@@ -402,7 +402,7 @@ TLSSocket.prototype._init = function(socket, wrap) {
402402
403403 // lib/net.js expect this value to be non-zero if write hasn't been flushed
404404 // immediately
405- // TODO(indutny): rewise this solution, it might be 1 before handshake and
405+ // TODO(indutny): revise this solution, it might be 1 before handshake and
406406 // represent real writeQueueSize during regular writes.
407407 ssl . writeQueueSize = 1 ;
408408
@@ -705,7 +705,7 @@ TLSSocket.prototype.getProtocol = function() {
705705// outcomes:
706706//
707707// A) verifyError returns null meaning the client's certificate is signed
708- // by one of the server's CAs. The server know's the client idenity now
708+ // by one of the server's CAs. The server now knows the client's identity
709709// and the client is authorized.
710710//
711711// B) For some reason the client's certificate is not acceptable -
@@ -984,7 +984,7 @@ function normalizeConnectArgs(listArgs) {
984984 var cb = args [ 1 ] ;
985985
986986 // If args[0] was options, then normalize dealt with it.
987- // If args[0] is port, or args[0], args[1] is host,port, we need to
987+ // If args[0] is port, or args[0], args[1] is host, port, we need to
988988 // find the options and merge them in, normalize's options has only
989989 // the host/port/path args that it knows about, not the tls options.
990990 // This means that options.host overrides a host arg.
0 commit comments