diff options
author | Denys Vlasenko <vda.linux@googlemail.com> | 2017-04-17 16:13:32 +0200 |
---|---|---|
committer | Denys Vlasenko <vda.linux@googlemail.com> | 2017-04-17 16:13:32 +0200 |
commit | 10ad622dc2a9fb6563fab13719ead8baf15ff9e4 (patch) | |
tree | 82312d6f38a517dcc7c0004f78d76c667f5a674b /networking/nc_bloaty.c | |
parent | d85352b4ff51694cb35b429e4cef53302c9e7076 (diff) | |
download | busybox-w32-10ad622dc2a9fb6563fab13719ead8baf15ff9e4.tar.gz busybox-w32-10ad622dc2a9fb6563fab13719ead8baf15ff9e4.tar.bz2 busybox-w32-10ad622dc2a9fb6563fab13719ead8baf15ff9e4.zip |
Spelling fixes in comments, documentation, tests and examples
By klemens <ka7@github.com>
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'networking/nc_bloaty.c')
-rw-r--r-- | networking/nc_bloaty.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/networking/nc_bloaty.c b/networking/nc_bloaty.c index f8c375362..3db784982 100644 --- a/networking/nc_bloaty.c +++ b/networking/nc_bloaty.c | |||
@@ -459,7 +459,7 @@ create new one, and bind() it. TODO */ | |||
459 | so I don't feel bad. | 459 | so I don't feel bad. |
460 | The *real* question is why BFD sockets wasn't designed to allow listens for | 460 | The *real* question is why BFD sockets wasn't designed to allow listens for |
461 | connections *from* specific hosts/ports, instead of requiring the caller to | 461 | connections *from* specific hosts/ports, instead of requiring the caller to |
462 | accept the connection and then reject undesireable ones by closing. | 462 | accept the connection and then reject undesirable ones by closing. |
463 | In other words, we need a TCP MSG_PEEK. */ | 463 | In other words, we need a TCP MSG_PEEK. */ |
464 | /* bbox: removed most of it */ | 464 | /* bbox: removed most of it */ |
465 | lcladdr = xmalloc_sockaddr2dotted(&ouraddr->u.sa); | 465 | lcladdr = xmalloc_sockaddr2dotted(&ouraddr->u.sa); |
@@ -502,7 +502,7 @@ static int udptest(void) | |||
502 | /* use the tcp-ping trick: try connecting to a normally refused port, which | 502 | /* use the tcp-ping trick: try connecting to a normally refused port, which |
503 | causes us to block for the time that SYN gets there and RST gets back. | 503 | causes us to block for the time that SYN gets there and RST gets back. |
504 | Not completely reliable, but it *does* mostly work. */ | 504 | Not completely reliable, but it *does* mostly work. */ |
505 | /* Set a temporary connect timeout, so packet filtration doesnt cause | 505 | /* Set a temporary connect timeout, so packet filtration doesn't cause |
506 | us to hang forever, and hit it */ | 506 | us to hang forever, and hit it */ |
507 | o_wait = 5; /* enough that we'll notice?? */ | 507 | o_wait = 5; /* enough that we'll notice?? */ |
508 | rr = xsocket(ouraddr->u.sa.sa_family, SOCK_STREAM, 0); | 508 | rr = xsocket(ouraddr->u.sa.sa_family, SOCK_STREAM, 0); |