aboutsummaryrefslogtreecommitdiff
path: root/networking/nc_bloaty.c
diff options
context:
space:
mode:
authorDenys Vlasenko <vda.linux@googlemail.com>2017-04-17 16:13:32 +0200
committerDenys Vlasenko <vda.linux@googlemail.com>2017-04-17 16:13:32 +0200
commit10ad622dc2a9fb6563fab13719ead8baf15ff9e4 (patch)
tree82312d6f38a517dcc7c0004f78d76c667f5a674b /networking/nc_bloaty.c
parentd85352b4ff51694cb35b429e4cef53302c9e7076 (diff)
downloadbusybox-w32-10ad622dc2a9fb6563fab13719ead8baf15ff9e4.tar.gz
busybox-w32-10ad622dc2a9fb6563fab13719ead8baf15ff9e4.tar.bz2
busybox-w32-10ad622dc2a9fb6563fab13719ead8baf15ff9e4.zip
Spelling fixes in comments, documentation, tests and examples
By klemens <ka7@github.com> Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'networking/nc_bloaty.c')
-rw-r--r--networking/nc_bloaty.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/networking/nc_bloaty.c b/networking/nc_bloaty.c
index f8c375362..3db784982 100644
--- a/networking/nc_bloaty.c
+++ b/networking/nc_bloaty.c
@@ -459,7 +459,7 @@ create new one, and bind() it. TODO */
459 so I don't feel bad. 459 so I don't feel bad.
460 The *real* question is why BFD sockets wasn't designed to allow listens for 460 The *real* question is why BFD sockets wasn't designed to allow listens for
461 connections *from* specific hosts/ports, instead of requiring the caller to 461 connections *from* specific hosts/ports, instead of requiring the caller to
462 accept the connection and then reject undesireable ones by closing. 462 accept the connection and then reject undesirable ones by closing.
463 In other words, we need a TCP MSG_PEEK. */ 463 In other words, we need a TCP MSG_PEEK. */
464 /* bbox: removed most of it */ 464 /* bbox: removed most of it */
465 lcladdr = xmalloc_sockaddr2dotted(&ouraddr->u.sa); 465 lcladdr = xmalloc_sockaddr2dotted(&ouraddr->u.sa);
@@ -502,7 +502,7 @@ static int udptest(void)
502 /* use the tcp-ping trick: try connecting to a normally refused port, which 502 /* use the tcp-ping trick: try connecting to a normally refused port, which
503 causes us to block for the time that SYN gets there and RST gets back. 503 causes us to block for the time that SYN gets there and RST gets back.
504 Not completely reliable, but it *does* mostly work. */ 504 Not completely reliable, but it *does* mostly work. */
505 /* Set a temporary connect timeout, so packet filtration doesnt cause 505 /* Set a temporary connect timeout, so packet filtration doesn't cause
506 us to hang forever, and hit it */ 506 us to hang forever, and hit it */
507 o_wait = 5; /* enough that we'll notice?? */ 507 o_wait = 5; /* enough that we'll notice?? */
508 rr = xsocket(ouraddr->u.sa.sa_family, SOCK_STREAM, 0); 508 rr = xsocket(ouraddr->u.sa.sa_family, SOCK_STREAM, 0);