/** This configuration directive does not take any arguments */
# define AP_NO_ARGS func.no_args
-/** This configuration directive will handle it's own parsing of arguments*/
+/** This configuration directive will handle its own parsing of arguments*/
# define AP_RAW_ARGS func.raw_args
-/** This configuration directive will handle it's own parsing of arguments*/
+/** This configuration directive will handle its own parsing of arguments*/
# define AP_TAKE_ARGV func.take_argv
/** This configuration directive takes 1 argument*/
# define AP_TAKE1 func.take1
/* don't send domain
* - for proxy requests
- * - if it's no specified
+ * - if it's not specified
*/
if (r->proxyreq || !conf->uri_list) {
domain = NULL;
/* Module may return 0 if passed HSE_TERM_ADVISORY_UNLOAD, and the module
* will remain loaded, or 1 if it consents to being unloaded. If the module
- * is passed HSE_TERM_MUST_UNLOAD, it's return value is ignored.
+ * is passed HSE_TERM_MUST_UNLOAD, its return value is ignored.
*/
#define HSE_TERM_MUST_UNLOAD 1
#define HSE_TERM_ADVISORY_UNLOAD 2
cache_pqueue_print_entry print);
/**
- * dump the queue and it's internal structure
+ * dump the queue and its internal structure
* @internal
* debug function only
* @param q the queue
* sed_write_output which will add the output to ctx->bb. At the end of
* the loop, ctx->bb is passed to the next filter in chain. At the end of
* the data, if new line is not found then sed_eval_buffer will store the
- * data in it's own buffer.
+ * data in its own buffer.
*
* Once eos bucket is found then sed_finalize_eval will flush the rest of
* the data. If there is no new line in last line of data, new line is
/* Here is the logic :
* Read the readbytes data from next level fiter into bbinp. Loop through
* the buckets in bbinp and read the data from buckets and invoke
- * sed_eval_buffer on the data. libsed will generate it's output using
+ * sed_eval_buffer on the data. libsed will generate its output using
* sed_write_output which will add data in ctx->bb. Do it until it have
* atleast one bucket bucket in ctx->bb. At the end of data eos bucket
* should be there.
* valuable for detecting clients with broken network
* connections or possible DoS attacks.
*
- * It is still save to use r / r->pool here as the eor bucket
+ * It is still safe to use r / r->pool here as the eor bucket
* could not have been destroyed in the event of a timeout.
*/
ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
* Clean up an LDAP connection by unbinding and unlocking the connection.
* This cleanup does not remove the util_ldap_connection_t from the
* per-virtualhost list of connections, does not remove the storage
- * for the util_ldap_connection_t or it's data, and is NOT run automatically.
+ * for the util_ldap_connection_t or its data, and is NOT run automatically.
*/
static apr_status_t uldap_connection_cleanup(void *param)
{
*/
worker->s->lbfactor = atoi(val);
if (worker->s->lbfactor < 1 || worker->s->lbfactor > 100)
- return "LoadFactor must be number between 1..100";
+ return "LoadFactor must be a number between 1..100";
}
else if (!strcasecmp(key, "retry")) {
/* If set it will give the retry timeout for the worker
path += strlen(name);
if (*path == '=') {
/*
- * Session path was found, get it's value
+ * Session path was found, get its value
*/
++path;
if (*path) {
++start_cookie;
if (*start_cookie++ == '=' && *start_cookie) {
/*
- * Session cookie was found, get it's value
+ * Session cookie was found, get its value
*/
char *end_cookie, *cookie;
cookie = apr_pstrdup(r->pool, start_cookie);
/* Recalculate lbfactors */
workers = (proxy_worker **)balancer->workers->elts;
- /* Special case if there is only one worker it's
+ /* Special case if there is only one worker its
* load factor will always be 1
*/
if (balancer->workers->nelts == 1) {
* We come through this procedure for each certificate in the certificate
* chain, starting with the root-CA's certificate. At each step we've to
* both verify the signature on the CRL (to make sure it's a valid CRL)
- * and it's revocation list (to make sure the current certificate isn't
+ * and its revocation list (to make sure the current certificate isn't
* revoked). But because to check the signature on the CRL we need the
* public key of the issuing CA certificate (which was already processed
* one round before), we've a little problem. But we can both solve it and
/*
* Try to retrieve a CRL corresponding to the _subject_ of
- * the current certificate in order to verify it's integrity.
+ * the current certificate in order to verify its integrity.
*/
memset((char *)&obj, 0, sizeof(obj));
rc = SSL_X509_STORE_lookup(mctx->crl,
*cppPassPhraseCur = apr_pstrdup(p, buf);
/*
- * And return it's length to OpenSSL...
+ * And return its length to OpenSSL...
*/
return (len);
}
conf->response_code_strings = new->response_code_strings;
}
else if (new->response_code_strings != NULL) {
- /* If we merge, the merge-result must have it's own array
+ /* If we merge, the merge-result must have its own array
*/
conf->response_code_strings = apr_pmemdup(a,
base->response_code_strings,
conf->sec_file = new->sec_file;
}
else if (new->sec_file) {
- /* If we merge, the merge-result must have it's own array
+ /* If we merge, the merge-result must have its own array
*/
conf->sec_file = apr_array_append(a, base->sec_file, new->sec_file);
}
conf->sec_if = new->sec_if;
}
else if (new->sec_if) {
- /* If we merge, the merge-result must have it's own array
+ /* If we merge, the merge-result must have its own array
*/
conf->sec_if = apr_array_append(a, base->sec_if, new->sec_if);
}
}
/* Note this works on Win2000 and later due to ChangeServiceConfig2
- * Continue to test it's existence, but at least drop the feature
+ * Continue to test its existence, but at least drop the feature
* of revising service description tags prior to Win2000.
*/