all: single space after period.
The tree's pretty inconsistent about single space vs double space after a period in documentation. Make it consistently a single space, per earlier decisions. This means contributors won't be confused by misleading precedence. This CL doesn't use go/doc to parse. It only addresses // comments. It was generated with: $ perl -i -npe 's,^(\s*// .+[a-z]\.) +([A-Z]),$1 $2,' $(git grep -l -E '^\s*//(.+\.) +([A-Z])') $ go test go/doc -update Change-Id: Iccdb99c37c797ef1f804a94b22ba5ee4b500c4f7 Reviewed-on: https://go-review.googlesource.com/20022 Reviewed-by: Rob Pike <r@golang.org> Reviewed-by: Dave Day <djd@golang.org> Run-TryBot: Brad Fitzpatrick <bradfitz@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org>
This commit is contained in:
parent
dcbfc76400
commit
fbcc97bc82
2
conn.go
2
conn.go
@ -1073,7 +1073,7 @@ func (c *Conn) OCSPResponse() []byte {
|
||||
}
|
||||
|
||||
// VerifyHostname checks that the peer certificate chain is valid for
|
||||
// connecting to host. If so, it returns nil; if not, it returns an error
|
||||
// connecting to host. If so, it returns nil; if not, it returns an error
|
||||
// describing the problem.
|
||||
func (c *Conn) VerifyHostname(host string) error {
|
||||
c.handshakeMutex.Lock()
|
||||
|
@ -462,7 +462,7 @@ func (hs *serverHandshakeState) doFullHandshake() error {
|
||||
|
||||
// If we received a client cert in response to our certificate request message,
|
||||
// the client will send us a certificateVerifyMsg immediately after the
|
||||
// clientKeyExchangeMsg. This message is a digest of all preceding
|
||||
// clientKeyExchangeMsg. This message is a digest of all preceding
|
||||
// handshake-layer messages that is signed using the private key corresponding
|
||||
// to the client's certificate. This allows us to verify that the client is in
|
||||
// possession of the private key of the certificate.
|
||||
|
@ -69,7 +69,7 @@ func testClientHello(t *testing.T, serverConfig *Config, m handshakeMessage) {
|
||||
|
||||
func testClientHelloFailure(t *testing.T, serverConfig *Config, m handshakeMessage, expectedSubStr string) {
|
||||
// Create in-memory network connection,
|
||||
// send message to server. Should return
|
||||
// send message to server. Should return
|
||||
// expected error.
|
||||
c, s := net.Pipe()
|
||||
go func() {
|
||||
|
@ -51,7 +51,7 @@ func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certifi
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
// We don't check the version number in the premaster secret. For one,
|
||||
// We don't check the version number in the premaster secret. For one,
|
||||
// by checking it, we would leak information about the validity of the
|
||||
// encrypted pre-master secret. Secondly, it provides only a small
|
||||
// benefit against a downgrade attack and some implementations send the
|
||||
|
@ -199,7 +199,7 @@ func TestDialTimeout(t *testing.T) {
|
||||
func TestConnReadNonzeroAndEOF(t *testing.T) {
|
||||
// This test is racy: it assumes that after a write to a
|
||||
// localhost TCP connection, the peer TCP connection can
|
||||
// immediately read it. Because it's racy, we skip this test
|
||||
// immediately read it. Because it's racy, we skip this test
|
||||
// in short mode, and then retry it several times with an
|
||||
// increasing sleep in between our final write (via srv.Close
|
||||
// below) and the following read.
|
||||
|
Loading…
Reference in New Issue
Block a user