* Function : free_http_response
*
* Description : Free the memory occupied by an http_response
- * and its depandant structures.
+ * and its dependent structures.
*
* Parameters :
* 1 : rsp = pointer to http_response to be freed
/*
* To get to the start of the next chunk size we have to skip
- * the line with the current chunk size followed by "\r\n" followd
+ * the line with the current chunk size followed by "\r\n" followed
* by the actual data and another "\r\n" following the data.
*/
bytes_to_skip = (int)(p - chunk_start) + 2 + (int)chunk_size + 2;
* Function : prepare_for_filtering
*
* Description : If necessary, de-chunks and decompresses
- * the content so it can get filterd.
+ * the content so it can get filtered.
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
* 2 : content_length = content length. Upon successful filtering
* the passed value is updated with the new content length.
*
- * Returns : 1 if the content has been filterd. 0 if it hasn't.
+ * Returns : 1 if the content has been filtered. 0 if it hasn't.
*
*********************************************************************/
int execute_client_body_filters(struct client_state *csp, size_t *content_length)
if (!csp->ip_addr_str || retval)
{
log_error(LOG_LEVEL_ERROR, "Can not save csp->ip_addr_str: %s",
- (csp->ip_addr_str) ? gai_strerror(retval) : "Insuffcient memory");
+ (csp->ip_addr_str) ? gai_strerror(retval) : "Insufficient memory");
freez(csp->ip_addr_str);
}
#undef client
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
*
- * Returns : 0 on succes, -1 on error.
+ * Returns : 0 on success, -1 on error.
*
*********************************************************************/
static int send_server_headers(struct client_state *csp)
is_ssl_pending(&(csp->ssl_client_attr)))
{
/*
- * The TLS libray may also consume all of the remaining data
+ * The TLS library may also consume all of the remaining data
* from the client when we're shuffling the data from an
* unbuffered request body to the server.
*/
* *************************************************************************/
case hash_listen_backlog :
/*
- * We don't enfore an upper or lower limit because on
+ * We don't enforce an upper or lower limit because on
* many platforms all values are valid and negative
* number mean "use the highest value allowed".
*/
* 4 : src = Source buffer
* 5 : slen = Amount of data to be encoded
*
- * Returns : 0 on success, error code othervise
+ * Returns : 0 on success, error code otherwise
*
*********************************************************************/
extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
*
* Function : keep_alive_keyword_detected
*
- * Description : Checks wether or not a Connection header contains
+ * Description : Checks whether or not a Connection header contains
* the keep-alive keyword.
*
* Parameters :
* Function : parse_header_time
*
* Description : Parses time formats used in HTTP header strings
- * to get the numerical respresentation.
+ * to get the numerical representation.
*
* Parameters :
* 1 : header_time = HTTP header time as string.
* Function : parse_time_header
*
* Description : Parses the time in an HTTP time header to get
- * the numerical respresentation.
+ * the numerical representation.
*
* Parameters :
* 1 : header = HTTP header with a time value
* 4 : src = Source buffer
* 5 : slen = Amount of data to be encoded
*
- * Returns : 0 on success, error code othervise
+ * Returns : 0 on success, error code otherwise
*
*********************************************************************/
extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
* Description : Makes sure the certificate state is sane.
*
* Parameters :
- * 1 : certificate = Path to the potentionally existing certifcate.
+ * 1 : certificate = Path to the potentionally existing certificate.
* 2 : key = Path to the potentionally existing key.
*
* Returns : -1 => Error
log_error(LOG_LEVEL_ERROR,
"ssl_store_cert() failed for cert %d", i);
/*
- * ssl_send_certificate_error() wil not be able to show
- * the certificate but the user will stil get the error
+ * ssl_send_certificate_error() will not be able to show
+ * the certificate but the user will still get the error
* description.
*/
}
* 4 : src = Source buffer
* 5 : slen = Amount of data to be encoded
*
- * Returns : 0 on success, error code othervise
+ * Returns : 0 on success, error code otherwise
*
*********************************************************************/
extern int ssl_base64_encode(unsigned char *dst, size_t dlen, size_t *olen,
*
* Parameters :
* 1 : csp = Current client state (buffers, headers, etc...)
- * 2 : certificate_path = Path to the certficate to generate.
+ * 2 : certificate_path = Path to the certificate to generate.
* 3 : rsa_key_path = Path to the key to generate for the
* certificate.
*