Fix some typos
This commit is contained in:
parent
5fb938d6d6
commit
f748137bde
|
@ -157,7 +157,7 @@ func CmdAction(c *cli.Context) error {
|
|||
}
|
||||
}()
|
||||
|
||||
// Block until the the Proxy is online, retreive its address, and change the url to point to it.
|
||||
// Block until the Proxy is online, retreive its address, and change the url to point to it.
|
||||
// This is effectively "handing over" control to the tunnel package so it can run the tunnel daemon.
|
||||
c.Set("url", "https://"+(<-listenerC).Addr().String())
|
||||
|
||||
|
|
|
@ -263,7 +263,7 @@ HTMLAttrToAdd.setAttribute("lang", "en");
|
|||
|
||||
<h4 id="secondflawthejudicialrolewaslimited">Second Flaw: The Judicial Role was Limited</h4>
|
||||
|
||||
<p>Not only did British courts share the power to address patent rights historically, the part shared by the the courts was significantly limited. Historically, the common-law and chancery courts only received a partial delegation of the Privy Council’s authority to invalidate patents. Courts only had the authority to invalidate patents for issues related to things like inequitable conduct (e.g., making false statements in the original patent application). The limited authority delegated to the England Courts did not include the authority to seek claim <em>cancellation</em> based on elements intrinsic to the patent or patent application, like lack of novelty or obviousness as done under an IPR proceeding. Rather, such authority remained with the Privy Council, a non-court authority, which decided questions like whether the invention was really new. Thus, like the PTAB, the Privy Council was a non-judicial body charged with responsibility to assess patent validity based on criteria that included the novelty of the invention.</p>
|
||||
<p>Not only did British courts share the power to address patent rights historically, the part shared by the courts was significantly limited. Historically, the common-law and chancery courts only received a partial delegation of the Privy Council’s authority to invalidate patents. Courts only had the authority to invalidate patents for issues related to things like inequitable conduct (e.g., making false statements in the original patent application). The limited authority delegated to the England Courts did not include the authority to seek claim <em>cancellation</em> based on elements intrinsic to the patent or patent application, like lack of novelty or obviousness as done under an IPR proceeding. Rather, such authority remained with the Privy Council, a non-court authority, which decided questions like whether the invention was really new. Thus, like the PTAB, the Privy Council was a non-judicial body charged with responsibility to assess patent validity based on criteria that included the novelty of the invention.</p>
|
||||
|
||||
<p>We think these arguments are compelling and provide very strong reasons why the Supreme Court should resist the request that such matters be resolved exclusively in federal courts. We hope that’s the position they do take because the real world implications are significant. </p>
|
||||
|
||||
|
|
|
@ -80,7 +80,7 @@ func (b *BackoffHandler) Backoff(ctx context.Context) bool {
|
|||
}
|
||||
}
|
||||
|
||||
// Sets a grace period within which the the backoff timer is maintained. After the grace
|
||||
// Sets a grace period within which the backoff timer is maintained. After the grace
|
||||
// period expires, the number of retries & backoff duration is reset.
|
||||
func (b *BackoffHandler) SetGracePeriod() {
|
||||
b.resetDeadline = timeNow().Add(time.Duration(b.GetBaseTime() * 2 << b.retries))
|
||||
|
|
|
@ -134,7 +134,7 @@ func Header(t *testing.T, tc Case, resp *dns.Msg) bool {
|
|||
return true
|
||||
}
|
||||
|
||||
// Section tests if the the section in tc matches rr.
|
||||
// Section tests if the section in tc matches rr.
|
||||
func Section(t *testing.T, tc Case, sec sect, rr []dns.RR) bool {
|
||||
section := []dns.RR{}
|
||||
switch sec {
|
||||
|
|
|
@ -228,7 +228,7 @@ types similar to the standard %v format specifier.
|
|||
|
||||
The custom formatter only responds to the %v (most compact), %+v (adds pointer
|
||||
addresses), %#v (adds types), and %#+v (adds types and pointer addresses) verb
|
||||
combinations. Any other verbs such as %x and %q will be sent to the the
|
||||
combinations. Any other verbs such as %x and %q will be sent to the
|
||||
standard fmt package for formatting. In addition, the custom formatter ignores
|
||||
the width and precision arguments (however they will still work on the format
|
||||
specifiers not handled by the custom formatter).
|
||||
|
|
|
@ -165,7 +165,7 @@ standard %v format specifier.
|
|||
|
||||
The custom formatter only responds to the %v (most compact), %+v (adds pointer
|
||||
addresses), %#v (adds types), or %#+v (adds types and pointer addresses) verb
|
||||
combinations. Any other verbs such as %x and %q will be sent to the the
|
||||
combinations. Any other verbs such as %x and %q will be sent to the
|
||||
standard fmt package for formatting. In addition, the custom formatter ignores
|
||||
the width and precision arguments (however they will still work on the format
|
||||
specifiers not handled by the custom formatter).
|
||||
|
|
|
@ -405,7 +405,7 @@ types similar to the standard %v format specifier.
|
|||
|
||||
The custom formatter only responds to the %v (most compact), %+v (adds pointer
|
||||
addresses), %#v (adds types), or %#+v (adds types and pointer addresses) verb
|
||||
combinations. Any other verbs such as %x and %q will be sent to the the
|
||||
combinations. Any other verbs such as %x and %q will be sent to the
|
||||
standard fmt package for formatting. In addition, the custom formatter ignores
|
||||
the width and precision arguments (however they will still work on the format
|
||||
specifiers not handled by the custom formatter).
|
||||
|
|
|
@ -88,7 +88,7 @@ type Response struct {
|
|||
// Version of the release that will be updated to if applied.
|
||||
ReleaseVersion string
|
||||
|
||||
// Title of the the release
|
||||
// Title of the release
|
||||
ReleaseTitle string
|
||||
|
||||
// Additional details about the release
|
||||
|
|
|
@ -31,7 +31,7 @@ func (w *Watcher) Add(name string) error {
|
|||
return nil
|
||||
}
|
||||
|
||||
// Remove stops watching the the named file or directory (non-recursively).
|
||||
// Remove stops watching the named file or directory (non-recursively).
|
||||
func (w *Watcher) Remove(name string) error {
|
||||
return nil
|
||||
}
|
||||
|
|
|
@ -99,7 +99,7 @@ func (w *Watcher) Add(name string) error {
|
|||
return err
|
||||
}
|
||||
|
||||
// Remove stops watching the the named file or directory (non-recursively).
|
||||
// Remove stops watching the named file or directory (non-recursively).
|
||||
func (w *Watcher) Remove(name string) error {
|
||||
name = filepath.Clean(name)
|
||||
w.mu.Lock()
|
||||
|
|
|
@ -81,7 +81,7 @@ func (w *Watcher) Add(name string) error {
|
|||
return <-in.reply
|
||||
}
|
||||
|
||||
// Remove stops watching the the named file or directory (non-recursively).
|
||||
// Remove stops watching the named file or directory (non-recursively).
|
||||
func (w *Watcher) Remove(name string) error {
|
||||
in := &input{
|
||||
op: opRemoveWatch,
|
||||
|
|
|
@ -127,7 +127,7 @@ func copyRouteRegexp(r *routeRegexp) *routeRegexp {
|
|||
// Match attempts to match the given request against the router's registered routes.
|
||||
//
|
||||
// If the request matches a route of this router or one of its subrouters the Route,
|
||||
// Handler, and Vars fields of the the match argument are filled and this function
|
||||
// Handler, and Vars fields of the match argument are filled and this function
|
||||
// returns true.
|
||||
//
|
||||
// If the request does not match any of this router's or its subrouters' routes
|
||||
|
|
|
@ -82277,7 +82277,7 @@ SQLITE_API sqlite3 *sqlite3_context_db_handle(sqlite3_context *p){
|
|||
|
||||
/*
|
||||
** If this routine is invoked from within an xColumn method of a virtual
|
||||
** table, then it returns true if and only if the the call is during an
|
||||
** table, then it returns true if and only if the call is during an
|
||||
** UPDATE operation and the value of the column will not be modified
|
||||
** by the UPDATE.
|
||||
**
|
||||
|
@ -103682,7 +103682,7 @@ static void renameColumnParseError(
|
|||
}
|
||||
|
||||
/*
|
||||
** For each name in the the expression-list pEList (i.e. each
|
||||
** For each name in the expression-list pEList (i.e. each
|
||||
** pEList->a[i].zName) that matches the string in zOld, extract the
|
||||
** corresponding rename-token from Parse object pParse and add it
|
||||
** to the RenameCtx pCtx.
|
||||
|
@ -103705,7 +103705,7 @@ static void renameColumnElistNames(
|
|||
}
|
||||
|
||||
/*
|
||||
** For each name in the the id-list pIdList (i.e. each pIdList->a[i].zName)
|
||||
** For each name in the id-list pIdList (i.e. each pIdList->a[i].zName)
|
||||
** that matches the string in zOld, extract the corresponding rename-token
|
||||
** from Parse object pParse and add it to the RenameCtx pCtx.
|
||||
*/
|
||||
|
@ -148744,7 +148744,7 @@ SQLITE_PRIVATE void sqlite3WindowCodeStep(
|
|||
/*
|
||||
** In the amalgamation, the parse.c file generated by lemon and the
|
||||
** tokenize.c file are concatenated. In that case, sqlite3RunParser()
|
||||
** has access to the the size of the yyParser object and so the parser
|
||||
** has access to the size of the yyParser object and so the parser
|
||||
** engine can be allocated from stack. In that case, only the
|
||||
** sqlite3ParserInit() and sqlite3ParserFinalize() routines are invoked
|
||||
** and the sqlite3ParserAlloc() and sqlite3ParserFree() routines can be
|
||||
|
|
|
@ -83,7 +83,7 @@ func CompareDomainName(s1, s2 string) (n int) {
|
|||
return
|
||||
}
|
||||
|
||||
// CountLabel counts the the number of labels in the string s.
|
||||
// CountLabel counts the number of labels in the string s.
|
||||
// s must be a syntactically valid domain name.
|
||||
func CountLabel(s string) (labels int) {
|
||||
if s == "." {
|
||||
|
|
|
@ -162,7 +162,7 @@ func (t *Transfer) inIxfr(q *Msg, c chan *Envelope) {
|
|||
if v, ok := rr.(*SOA); ok {
|
||||
if v.Serial == serial {
|
||||
n++
|
||||
// quit if it's a full axfr or the the servers' SOA is repeated the third time
|
||||
// quit if it's a full axfr or the servers' SOA is repeated the third time
|
||||
if axfr && n == 2 || n == 3 {
|
||||
c <- &Envelope{in.Answer, nil}
|
||||
return
|
||||
|
|
|
@ -14,7 +14,7 @@ import (
|
|||
|
||||
// ParseKey converts the binary contents of a private key file
|
||||
// to an *rsa.PrivateKey. It detects whether the private key is in a
|
||||
// PEM container or not. If so, it extracts the the private key
|
||||
// PEM container or not. If so, it extracts the private key
|
||||
// from PEM container before conversion. It only supports PEM
|
||||
// containers with no passphrase.
|
||||
func ParseKey(key []byte) (*rsa.PrivateKey, error) {
|
||||
|
|
|
@ -87,7 +87,7 @@ type Config struct {
|
|||
// If true, token expiry is not checked.
|
||||
SkipExpiryCheck bool
|
||||
|
||||
// SkipIssuerCheck is intended for specialized cases where the the caller wishes to
|
||||
// SkipIssuerCheck is intended for specialized cases where the caller wishes to
|
||||
// defer issuer validation. When enabled, callers MUST independently verify the Token's
|
||||
// Issuer is a known good value.
|
||||
//
|
||||
|
|
|
@ -150,7 +150,7 @@ func (ctx *cbcAEAD) computeAuthTag(aad, nonce, ciphertext []byte) []byte {
|
|||
return hmac.Sum(nil)[:ctx.authtagBytes]
|
||||
}
|
||||
|
||||
// resize ensures the the given slice has a capacity of at least n bytes.
|
||||
// resize ensures the given slice has a capacity of at least n bytes.
|
||||
// If the capacity of the slice is less than n, a new slice is allocated
|
||||
// and the existing data will be copied.
|
||||
func resize(in []byte, n uint64) (head, tail []byte) {
|
||||
|
|
|
@ -117,7 +117,7 @@ func Stream(conn, backendConn io.ReadWriter) {
|
|||
<-proxyDone
|
||||
}
|
||||
|
||||
// DefaultStreamHandler is provided to the the standard websocket to origin stream
|
||||
// DefaultStreamHandler is provided to the standard websocket to origin stream
|
||||
// This exist to allow SOCKS to deframe data before it gets to the origin
|
||||
func DefaultStreamHandler(wsConn *Conn, remoteConn net.Conn, _ http.Header) {
|
||||
Stream(wsConn, remoteConn)
|
||||
|
|
Loading…
Reference in New Issue