diff options
author | ellyjones <ellyjones@chromium.org> | 2015-06-26 11:55:20 -0700 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2015-06-26 18:55:59 +0000 |
commit | c7a5c509074eebd6855d3222a7dd10037a25618f (patch) | |
tree | 2fb2bbbc8d81ed97880569a18664d8d85eeac441 | |
parent | 5405d5af71c2236b7f9d8a0c26a2d323e3a70ce0 (diff) | |
download | chromium_src-c7a5c509074eebd6855d3222a7dd10037a25618f.zip chromium_src-c7a5c509074eebd6855d3222a7dd10037a25618f.tar.gz chromium_src-c7a5c509074eebd6855d3222a7dd10037a25618f.tar.bz2 |
Excise gendered pronouns from /net
Also corrects a typo in BUILD.gn.
BUG=
Review URL: https://codereview.chromium.org/1216673002
Cr-Commit-Position: refs/heads/master@{#336428}
-rw-r--r-- | net/BUILD.gn | 2 | ||||
-rw-r--r-- | net/base/net_error_list.h | 8 | ||||
-rw-r--r-- | net/http/http_stream_factory.h | 2 | ||||
-rw-r--r-- | net/server/web_socket_encoder.cc | 2 | ||||
-rw-r--r-- | net/socket/client_socket_pool.h | 2 | ||||
-rw-r--r-- | net/tools/epoll_server/epoll_server.h | 4 |
6 files changed, 10 insertions, 10 deletions
diff --git a/net/BUILD.gn b/net/BUILD.gn index e8a8da6..2fdc390 100644 --- a/net/BUILD.gn +++ b/net/BUILD.gn @@ -69,7 +69,7 @@ component("net") { cflags = [] defines = [ - # TODO(GYP) Note that he GYP file supports linux_link_kerberos (defaults to + # TODO(GYP) Note that the GYP file supports linux_link_kerberos (defaults to # 0) which implies that we run pkg_config on kerberos and link to that # rather than setting this define which will dynamically open it. That # doesn't seem to be set in the regular builds, so we're skipping this diff --git a/net/base/net_error_list.h b/net/base/net_error_list.h index f12003b..98ce2b8 100644 --- a/net/base/net_error_list.h +++ b/net/base/net_error_list.h @@ -354,8 +354,8 @@ NET_ERROR(ICANN_NAME_COLLISION, -166) // The server responded with a certificate whose common name did not match // the host name. This could mean: // -// 1. An attacker has redirected our traffic to his server and is -// presenting a certificate for which he knows the private key. +// 1. An attacker has redirected our traffic to their server and is +// presenting a certificate for which they know the private key. // // 2. The server is misconfigured and responding with the wrong cert. // @@ -370,7 +370,7 @@ NET_ERROR(CERT_COMMON_NAME_INVALID, -200) // The server responded with a certificate that, by our clock, appears to // either not yet be valid or to have expired. This could mean: // -// 1. An attacker is presenting an old certificate for which he has +// 1. An attacker is presenting an old certificate for which they have // managed to obtain the private key. // // 2. The server is misconfigured and is not presenting a valid cert. @@ -383,7 +383,7 @@ NET_ERROR(CERT_DATE_INVALID, -201) // we don't trust. The could mean: // // 1. An attacker has substituted the real certificate for a cert that -// contains his public key and is signed by his cousin. +// contains their public key and is signed by their cousin. // // 2. The server operator has a legitimate certificate from a CA we don't // know about, but should trust. diff --git a/net/http/http_stream_factory.h b/net/http/http_stream_factory.h index b53ee45..114af88 100644 --- a/net/http/http_stream_factory.h +++ b/net/http/http_stream_factory.h @@ -107,7 +107,7 @@ class NET_EXPORT_PRIVATE HttpStreamRequest { // the HttpStreamRequest. // // For the non-tunnel case, the caller will discover the authentication - // failure when reading response headers. At that point, he will handle the + // failure when reading response headers. At that point, it will handle the // authentication failure and restart the HttpStreamRequest entirely. // // Ownership of |auth_controller| and |proxy_response| are owned diff --git a/net/server/web_socket_encoder.cc b/net/server/web_socket_encoder.cc index e35f759..1a5431a 100644 --- a/net/server/web_socket_encoder.cc +++ b/net/server/web_socket_encoder.cc @@ -84,7 +84,7 @@ WebSocket::ParseResult DecodeFrameHybi17(const base::StringPiece& frame, return WebSocket::FRAME_ERROR; } - if (client_frame && !masked) // In Hybi-17 spec client MUST mask his frame. + if (client_frame && !masked) // In Hybi-17 spec client MUST mask its frame. return WebSocket::FRAME_ERROR; uint64 payload_length64 = second_byte & kPayloadLengthMask; diff --git a/net/socket/client_socket_pool.h b/net/socket/client_socket_pool.h index 6c32301..f43792d 100644 --- a/net/socket/client_socket_pool.h +++ b/net/socket/client_socket_pool.h @@ -89,7 +89,7 @@ class NET_EXPORT ClientSocketPool : public LowerLayeredPool { // StreamSocket was reused, then ClientSocketPool will call // |handle|->set_reused(true). In either case, the socket will have been // allocated and will be connected. A client might want to know whether or - // not the socket is reused in order to request a new socket if he encounters + // not the socket is reused in order to request a new socket if it encounters // an error with the reused socket. // // If ERR_IO_PENDING is returned, then the callback will be used to notify the diff --git a/net/tools/epoll_server/epoll_server.h b/net/tools/epoll_server/epoll_server.h index 92d6555..139ae27 100644 --- a/net/tools/epoll_server/epoll_server.h +++ b/net/tools/epoll_server/epoll_server.h @@ -21,8 +21,8 @@ // as well as providing a per-fd-registered summary of // events. Note that enabling this code vastly slows // down operations, and uses substantially more -// memory. For these reasons, it should only be enabled when doing -// developer debugging at his/her workstation. +// memory. For these reasons, it should only be enabled by developers doing +// development at their workstations. // // A structure called 'EventRecorder' will exist when // the macro is defined. See the EventRecorder class interface |