@@ -402,7 +402,7 @@ TLSSocket.prototype._init = function(socket, wrap) {
402
402
403
403
// lib/net.js expect this value to be non-zero if write hasn't been flushed
404
404
// immediately
405
- // TODO(indutny): rewise this solution, it might be 1 before handshake and
405
+ // TODO(indutny): revise this solution, it might be 1 before handshake and
406
406
// represent real writeQueueSize during regular writes.
407
407
ssl . writeQueueSize = 1 ;
408
408
@@ -705,7 +705,7 @@ TLSSocket.prototype.getProtocol = function() {
705
705
// outcomes:
706
706
//
707
707
// A) verifyError returns null meaning the client's certificate is signed
708
- // by one of the server's CAs. The server know's the client idenity now
708
+ // by one of the server's CAs. The server now knows the client's identity
709
709
// and the client is authorized.
710
710
//
711
711
// B) For some reason the client's certificate is not acceptable -
@@ -984,7 +984,7 @@ function normalizeConnectArgs(listArgs) {
984
984
var cb = args [ 1 ] ;
985
985
986
986
// If args[0] was options, then normalize dealt with it.
987
- // If args[0] is port, or args[0], args[1] is host,port, we need to
987
+ // If args[0] is port, or args[0], args[1] is host, port, we need to
988
988
// find the options and merge them in, normalize's options has only
989
989
// the host/port/path args that it knows about, not the tls options.
990
990
// This means that options.host overrides a host arg.
0 commit comments