You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by ja...@apache.org on 2014/06/09 08:22:02 UTC
svn commit: r1601316 - in /httpd/httpd/branches/2.4.x:
include/http_connection.h server/connection.c
Author: jailletc36
Date: Mon Jun 9 06:22:01 2014
New Revision: 1601316
URL: http://svn.apache.org/r1601316
Log:
r1599852 and r1599799 in trunk
Fix broken URL in comment
Modified:
httpd/httpd/branches/2.4.x/include/http_connection.h
httpd/httpd/branches/2.4.x/server/connection.c
Modified: httpd/httpd/branches/2.4.x/include/http_connection.h
URL: http://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/include/http_connection.h?rev=1601316&r1=1601315&r2=1601316&view=diff
==============================================================================
--- httpd/httpd/branches/2.4.x/include/http_connection.h (original)
+++ httpd/httpd/branches/2.4.x/include/http_connection.h Mon Jun 9 06:22:01 2014
@@ -57,10 +57,10 @@ AP_CORE_DECLARE(void) ap_flush_conn(conn
* This function is responsible for the following cases:
* <pre>
* we now proceed to read from the client until we get EOF, or until
- * MAX_SECS_TO_LINGER has passed. the reasons for doing this are
+ * MAX_SECS_TO_LINGER has passed. The reasons for doing this are
* documented in a draft:
*
- * http://www.ics.uci.edu/pub/ietf/http/draft-ietf-http-connection-00.txt
+ * http://tools.ietf.org/html/draft-ietf-http-connection-00.txt
*
* in a nutshell -- if we don't make this effort we risk causing
* TCP RST packets to be sent which can tear down a connection before
Modified: httpd/httpd/branches/2.4.x/server/connection.c
URL: http://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/connection.c?rev=1601316&r1=1601315&r2=1601316&view=diff
==============================================================================
--- httpd/httpd/branches/2.4.x/server/connection.c (original)
+++ httpd/httpd/branches/2.4.x/server/connection.c Mon Jun 9 06:22:01 2014
@@ -83,10 +83,10 @@ AP_CORE_DECLARE(void) ap_flush_conn(conn
}
/* we now proceed to read from the client until we get EOF, or until
- * MAX_SECS_TO_LINGER has passed. the reasons for doing this are
+ * MAX_SECS_TO_LINGER has passed. The reasons for doing this are
* documented in a draft:
*
- * http://www.ics.uci.edu/pub/ietf/http/draft-ietf-http-connection-00.txt
+ * http://tools.ietf.org/html/draft-ietf-http-connection-00.txt
*
* in a nutshell -- if we don't make this effort we risk causing
* TCP RST packets to be sent which can tear down a connection before