summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorellyjones <ellyjones@chromium.org>2015-06-26 11:55:20 -0700
committerCommit bot <commit-bot@chromium.org>2015-06-26 18:55:59 +0000
commitc7a5c509074eebd6855d3222a7dd10037a25618f (patch)
tree2fb2bbbc8d81ed97880569a18664d8d85eeac441 /net
parent5405d5af71c2236b7f9d8a0c26a2d323e3a70ce0 (diff)
downloadchromium_src-c7a5c509074eebd6855d3222a7dd10037a25618f.zip
chromium_src-c7a5c509074eebd6855d3222a7dd10037a25618f.tar.gz
chromium_src-c7a5c509074eebd6855d3222a7dd10037a25618f.tar.bz2
Excise gendered pronouns from /net
Also corrects a typo in BUILD.gn. BUG= Review URL: https://codereview.chromium.org/1216673002 Cr-Commit-Position: refs/heads/master@{#336428}
Diffstat (limited to 'net')
-rw-r--r--net/BUILD.gn2
-rw-r--r--net/base/net_error_list.h8
-rw-r--r--net/http/http_stream_factory.h2
-rw-r--r--net/server/web_socket_encoder.cc2
-rw-r--r--net/socket/client_socket_pool.h2
-rw-r--r--net/tools/epoll_server/epoll_server.h4
6 files changed, 10 insertions, 10 deletions
diff --git a/net/BUILD.gn b/net/BUILD.gn
index e8a8da6..2fdc390 100644
--- a/net/BUILD.gn
+++ b/net/BUILD.gn
@@ -69,7 +69,7 @@ component("net") {
cflags = []
defines = [
- # TODO(GYP) Note that he GYP file supports linux_link_kerberos (defaults to
+ # TODO(GYP) Note that the GYP file supports linux_link_kerberos (defaults to
# 0) which implies that we run pkg_config on kerberos and link to that
# rather than setting this define which will dynamically open it. That
# doesn't seem to be set in the regular builds, so we're skipping this
diff --git a/net/base/net_error_list.h b/net/base/net_error_list.h
index f12003b..98ce2b8 100644
--- a/net/base/net_error_list.h
+++ b/net/base/net_error_list.h
@@ -354,8 +354,8 @@ NET_ERROR(ICANN_NAME_COLLISION, -166)
// The server responded with a certificate whose common name did not match
// the host name. This could mean:
//
-// 1. An attacker has redirected our traffic to his server and is
-// presenting a certificate for which he knows the private key.
+// 1. An attacker has redirected our traffic to their server and is
+// presenting a certificate for which they know the private key.
//
// 2. The server is misconfigured and responding with the wrong cert.
//
@@ -370,7 +370,7 @@ NET_ERROR(CERT_COMMON_NAME_INVALID, -200)
// The server responded with a certificate that, by our clock, appears to
// either not yet be valid or to have expired. This could mean:
//
-// 1. An attacker is presenting an old certificate for which he has
+// 1. An attacker is presenting an old certificate for which they have
// managed to obtain the private key.
//
// 2. The server is misconfigured and is not presenting a valid cert.
@@ -383,7 +383,7 @@ NET_ERROR(CERT_DATE_INVALID, -201)
// we don't trust. The could mean:
//
// 1. An attacker has substituted the real certificate for a cert that
-// contains his public key and is signed by his cousin.
+// contains their public key and is signed by their cousin.
//
// 2. The server operator has a legitimate certificate from a CA we don't
// know about, but should trust.
diff --git a/net/http/http_stream_factory.h b/net/http/http_stream_factory.h
index b53ee45..114af88 100644
--- a/net/http/http_stream_factory.h
+++ b/net/http/http_stream_factory.h
@@ -107,7 +107,7 @@ class NET_EXPORT_PRIVATE HttpStreamRequest {
// the HttpStreamRequest.
//
// For the non-tunnel case, the caller will discover the authentication
- // failure when reading response headers. At that point, he will handle the
+ // failure when reading response headers. At that point, it will handle the
// authentication failure and restart the HttpStreamRequest entirely.
//
// Ownership of |auth_controller| and |proxy_response| are owned
diff --git a/net/server/web_socket_encoder.cc b/net/server/web_socket_encoder.cc
index e35f759..1a5431a 100644
--- a/net/server/web_socket_encoder.cc
+++ b/net/server/web_socket_encoder.cc
@@ -84,7 +84,7 @@ WebSocket::ParseResult DecodeFrameHybi17(const base::StringPiece& frame,
return WebSocket::FRAME_ERROR;
}
- if (client_frame && !masked) // In Hybi-17 spec client MUST mask his frame.
+ if (client_frame && !masked) // In Hybi-17 spec client MUST mask its frame.
return WebSocket::FRAME_ERROR;
uint64 payload_length64 = second_byte & kPayloadLengthMask;
diff --git a/net/socket/client_socket_pool.h b/net/socket/client_socket_pool.h
index 6c32301..f43792d 100644
--- a/net/socket/client_socket_pool.h
+++ b/net/socket/client_socket_pool.h
@@ -89,7 +89,7 @@ class NET_EXPORT ClientSocketPool : public LowerLayeredPool {
// StreamSocket was reused, then ClientSocketPool will call
// |handle|->set_reused(true). In either case, the socket will have been
// allocated and will be connected. A client might want to know whether or
- // not the socket is reused in order to request a new socket if he encounters
+ // not the socket is reused in order to request a new socket if it encounters
// an error with the reused socket.
//
// If ERR_IO_PENDING is returned, then the callback will be used to notify the
diff --git a/net/tools/epoll_server/epoll_server.h b/net/tools/epoll_server/epoll_server.h
index 92d6555..139ae27 100644
--- a/net/tools/epoll_server/epoll_server.h
+++ b/net/tools/epoll_server/epoll_server.h
@@ -21,8 +21,8 @@
// as well as providing a per-fd-registered summary of
// events. Note that enabling this code vastly slows
// down operations, and uses substantially more
-// memory. For these reasons, it should only be enabled when doing
-// developer debugging at his/her workstation.
+// memory. For these reasons, it should only be enabled by developers doing
+// development at their workstations.
//
// A structure called 'EventRecorder' will exist when
// the macro is defined. See the EventRecorder class interface