@@ -420,7 +420,7 @@ TLSSocket.prototype._init = function(socket, wrap) {
420
420
421
421
// lib/net.js expect this value to be non-zero if write hasn't been flushed
422
422
// immediately
423
- // TODO(indutny): rewise this solution, it might be 1 before handshake and
423
+ // TODO(indutny): revise this solution, it might be 1 before handshake and
424
424
// represent real writeQueueSize during regular writes.
425
425
ssl . writeQueueSize = 1 ;
426
426
@@ -723,7 +723,7 @@ TLSSocket.prototype.getProtocol = function() {
723
723
// outcomes:
724
724
//
725
725
// A) verifyError returns null meaning the client's certificate is signed
726
- // by one of the server's CAs. The server know's the client idenity now
726
+ // by one of the server's CAs. The server now knows the client's identity
727
727
// and the client is authorized.
728
728
//
729
729
// B) For some reason the client's certificate is not acceptable -
@@ -993,7 +993,7 @@ function normalizeConnectArgs(listArgs) {
993
993
var cb = args [ 1 ] ;
994
994
995
995
// If args[0] was options, then normalize dealt with it.
996
- // If args[0] is port, or args[0], args[1] is host,port, we need to
996
+ // If args[0] is port, or args[0], args[1] is host, port, we need to
997
997
// find the options and merge them in, normalize's options has only
998
998
// the host/port/path args that it knows about, not the tls options.
999
999
// This means that options.host overrides a host arg.
0 commit comments