@@ -420,7 +420,7 @@ TLSSocket.prototype._init = function(socket, wrap) {
420420
421421  // lib/net.js expect this value to be non-zero if write hasn't been flushed 
422422  // immediately 
423-   // TODO(indutny): rewise  this solution, it might be 1 before handshake and 
423+   // TODO(indutny): revise  this solution, it might be 1 before handshake and 
424424  // represent real writeQueueSize during regular writes. 
425425  ssl . writeQueueSize  =  1 ; 
426426
@@ -723,7 +723,7 @@ TLSSocket.prototype.getProtocol = function() {
723723// outcomes: 
724724// 
725725//   A) verifyError returns null meaning the client's certificate is signed 
726- //   by one of the server's CAs. The server know's  the client idenity now  
726+ //   by one of the server's CAs. The server now knows  the client's identity  
727727//   and the client is authorized. 
728728// 
729729//   B) For some reason the client's certificate is not acceptable - 
@@ -993,7 +993,7 @@ function normalizeConnectArgs(listArgs) {
993993  var  cb  =  args [ 1 ] ; 
994994
995995  // If args[0] was options, then normalize dealt with it. 
996-   // If args[0] is port, or args[0], args[1]   is host,port, we need to 
996+   // If args[0] is port, or args[0], args[1] is host,  port, we need to 
997997  // find the options and merge them in, normalize's options has only 
998998  // the host/port/path args that it knows about, not the tls options. 
999999  // This means that options.host overrides a host arg. 
0 commit comments