconf, zconfig, fuuxqt, qorigsys, qport, fifwork, fforce, fdetach, if (fcalled && ! ftrynext) return FALSE; - /* Now we have to dump that port so that we can aquire a new + /* Now we have to dump that port so that we can acquire a new one. On Unix this means that we will fork and get a new process ID, so we must unlock and relock the system. */ if (fdetach) diff --git a/share/man/tools/newsp.errs b/share/man/tools/newsp.errs index 2fa0ad33c457..de27c2881ef0 100644 --- a/share/man/tools/newsp.errs +++ b/share/man/tools/newsp.errs @@ -306,6 +306,7 @@ alloc alt analyis annoation +aquire arg arg1 arg1,arg2 diff --git a/sys/miscfs/specfs/spec_vnops.c b/sys/miscfs/specfs/spec_vnops.c index 43d6a4aa1ca0..8e944c95c387 100644 --- a/sys/miscfs/specfs/spec_vnops.c +++ b/sys/miscfs/specfs/spec_vnops.c @@ -1,4 +1,4 @@ -/* $NetBSD: spec_vnops.c,v 1.61 2002/05/12 20:42:03 matt Exp $ */ +/* $NetBSD: spec_vnops.c,v 1.62 2002/07/10 23:16:33 wiz Exp $ */ /* * Copyright (c) 1989, 1993 @@ -36,7 +36,7 @@ */ #include -__KERNEL_RCSID(0, "$NetBSD: spec_vnops.c,v 1.61 2002/05/12 20:42:03 matt Exp $"); +__KERNEL_RCSID(0, "$NetBSD: spec_vnops.c,v 1.62 2002/07/10 23:16:33 wiz Exp $"); #include #include @@ -649,7 +649,7 @@ spec_close(v) flags1 |= FNONBLOCK; /* - * If we're able to block, release the vnode lock & reaquire. We + * If we're able to block, release the vnode lock & reacquire. We * might end up sleaping for someone else who wants our queues. They * won't get them if we hold the vnode locked. Also, if VXLOCK is set, * don't release the lock as we won't be able to regain it. diff --git a/usr.bin/at/privs.h b/usr.bin/at/privs.h index b4dd64d0b9ea..81ea1548d341 100644 --- a/usr.bin/at/privs.h +++ b/usr.bin/at/privs.h @@ -1,4 +1,4 @@ -/* $NetBSD: privs.h,v 1.4 1998/06/27 21:15:08 christos Exp $ */ +/* $NetBSD: privs.h,v 1.5 2002/07/10 23:16:34 wiz Exp $ */ /* * privs.h - header for privileged operations @@ -53,7 +53,7 @@ * It is NOT safe to call exec(), system() or popen() with a user- * supplied program (i.e. without carefully checking PATH and any * library load paths) with relinquished privileges; the called program - * can aquire them just as easily. Set both effective and real userid + * can acquire them just as easily. Set both effective and real userid * to the real userid before calling any of them. */ diff --git a/usr.sbin/rpc.lockd/lockd_lock.c b/usr.sbin/rpc.lockd/lockd_lock.c index 6be9940edcbc..5c74e20cafba 100644 --- a/usr.sbin/rpc.lockd/lockd_lock.c +++ b/usr.sbin/rpc.lockd/lockd_lock.c @@ -1,4 +1,4 @@ -/* $NetBSD: lockd_lock.c,v 1.8 2001/10/23 19:54:53 oster Exp $ */ +/* $NetBSD: lockd_lock.c,v 1.9 2002/07/10 23:16:34 wiz Exp $ */ /* * Copyright (c) 2000 Manuel Bouyer. @@ -73,7 +73,7 @@ struct file_lock { /* lock status */ #define LKST_LOCKED 1 /* lock is locked */ #define LKST_WAITING 2 /* file is already locked by another host */ -#define LKST_PROCESSING 3 /* child is trying to aquire the lock */ +#define LKST_PROCESSING 3 /* child is trying to acquire the lock */ #define LKST_DYING 4 /* must dies when we get news from the child */ void lfree __P((struct file_lock *)); @@ -134,7 +134,7 @@ testlock(lock, flags) } /* - * getlock: try to aquire the lock. + * getlock: try to acquire the lock. * If file is already locked and we can sleep, put the lock in the list with * status LKST_WAITING; it'll be processed later. * Otherwise try to lock. If we're allowed to block, fork a child which @@ -406,7 +406,7 @@ sigchild_handler(sig) /* * - * try to aquire the lock described by fl. Eventually fock a child to do a + * try to acquire the lock described by fl. Eventually fork a child to do a * blocking lock if allowed and required. */