all: single space after period.

The tree's pretty inconsistent about single space vs double space
after a period in documentation. Make it consistently a single space,
per earlier decisions. This means contributors won't be confused by
misleading precedence.

This CL doesn't use go/doc to parse. It only addresses // comments.
It was generated with:

$ perl -i -npe 's,^(\s*// .+[a-z]\.)  +([A-Z]),$1 $2,' $(git grep -l -E '^\s*//(.+\.)  +([A-Z])')
$ go test go/doc -update

Change-Id: Iccdb99c37c797ef1f804a94b22ba5ee4b500c4f7
Reviewed-on: https://go-review.googlesource.com/20022
Reviewed-by: Rob Pike <r@golang.org>
Reviewed-by: Dave Day <djd@golang.org>
Run-TryBot: Brad Fitzpatrick <bradfitz@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
This commit is contained in:
Brad Fitzpatrick 2016-03-01 23:21:55 +00:00
parent 7cd572f22a
commit 4876af71fc
5 changed files with 5 additions and 5 deletions

View file

@ -1073,7 +1073,7 @@ func (c *Conn) OCSPResponse() []byte {
} }
// VerifyHostname checks that the peer certificate chain is valid for // VerifyHostname checks that the peer certificate chain is valid for
// connecting to host. If so, it returns nil; if not, it returns an error // connecting to host. If so, it returns nil; if not, it returns an error
// describing the problem. // describing the problem.
func (c *Conn) VerifyHostname(host string) error { func (c *Conn) VerifyHostname(host string) error {
c.handshakeMutex.Lock() c.handshakeMutex.Lock()

View file

@ -462,7 +462,7 @@ func (hs *serverHandshakeState) doFullHandshake() error {
// If we received a client cert in response to our certificate request message, // If we received a client cert in response to our certificate request message,
// the client will send us a certificateVerifyMsg immediately after the // the client will send us a certificateVerifyMsg immediately after the
// clientKeyExchangeMsg. This message is a digest of all preceding // clientKeyExchangeMsg. This message is a digest of all preceding
// handshake-layer messages that is signed using the private key corresponding // handshake-layer messages that is signed using the private key corresponding
// to the client's certificate. This allows us to verify that the client is in // to the client's certificate. This allows us to verify that the client is in
// possession of the private key of the certificate. // possession of the private key of the certificate.

View file

@ -69,7 +69,7 @@ func testClientHello(t *testing.T, serverConfig *Config, m handshakeMessage) {
func testClientHelloFailure(t *testing.T, serverConfig *Config, m handshakeMessage, expectedSubStr string) { func testClientHelloFailure(t *testing.T, serverConfig *Config, m handshakeMessage, expectedSubStr string) {
// Create in-memory network connection, // Create in-memory network connection,
// send message to server. Should return // send message to server. Should return
// expected error. // expected error.
c, s := net.Pipe() c, s := net.Pipe()
go func() { go func() {

View file

@ -51,7 +51,7 @@ func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certifi
if err != nil { if err != nil {
return nil, err return nil, err
} }
// We don't check the version number in the premaster secret. For one, // We don't check the version number in the premaster secret. For one,
// by checking it, we would leak information about the validity of the // by checking it, we would leak information about the validity of the
// encrypted pre-master secret. Secondly, it provides only a small // encrypted pre-master secret. Secondly, it provides only a small
// benefit against a downgrade attack and some implementations send the // benefit against a downgrade attack and some implementations send the

View file

@ -199,7 +199,7 @@ func TestDialTimeout(t *testing.T) {
func TestConnReadNonzeroAndEOF(t *testing.T) { func TestConnReadNonzeroAndEOF(t *testing.T) {
// This test is racy: it assumes that after a write to a // This test is racy: it assumes that after a write to a
// localhost TCP connection, the peer TCP connection can // localhost TCP connection, the peer TCP connection can
// immediately read it. Because it's racy, we skip this test // immediately read it. Because it's racy, we skip this test
// in short mode, and then retry it several times with an // in short mode, and then retry it several times with an
// increasing sleep in between our final write (via srv.Close // increasing sleep in between our final write (via srv.Close
// below) and the following read. // below) and the following read.