summaryrefslogtreecommitdiff
path: root/apps/netutils/ftpc/ftpc_socket.c
diff options
context:
space:
mode:
authorGregory Nutt <gnutt@nuttx.org>2014-04-13 16:24:28 -0600
committerGregory Nutt <gnutt@nuttx.org>2014-04-13 16:24:28 -0600
commit43ec94a665e13552402ff4f102e0f65f6792cf29 (patch)
tree05da26d1bb5e364c1a388afd54630d5ae3ca4aa7 /apps/netutils/ftpc/ftpc_socket.c
parent70b6bb22af51defd713adfd452309f32f0e523aa (diff)
downloadnuttx-43ec94a665e13552402ff4f102e0f65f6792cf29.tar.gz
nuttx-43ec94a665e13552402ff4f102e0f65f6792cf29.tar.bz2
nuttx-43ec94a665e13552402ff4f102e0f65f6792cf29.zip
More trailing whilespace removal
Diffstat (limited to 'apps/netutils/ftpc/ftpc_socket.c')
-rw-r--r--apps/netutils/ftpc/ftpc_socket.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/apps/netutils/ftpc/ftpc_socket.c b/apps/netutils/ftpc/ftpc_socket.c
index f904688fd..b2e76b44b 100644
--- a/apps/netutils/ftpc/ftpc_socket.c
+++ b/apps/netutils/ftpc/ftpc_socket.c
@@ -210,14 +210,14 @@ void ftpc_sockcopy(FAR struct ftpc_socket_s *dest,
*
* Description:
* Accept a connection on the data socket. This function is onlly used
- * in active mode.
+ * in active mode.
*
* In active mode FTP the client connects from a random port (N>1023) to the
* FTP server's command port, port 21. Then, the client starts listening to
* port N+1 and sends the FTP command PORT N+1 to the FTP server. The server
* will then connect back to the client's specified data port from its local
* data port, which is port 20. In passive mode FTP the client initiates
- * both connections to the server, solving the problem of firewalls filtering
+ * both connections to the server, solving the problem of firewalls filtering
* the incoming data port connection to the client from the server. When
* opening an FTP connection, the client opens two random ports locally
* (N>1023 and N+1). The first port contacts the server on port 21, but
@@ -225,7 +225,7 @@ void ftpc_sockcopy(FAR struct ftpc_socket_s *dest,
* back to its data port, the client will issue the PASV command. The result
* of this is that the server then opens a random unprivileged port (P >
* 1023) and sends the PORT P command back to the client. The client then
- * initiates the connection from port N+1 to port P on the server to transfer
+ * initiates the connection from port N+1 to port P on the server to transfer
* data.
*
****************************************************************************/