gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r37890 - libmicrohttpd/src/microhttpd


From: gnunet
Subject: [GNUnet-SVN] r37890 - libmicrohttpd/src/microhttpd
Date: Mon, 5 Sep 2016 15:26:06 +0200

Author: grothoff
Date: 2016-09-05 15:26:05 +0200 (Mon, 05 Sep 2016)
New Revision: 37890

Modified:
   libmicrohttpd/src/microhttpd/daemon.c
Log:
-more marking of translatable messages

Modified: libmicrohttpd/src/microhttpd/daemon.c
===================================================================
--- libmicrohttpd/src/microhttpd/daemon.c       2016-09-05 12:53:16 UTC (rev 
37889)
+++ libmicrohttpd/src/microhttpd/daemon.c       2016-09-05 13:26:05 UTC (rev 
37890)
@@ -110,8 +110,10 @@
 {
 #ifdef HAVE_MESSAGES
   fprintf (stderr,
-           "Fatal error in GNU libmicrohttpd %s:%u: %s\n",
-          file, line, reason);
+           _("Fatal error in GNU libmicrohttpd %s:%u: %s\n"),
+          file,
+           line,
+           reason);
 #endif
   abort ();
 }
@@ -193,9 +195,9 @@
 static void
 MHD_ip_count_lock (struct MHD_Daemon *daemon)
 {
-  if (!MHD_mutex_lock_(&daemon->per_ip_connection_mutex))
+  if (! MHD_mutex_lock_(&daemon->per_ip_connection_mutex))
     {
-      MHD_PANIC ("Failed to acquire IP connection limit mutex\n");
+      MHD_PANIC (_("Failed to acquire IP connection limit mutex\n"));
     }
 }
 
@@ -208,9 +210,9 @@
 static void
 MHD_ip_count_unlock (struct MHD_Daemon *daemon)
 {
-  if (!MHD_mutex_unlock_(&daemon->per_ip_connection_mutex))
+  if (! MHD_mutex_unlock_(&daemon->per_ip_connection_mutex))
     {
-      MHD_PANIC ("Failed to release IP connection limit mutex\n");
+      MHD_PANIC (_("Failed to release IP connection limit mutex\n"));
     }
 }
 
@@ -225,17 +227,21 @@
  * @return -1, 0 or 1 depending on result of compare
  */
 static int
-MHD_ip_addr_compare (const void *a1, const void *a2)
+MHD_ip_addr_compare (const void *a1,
+                     const void *a2)
 {
-  return memcmp (a1, a2, offsetof (struct MHD_IPCount, count));
+  return memcmp (a1,
+                 a2,
+                 offsetof (struct MHD_IPCount,
+                           count));
 }
 
 
 /**
- * Parse address and initialize 'key' using the address.
+ * Parse address and initialize @a key using the address.
  *
  * @param addr address to parse
- * @param addrlen number of bytes in addr
+ * @param addrlen number of bytes in @a addr
  * @param key where to store the parsed address
  * @return #MHD_YES on success and #MHD_NO otherwise (e.g., invalid address 
type)
  */
@@ -244,14 +250,19 @@
                    socklen_t addrlen,
                    struct MHD_IPCount *key)
 {
-  memset(key, 0, sizeof(*key));
+  memset(key,
+         0,
+         sizeof(*key));
 
   /* IPv4 addresses */
   if (sizeof (struct sockaddr_in) == addrlen)
     {
       const struct sockaddr_in *addr4 = (const struct sockaddr_in*) addr;
+
       key->family = AF_INET;
-      memcpy (&key->addr.ipv4, &addr4->sin_addr, sizeof(addr4->sin_addr));
+      memcpy (&key->addr.ipv4,
+              &addr4->sin_addr,
+              sizeof(addr4->sin_addr));
       return MHD_YES;
     }
 
@@ -260,8 +271,11 @@
   if (sizeof (struct sockaddr_in6) == addrlen)
     {
       const struct sockaddr_in6 *addr6 = (const struct sockaddr_in6*) addr;
+
       key->family = AF_INET6;
-      memcpy (&key->addr.ipv6, &addr6->sin6_addr, sizeof(addr6->sin6_addr));
+      memcpy (&key->addr.ipv6,
+              &addr6->sin6_addr,
+              sizeof(addr6->sin6_addr));
       return MHD_YES;
     }
 #endif
@@ -272,11 +286,13 @@
 
 
 /**
- * Check if IP address is over its limit.
+ * Check if IP address is over its limit in terms of the number
+ * of allowed concurrent connections.  If the IP is still allowed,
+ * increments the connection counter.
  *
  * @param daemon handle to daemon where connection counts are tracked
  * @param addr address to add (or increment counter)
- * @param addrlen number of bytes in addr
+ * @param addrlen number of bytes in @a addr
  * @return Return #MHD_YES if IP below limit, #MHD_NO if IP has surpassed 
limit.
  *   Also returns #MHD_NO if fails to allocate memory.
  */
@@ -299,7 +315,9 @@
     return MHD_NO;
 
   /* Initialize key */
-  if (MHD_NO == MHD_ip_addr_to_key (addr, addrlen, key))
+  if (MHD_NO == MHD_ip_addr_to_key (addr,
+                                    addrlen,
+                                    key))
     {
       /* Allow unhandled address types through */
       free (key);
@@ -314,7 +332,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "Failed to add IP connection count node\n");
+               _("Failed to add IP connection count node\n"));
 #endif
       MHD_ip_count_unlock (daemon);
       free (key);
@@ -358,7 +376,9 @@
   if (0 == daemon->per_ip_connection_limit)
     return;
   /* Initialize search key */
-  if (MHD_NO == MHD_ip_addr_to_key (addr, addrlen, &search_key))
+  if (MHD_NO == MHD_ip_addr_to_key (addr,
+                                    addrlen,
+                                    &search_key))
     return;
 
   MHD_ip_count_lock (daemon);
@@ -370,13 +390,13 @@
     {
       /* Something's wrong if we couldn't find an IP address
        * that was previously added */
-      MHD_PANIC ("Failed to find previously-added IP address\n");
+      MHD_PANIC (_("Failed to find previously-added IP address\n"));
     }
   found_key = (struct MHD_IPCount *) *nodep;
   /* Validate existing count for IP address */
   if (0 == found_key->count)
     {
-      MHD_PANIC ("Previously-added IP address had 0 count\n");
+      MHD_PANIC (_("Previously-added IP address had counter of zero\n"));
     }
   /* Remove the node entirely if count reduces to 0 */
   if (0 == --found_key->count)
@@ -505,7 +525,8 @@
     {
       cert.data = (unsigned char *) daemon->https_mem_trust;
       cert.size = strlen (daemon->https_mem_trust);
-      if (gnutls_certificate_set_x509_trust_mem (daemon->x509_cred, &cert,
+      if (gnutls_certificate_set_x509_trust_mem (daemon->x509_cred,
+                                                 &cert,
                                                 GNUTLS_X509_FMT_PEM) < 0)
        {
 #ifdef HAVE_MESSAGES
@@ -533,7 +554,8 @@
       if (NULL != daemon->https_key_password) {
 #if GNUTLS_VERSION_NUMBER >= 0x030111
         ret = gnutls_certificate_set_x509_key_mem2 (daemon->x509_cred,
-                                                    &cert, &key,
+                                                    &cert,
+                                                    &key,
                                                     GNUTLS_X509_FMT_PEM,
                                                     daemon->https_key_password,
                                                     0);
@@ -540,8 +562,8 @@
 #else
 #ifdef HAVE_MESSAGES
        MHD_DLOG (daemon,
-                  "Failed to setup x509 certificate/key: pre 3.X.X version " \
-                 "of GnuTLS does not support setting key password");
+                  _("Failed to setup x509 certificate/key: pre 3.X.X version " 
\
+                    "of GnuTLS does not support setting key password"));
 #endif
        return -1;
 #endif
@@ -548,7 +570,8 @@
       }
       else
         ret = gnutls_certificate_set_x509_key_mem (daemon->x509_cred,
-                                                   &cert, &key,
+                                                   &cert,
+                                                   &key,
                                                    GNUTLS_X509_FMT_PEM);
 #ifdef HAVE_MESSAGES
       if (0 != ret)
@@ -589,7 +612,7 @@
     default:
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Error: invalid credentials type %d specified.\n",
+                _("Error: invalid credentials type %d specified.\n"),
                 daemon->cred_type);
 #endif
       return -1;
@@ -829,7 +852,7 @@
 #ifdef HAVE_MESSAGES
   if (NULL != max_fd)
     MHD_DLOG (daemon,
-              "Maximum socket in select set: %d\n",
+              _("Maximum socket in select set: %d\n"),
               *max_fd);
 #endif
 #endif
@@ -922,7 +945,7 @@
                           EPOLL_CTL_DEL,
                           connection->socket_fd,
                           NULL))
-        MHD_PANIC ("Failed to remove FD from epoll set\n");
+        MHD_PANIC (_("Failed to remove FD from epoll set\n"));
     }
   if (MHD_INVALID_SOCKET != urh->mhd.socket)
     {
@@ -937,9 +960,9 @@
                             EPOLL_CTL_DEL,
                             urh->mhd.socket,
                             NULL)) )
-        MHD_PANIC ("Failed to remove FD from epoll set\n");
+        MHD_PANIC (_("Failed to remove FD from epoll set\n"));
       if (0 != MHD_socket_close_ (urh->mhd.socket))
-        MHD_PANIC ("close failed\n");
+        MHD_PANIC (_("close failed\n"));
     }
   MHD_resume_connection (connection);
   MHD_connection_close_ (connection,
@@ -1133,7 +1156,7 @@
             {
 #ifdef HAVE_MESSAGES
               MHD_DLOG (con->daemon,
-                        "Error preparing select\n");
+                        _("Error preparing select\n"));
 #endif
               break;
             }
@@ -1153,7 +1176,7 @@
                 continue;
 #ifdef HAVE_MESSAGES
               MHD_DLOG (con->daemon,
-                        "Error during select (%d): `%s'\n",
+                        _("Error during select (%d): `%s'\n"),
                         err,
                         MHD_socket_strerr_ (err));
 #endif
@@ -1178,7 +1201,9 @@
         {
           struct pollfd p[2];
 
-          memset (p, 0, sizeof (struct pollfd) * 2);
+          memset (p,
+                  0,
+                  sizeof (struct pollfd) * 2);
           p[0].fd = urh->connection->socket_fd;
           p[1].fd = urh->mhd.socket;
           if (urh->in_buffer_off < urh->in_buffer_size)
@@ -1201,7 +1226,7 @@
                 continue;
 #ifdef HAVE_MESSAGES
               MHD_DLOG (con->daemon,
-                        "Error during poll: `%s'\n",
+                        _("Error during poll: `%s'\n"),
                         MHD_socket_strerr_ (err));
 #endif
               break;
@@ -1362,7 +1387,7 @@
               {
 #ifdef HAVE_MESSAGES
                 MHD_DLOG (con->daemon,
-                          "Can't add FD to fd_set\n");
+                          _("Failed to add FD to fd_set\n"));
 #endif
                 goto exit;
               }
@@ -1380,7 +1405,7 @@
                continue;
 #ifdef HAVE_MESSAGES
              MHD_DLOG (con->daemon,
-                       "Error during select (%d): `%s'\n",
+                       _("Error during select (%d): `%s'\n"),
                        err,
                        MHD_socket_strerr_ (err));
 #endif
@@ -1389,7 +1414,8 @@
 #if WINDOWS
           /* drain signaling pipe before other processing */
           if ( (MHD_INVALID_PIPE_ != spipe) &&
-               (FD_ISSET (spipe, &rs)) )
+               (FD_ISSET (spipe,
+                          &rs)) )
             MHD_pipe_drain_ (spipe);
 #endif
           if (MHD_NO ==
@@ -1452,7 +1478,7 @@
                continue;
 #ifdef HAVE_MESSAGES
              MHD_DLOG (con->daemon,
-                        "Error during poll: `%s'\n",
+                        _("Error during poll: `%s'\n"),
                        MHD_socket_last_strerr_ ());
 #endif
              break;
@@ -1482,7 +1508,7 @@
 #if DEBUG_CLOSE
 #ifdef HAVE_MESSAGES
       MHD_DLOG (con->daemon,
-                "Processing thread terminating, closing connection\n");
+                _("Processing thread terminating. Closing connection\n"));
 #endif
 #endif
       if (MHD_CONNECTION_CLOSED != con->state)
@@ -1507,7 +1533,7 @@
       shutdown (con->socket_fd,
                 SHUT_WR);
       if (0 != MHD_socket_close_ (con->socket_fd))
-        MHD_PANIC ("close failed\n");
+        MHD_PANIC (_("close failed\n"));
       con->socket_fd = MHD_INVALID_SOCKET;
     }
   return (MHD_THRD_RTRN_TYPE_) 0;
@@ -1617,11 +1643,17 @@
 #ifndef HAVE_SENDFILE64
       offset = (off_t) offsetu64;
       if ( (offsetu64 <= (uint64_t) OFF_T_MAX) &&
-           (0 < (ret = sendfile (connection->socket_fd, fd, &offset, left))) )
+           (0 < (ret = sendfile (connection->socket_fd,
+                                 fd,
+                                 &offset,
+                                 left))) )
 #else  /* HAVE_SENDFILE64 */
       offset = (off64_t) offsetu64;
       if ( (offsetu64 <= (uint64_t) OFF64_T_MAX) &&
-          (0 < (ret = sendfile64 (connection->socket_fd, fd, &offset, left))) )
+          (0 < (ret = sendfile64 (connection->socket_fd,
+                                   fd,
+                                   &offset,
+                                   left))) )
 #endif /* HAVE_SENDFILE64 */
         {
           /* write successful */
@@ -1635,9 +1667,11 @@
           connection->epoll_state &= ~MHD_EPOLL_STATE_WRITE_READY;
         }
 #endif
-      if (MHD_SCKT_ERR_IS_EINTR_ (err) || MHD_SCKT_ERR_IS_EAGAIN_ (err))
+      if (MHD_SCKT_ERR_IS_EINTR_ (err) ||
+          MHD_SCKT_ERR_IS_EAGAIN_ (err))
        return 0;
-      if (MHD_SCKT_ERR_IS_(err, MHD_SCKT_EBADF_))
+      if (MHD_SCKT_ERR_IS_(err,
+                           MHD_SCKT_EBADF_))
        return -1;
       /* sendfile() failed with EINVAL if mmap()-like operations are not
         supported for FD or other 'unusual' errors occurred, so we should try
@@ -1646,10 +1680,14 @@
         http://lists.gnu.org/archive/html/libmicrohttpd/2011-02/msg00015.html 
*/
     }
 #endif
-  ret = (ssize_t) send (connection->socket_fd, other, (MHD_SCKT_SEND_SIZE_)i, 
MSG_NOSIGNAL);
+  ret = (ssize_t) send (connection->socket_fd,
+                        other,
+                        (MHD_SCKT_SEND_SIZE_) i,
+                        MSG_NOSIGNAL);
   err = MHD_socket_get_error_();
 #ifdef EPOLL_SUPPORT
-  if ( (0 > ret) && (MHD_SCKT_ERR_IS_EAGAIN_(err)) )
+  if ( (0 > ret) &&
+       (MHD_SCKT_ERR_IS_EAGAIN_(err)) )
     {
       /* EAGAIN --- no longer write-ready */
       connection->epoll_state &= ~MHD_EPOLL_STATE_WRITE_READY;
@@ -1658,7 +1696,8 @@
   /* Handle broken kernel / libc, returning -1 but not setting errno;
      kill connection as that should be safe; reported on mailinglist here:
      http://lists.gnu.org/archive/html/libmicrohttpd/2014-10/msg00023.html */
-  if ( (0 > ret) && (0 == err) )
+  if ( (0 > ret) &&
+       (0 == err) )
     MHD_socket_set_error_ (MHD_SCKT_ECONNRESET_);
   return ret;
 }
@@ -1727,7 +1766,8 @@
           if (worker->connections < worker->connection_limit)
             return internal_add_connection (worker,
                                             client_socket,
-                                            addr, addrlen,
+                                            addr,
+                                            addrlen,
                                             external_add);
         }
       /* all pools are at their connection limit, must refuse */
@@ -1739,17 +1779,18 @@
       return MHD_NO;
     }
 
-  if ( (! MHD_SCKT_FD_FITS_FDSET_(client_socket, NULL)) &&
+  if ( (! MHD_SCKT_FD_FITS_FDSET_(client_socket,
+                                  NULL)) &&
        (0 == (daemon->options & (MHD_USE_POLL | MHD_USE_EPOLL))) )
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "Socket descriptor larger than FD_SETSIZE: %d > %d\n",
-               (int)client_socket,
-               (int)FD_SETSIZE);
+               _("Socket descriptor larger than FD_SETSIZE: %d > %d\n"),
+               (int) client_socket,
+               (int) FD_SETSIZE);
 #endif
       if (0 != MHD_socket_close_ (client_socket))
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
 #if EINVAL
       errno = EINVAL;
 #endif
@@ -1760,20 +1801,22 @@
 #ifdef HAVE_MESSAGES
 #if DEBUG_CONNECT
   MHD_DLOG (daemon,
-            "Accepted connection on socket %d\n",
+            _("Accepted connection on socket %d\n"),
             client_socket);
 #endif
 #endif
   if ( (daemon->connections == daemon->connection_limit) ||
-       (MHD_NO == MHD_ip_limit_add (daemon, addr, addrlen)) )
+       (MHD_NO == MHD_ip_limit_add (daemon,
+                                    addr,
+                                    addrlen)) )
     {
       /* above connection limit - reject */
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Server reached connection limit (closing inbound 
connection)\n");
+                _("Server reached connection limit. Closing inbound 
connection.\n"));
 #endif
       if (0 != MHD_socket_close_ (client_socket))
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
 #if ENFILE
       errno = ENFILE;
 #endif
@@ -1783,17 +1826,20 @@
   /* apply connection acceptance policy if present */
   if ( (NULL != daemon->apc) &&
        (MHD_NO == daemon->apc (daemon->apc_cls,
-                              addr, addrlen)) )
+                              addr,
+                               addrlen)) )
     {
 #if DEBUG_CLOSE
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Connection rejected, closing connection\n");
+                _("Connection rejected by application. Closing 
connection.\n"));
 #endif
 #endif
       if (0 != MHD_socket_close_ (client_socket))
-       MHD_PANIC ("close failed\n");
-      MHD_ip_limit_del (daemon, addr, addrlen);
+       MHD_PANIC (_("close failed\n"));
+      MHD_ip_limit_del (daemon,
+                        addr,
+                        addrlen);
 #if EACCESS
       errno = EACCESS;
 #endif
@@ -1804,8 +1850,10 @@
 #ifdef SOL_SOCKET
 #ifdef SO_NOSIGPIPE
   setsockopt (client_socket,
-             SOL_SOCKET, SO_NOSIGPIPE,
-             &on, sizeof (on));
+             SOL_SOCKET,
+              SO_NOSIGPIPE,
+             &on,
+              sizeof (on));
 #endif
 #endif
 #endif
@@ -1820,7 +1868,9 @@
 #endif
       if (0 != MHD_socket_close_ (client_socket))
        MHD_PANIC ("close failed\n");
-      MHD_ip_limit_del (daemon, addr, addrlen);
+      MHD_ip_limit_del (daemon,
+                        addr,
+                        addrlen);
       errno = eno;
       return MHD_NO;
     }
@@ -1832,12 +1882,14 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "Error allocating memory: %s\n",
+               _("Error allocating memory: %s\n"),
                MHD_strerror_ (errno));
 #endif
       if (0 != MHD_socket_close_ (client_socket))
-       MHD_PANIC ("close failed\n");
-      MHD_ip_limit_del (daemon, addr, addrlen);
+       MHD_PANIC (_("close failed\n"));
+      MHD_ip_limit_del (daemon,
+                        addr,
+                        addrlen);
       free (connection);
 #if ENOMEM
       errno = ENOMEM;
@@ -1851,18 +1903,22 @@
       eno = errno;
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "Error allocating memory: %s\n",
+               _("Error allocating memory: %s\n"),
                MHD_strerror_ (errno));
 #endif
       if (0 != MHD_socket_close_ (client_socket))
-       MHD_PANIC ("close failed\n");
-      MHD_ip_limit_del (daemon, addr, addrlen);
+       MHD_PANIC (_("close failed\n"));
+      MHD_ip_limit_del (daemon,
+                        addr,
+                        addrlen);
       MHD_pool_destroy (connection->pool);
       free (connection);
       errno = eno;
       return MHD_NO;
     }
-  memcpy (connection->addr, addr, addrlen);
+  memcpy (connection->addr,
+          addr,
+          addrlen);
   connection->addr_len = addrlen;
   connection->socket_fd = client_socket;
   connection->daemon = daemon;
@@ -1881,7 +1937,7 @@
         {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (connection->daemon,
-                    "Failed to set nonblocking mode on connection socket: 
%s\n",
+                    _("Failed to set nonblocking mode on connection socket: 
%s\n"),
                     MHD_socket_last_strerr_());
 #endif
         }
@@ -1894,7 +1950,8 @@
       connection->send_cls = &send_tls_adapter;
       connection->state = MHD_TLS_CONNECTION_INIT;
       MHD_set_https_callbacks (connection);
-      gnutls_init (&connection->tls_session, GNUTLS_SERVER);
+      gnutls_init (&connection->tls_session,
+                   GNUTLS_SERVER);
       gnutls_priority_set (connection->tls_session,
                           daemon->priority_cache);
       switch (daemon->cred_type)
@@ -1908,15 +1965,17 @@
         default:
 #ifdef HAVE_MESSAGES
           MHD_DLOG (connection->daemon,
-                    "Failed to setup TLS credentials: unknown credential type 
%d\n",
+                    _("Failed to setup TLS credentials: unknown credential 
type %d\n"),
                     daemon->cred_type);
 #endif
           if (0 != MHD_socket_close_ (client_socket))
            MHD_PANIC ("close failed\n");
-          MHD_ip_limit_del (daemon, addr, addrlen);
+          MHD_ip_limit_del (daemon,
+                            addr,
+                            addrlen);
           free (connection->addr);
           free (connection);
-          MHD_PANIC ("Unknown credential type");
+          MHD_PANIC (_("Unknown credential type"));
 #if EINVAL
          errno = EINVAL;
 #endif
@@ -1938,7 +1997,7 @@
   if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION))
   {
     if (! MHD_mutex_lock_ (&daemon->cleanup_connection_mutex))
-      MHD_PANIC ("Failed to acquire cleanup mutex\n");
+      MHD_PANIC (_("Failed to acquire cleanup mutex\n"));
   }
   else
    XDLL_insert (daemon->normal_timeout_head,
@@ -1949,7 +2008,7 @@
              connection);
   if  ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
        (!MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to release cleanup mutex\n");
+    MHD_PANIC (_("Failed to release cleanup mutex\n"));
 
   if (NULL != daemon->notify_connection)
     daemon->notify_connection (daemon->notify_connection_cls,
@@ -1960,11 +2019,11 @@
   /* attempt to create handler thread */
   if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION))
     {
-      if (! MHD_create_named_thread_(&connection->pid,
-                                     "MHD-connection",
-                                     daemon->thread_stack_size,
-                                     &thread_main_handle_connection,
-                                     connection))
+      if (! MHD_create_named_thread_ (&connection->pid,
+                                      "MHD-connection",
+                                      daemon->thread_stack_size,
+                                      &thread_main_handle_connection,
+                                      connection))
         {
          eno = errno;
 #ifdef HAVE_MESSAGES
@@ -1978,11 +2037,13 @@
   else
     if ( (MHD_YES == external_add) &&
         (MHD_INVALID_PIPE_ != daemon->wpipe[1]) &&
-        (1 != MHD_pipe_write_ (daemon->wpipe[1], "n", 1)) )
+        (1 != MHD_pipe_write_ (daemon->wpipe[1],
+                                "n",
+                                1)) )
       {
 #ifdef HAVE_MESSAGES
        MHD_DLOG (daemon,
-                 "failed to signal new connection via pipe");
+                 _("Failed to signal new connection via pipe."));
 #endif
       }
 #ifdef EPOLL_SUPPORT
@@ -2002,7 +2063,7 @@
              eno = errno;
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "Call to epoll_ctl failed: %s\n",
+                        _("Call to epoll_ctl failed: %s\n"),
                         MHD_socket_last_strerr_ ());
 #endif
              goto cleanup;
@@ -2028,12 +2089,12 @@
                                &connection->socket_context,
                                MHD_CONNECTION_NOTIFY_CLOSED);
   if (0 != MHD_socket_close_ (client_socket))
-    MHD_PANIC ("close failed\n");
+    MHD_PANIC (_("close failed\n"));
   MHD_ip_limit_del (daemon, addr, addrlen);
   if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION))
   {
     if (!MHD_mutex_lock_ (&daemon->cleanup_connection_mutex))
-      MHD_PANIC ("Failed to acquire cleanup mutex\n");
+      MHD_PANIC (_("Failed to acquire cleanup mutex\n"));
   }
   else
     XDLL_remove (daemon->normal_timeout_head,
@@ -2044,7 +2105,7 @@
              connection);
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
        (!MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to release cleanup mutex\n");
+    MHD_PANIC (_("Failed to release cleanup mutex\n"));
   MHD_pool_destroy (connection->pool);
   free (connection->addr);
   free (connection);
@@ -2087,11 +2148,11 @@
 
   daemon = connection->daemon;
   if (MHD_USE_SUSPEND_RESUME != (daemon->options & MHD_USE_SUSPEND_RESUME))
-    MHD_PANIC ("Cannot suspend connections without enabling 
MHD_USE_SUSPEND_RESUME!\n");
+    MHD_PANIC (_("Cannot suspend connections without enabling 
MHD_USE_SUSPEND_RESUME!\n"));
   if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION))
     {
-      if (!MHD_mutex_lock_ (&daemon->cleanup_connection_mutex))
-        MHD_PANIC ("Failed to acquire cleanup mutex\n");
+      if (! MHD_mutex_lock_ (&daemon->cleanup_connection_mutex))
+        MHD_PANIC (_("Failed to acquire cleanup mutex\n"));
     }
   else
     {
@@ -2126,7 +2187,7 @@
                               EPOLL_CTL_DEL,
                               connection->socket_fd,
                               NULL))
-            MHD_PANIC ("Failed to remove FD from epoll set\n");
+            MHD_PANIC (_("Failed to remove FD from epoll set\n"));
           connection->epoll_state &= ~MHD_EPOLL_STATE_IN_EPOLL_SET;
         }
       connection->epoll_state |= MHD_EPOLL_STATE_SUSPENDED;
@@ -2134,8 +2195,8 @@
 #endif
   connection->suspended = MHD_YES;
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
-       (!MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to release cleanup mutex\n");
+       (! MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
+    MHD_PANIC (_("Failed to release cleanup mutex\n"));
 }
 
 
@@ -2154,10 +2215,10 @@
 
   daemon = connection->daemon;
   if (MHD_USE_SUSPEND_RESUME != (daemon->options & MHD_USE_SUSPEND_RESUME))
-    MHD_PANIC ("Cannot resume connections without enabling 
MHD_USE_SUSPEND_RESUME!\n");
+    MHD_PANIC (_("Cannot resume connections without enabling 
MHD_USE_SUSPEND_RESUME!\n"));
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
        (! MHD_mutex_lock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to acquire cleanup mutex\n");
+    MHD_PANIC (_("Failed to acquire cleanup mutex\n"));
   connection->resuming = MHD_YES;
   daemon->resuming = MHD_YES;
   if ( (MHD_INVALID_PIPE_ != daemon->wpipe[1]) &&
@@ -2165,12 +2226,12 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "failed to signal resume via pipe");
+                _("Failed to signal resume via pipe."));
 #endif
     }
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
        (! MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to release cleanup mutex\n");
+    MHD_PANIC (_("Failed to release cleanup mutex\n"));
 }
 
 
@@ -2190,8 +2251,8 @@
 
   ret = MHD_NO;
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
-       (!MHD_mutex_lock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to acquire cleanup mutex\n");
+       (! MHD_mutex_lock_ (&daemon->cleanup_connection_mutex)) )
+    MHD_PANIC (_("Failed to acquire cleanup mutex\n"));
   if (MHD_NO != daemon->resuming)
     next = daemon->suspended_connections_head;
 
@@ -2246,8 +2307,8 @@
       pos->resuming = MHD_NO;
     }
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
-       (!MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to release cleanup mutex\n");
+       (! MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
+    MHD_PANIC (_("Failed to release cleanup mutex\n"));
   return ret;
 }
 
@@ -2295,7 +2356,7 @@
         {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Failed to set nonblocking mode on new client socket: 
%s\n",
+                    _("Failed to set nonblocking mode on new client socket: 
%s\n"),
                     MHD_socket_last_strerr_());
 #endif
         }
@@ -2303,13 +2364,14 @@
         {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Failed to set noninheritable mode on new client 
socket.\n");
+                    _("Failed to set noninheritable mode on new client 
socket.\n"));
 #endif
         }
     }
   return internal_add_connection (daemon,
                                  client_socket,
-                                 addr, addrlen,
+                                 addr,
+                                  addrlen,
                                  MHD_YES);
 }
 
@@ -2340,19 +2402,29 @@
   MHD_socket fd;
 
   addrlen = sizeof (addrstorage);
-  memset (addr, 0, sizeof (addrstorage));
+  memset (addr,
+          0,
+          sizeof (addrstorage));
   if (MHD_INVALID_SOCKET == (fd = daemon->socket_fd))
     return MHD_NO;
 #ifdef USE_ACCEPT4
-  s = accept4 (fd, addr, &addrlen, MAYBE_SOCK_CLOEXEC | MAYBE_SOCK_NONBLOCK);
+  s = accept4 (fd,
+               addr,
+               &addrlen,
+               MAYBE_SOCK_CLOEXEC | MAYBE_SOCK_NONBLOCK);
 #else  /* ! USE_ACCEPT4 */
-  s = accept (fd, addr, &addrlen);
+  s = accept (fd,
+              addr,
+              &addrlen);
 #endif /* ! USE_ACCEPT4 */
-  if ((MHD_INVALID_SOCKET == s) || (addrlen <= 0))
+  if ( (MHD_INVALID_SOCKET == s) ||
+       (addrlen <= 0) )
     {
       const int err = MHD_socket_get_error_ ();
+
       /* This could be a common occurance with multiple worker threads */
-      if ( (MHD_SCKT_ERR_IS_ (err, MHD_SCKT_EINVAL_)) &&
+      if ( (MHD_SCKT_ERR_IS_ (err,
+                              MHD_SCKT_EINVAL_)) &&
            (MHD_INVALID_SOCKET == daemon->socket_fd) )
         return MHD_NO; /* can happen during shutdown */
       if (MHD_SCKT_ERR_IS_DISCNN_BEFORE_ACCEPT_(err))
@@ -2360,13 +2432,13 @@
 #ifdef HAVE_MESSAGES
       if (! MHD_SCKT_ERR_IS_EAGAIN_ (err) )
         MHD_DLOG (daemon,
-                 "Error accepting connection: %s\n",
+                 _("Error accepting connection: %s\n"),
                  MHD_socket_strerr_(err));
 #endif
       if (MHD_INVALID_SOCKET != s)
         {
           if (0 != MHD_socket_close_ (s))
-           MHD_PANIC ("close failed\n");
+           MHD_PANIC (_("close failed\n"));
           /* just in case */
         }
       if ( MHD_SCKT_ERR_IS_LOW_RESOURCES_ (err) )
@@ -2379,7 +2451,7 @@
                  would ever be cleared.  Instead trying to produce
                  bit fat ugly warning. */
               MHD_DLOG (daemon,
-                        "Hit process or system resource limit at FIRST 
connection. This is really bad as there is no sane way to proceed. Will try 
busy waiting for system resources to become magically available.\n");
+                        _("Hit process or system resource limit at FIRST 
connection. This is really bad as there is no sane way to proceed. Will try 
busy waiting for system resources to become magically available.\n"));
 #endif
             }
           else
@@ -2387,7 +2459,7 @@
               daemon->at_limit = MHD_YES;
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "Hit process or system resource limit at %u 
connections, temporarily suspending accept(). Consider setting a lower 
MHD_OPTION_CONNECTION_LIMIT.\n",
+                        _("Hit process or system resource limit at %u 
connections, temporarily suspending accept(). Consider setting a lower 
MHD_OPTION_CONNECTION_LIMIT.\n"),
                         (unsigned int) daemon->connections);
 #endif
             }
@@ -2399,7 +2471,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Failed to set nonblocking mode on incoming connection socket: 
%s\n",
+                _("Failed to set nonblocking mode on incoming connection 
socket: %s\n"),
                 MHD_socket_last_strerr_());
 #endif
     }
@@ -2409,7 +2481,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Failed to set noninheritable mode on incoming connection 
socket.\n");
+                _("Failed to set noninheritable mode on incoming connection 
socket.\n"));
 #endif
     }
 #endif /* !USE_ACCEPT4 || !SOCK_CLOEXEC */
@@ -2416,7 +2488,7 @@
 #ifdef HAVE_MESSAGES
 #if DEBUG_CONNECT
   MHD_DLOG (daemon,
-            "Accepted connection on socket %d\n",
+            _("Accepted connection on socket %d\n"),
             s);
 #endif
 #endif
@@ -2443,7 +2515,7 @@
 
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
        (! MHD_mutex_lock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to acquire cleanup mutex\n");
+    MHD_PANIC (_("Failed to acquire cleanup mutex\n"));
   while (NULL != (pos = daemon->cleanup_head))
     {
       DLL_remove (daemon->cleanup_head,
@@ -2454,7 +2526,7 @@
        {
          if (! MHD_join_thread_ (pos->pid))
            {
-             MHD_PANIC ("Failed to join a thread\n");
+             MHD_PANIC (_("Failed to join a thread\n"));
            }
        }
       MHD_pool_destroy (pos->pool);
@@ -2471,7 +2543,9 @@
                                    pos,
                                    &pos->socket_context,
                                    MHD_CONNECTION_NOTIFY_CLOSED);
-      MHD_ip_limit_del (daemon, pos->addr, pos->addr_len);
+      MHD_ip_limit_del (daemon,
+                        pos->addr,
+                        pos->addr_len);
 #ifdef EPOLL_SUPPORT
       if (0 != (daemon->options & MHD_USE_EPOLL))
         {
@@ -2495,7 +2569,7 @@
                                   EPOLL_CTL_DEL,
                                   pos->socket_fd,
                                   NULL))
-                MHD_PANIC ("Failed to remove FD from epoll set\n");
+                MHD_PANIC (_("Failed to remove FD from epoll set\n"));
               pos->epoll_state &= ~MHD_EPOLL_STATE_IN_EPOLL_SET;
             }
         }
@@ -2508,7 +2582,7 @@
       if (MHD_INVALID_SOCKET != pos->socket_fd)
        {
          if (0 != MHD_socket_close_ (pos->socket_fd))
-           MHD_PANIC ("close failed\n");
+           MHD_PANIC (_("close failed\n"));
        }
       if (NULL != pos->addr)
        free (pos->addr);
@@ -2516,7 +2590,7 @@
     }
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
        (! MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to release cleanup mutex\n");
+    MHD_PANIC (_("Failed to release cleanup mutex\n"));
 }
 
 
@@ -2547,7 +2621,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Illegal call to MHD_get_timeout\n");
+                _("Illegal call to MHD_get_timeout\n"));
 #endif
       return MHD_NO;
     }
@@ -2651,7 +2725,8 @@
   /* Do it before any other processing so new signals
      will trigger select again and will be processed */
   if ((MHD_INVALID_PIPE_ != daemon->wpipe[0]) &&
-      (FD_ISSET (daemon->wpipe[0], read_fd_set)))
+      (FD_ISSET (daemon->wpipe[0],
+                 read_fd_set)))
     MHD_pipe_drain_ (daemon->wpipe[0]);
 
   /* Resuming external connections when using an extern mainloop  */
@@ -2663,9 +2738,11 @@
     {
       /* we're in epoll mode, the epoll FD stands for
         the entire event set! */
-      if (! MHD_SCKT_FD_FITS_FDSET_(daemon->epoll_fd, NULL))
+      if (! MHD_SCKT_FD_FITS_FDSET_(daemon->epoll_fd,
+                                    NULL))
        return MHD_NO; /* poll fd too big, fail hard */
-      if (FD_ISSET (daemon->epoll_fd, read_fd_set))
+      if (FD_ISSET (daemon->epoll_fd,
+                    read_fd_set))
        return MHD_run (daemon);
       return MHD_YES;
     }
@@ -2673,7 +2750,8 @@
 
   /* select connection thread handling type */
   if ( (MHD_INVALID_SOCKET != (ds = daemon->socket_fd)) &&
-       (FD_ISSET (ds, read_fd_set)) )
+       (FD_ISSET (ds,
+                  read_fd_set)) )
     (void) MHD_accept_connection (daemon);
 
   if (0 == (daemon->options & MHD_USE_THREAD_PER_CONNECTION))
@@ -2687,8 +2765,10 @@
           if (MHD_INVALID_SOCKET == ds)
            continue;
           call_handlers (pos,
-                         FD_ISSET (ds, read_fd_set),
-                         FD_ISSET (ds, write_fd_set),
+                         FD_ISSET (ds,
+                                   read_fd_set),
+                         FD_ISSET (ds,
+                                   write_fd_set),
                          MHD_NO);
         }
     }
@@ -2759,7 +2839,7 @@
         {
 #ifdef HAVE_MESSAGES
         MHD_DLOG (daemon,
-                  "Could not obtain daemon fdsets");
+                  _("Could not obtain daemon fdsets"));
 #endif
           err_state = MHD_YES;
         }
@@ -2775,7 +2855,7 @@
         {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Could not add listen socket to fdset");
+                    _("Could not add listen socket to fdset"));
 #endif
           return MHD_NO;
         }
@@ -2792,7 +2872,8 @@
          from fdset and retry to add pipe FD. */
       if (MHD_INVALID_SOCKET != daemon->socket_fd)
         {
-          FD_CLR (daemon->socket_fd, &rs);
+          FD_CLR (daemon->socket_fd,
+                  &rs);
           if (! MHD_add_to_fd_set_ (daemon->wpipe[0],
                                     &rs,
                                     &maxsock,
@@ -2801,7 +2882,7 @@
 #endif /* MHD_WINSOCK_SOCKETS */
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "Could not add control pipe FD to fdset");
+                        _("Could not add control pipe FD to fdset"));
 #endif
               err_state = MHD_YES;
 #if defined(MHD_WINSOCK_SOCKETS)
@@ -2858,12 +2939,15 @@
         return (MHD_NO == err_state) ? MHD_YES : MHD_NO;
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "select failed: %s\n",
+                _("select failed: %s\n"),
                 MHD_socket_strerr_ (err));
 #endif
       return MHD_NO;
     }
-  if (MHD_YES == MHD_run_from_select (daemon, &rs, &ws, &es))
+  if (MHD_YES == MHD_run_from_select (daemon,
+                                      &rs,
+                                      &ws,
+                                      &es))
     return (MHD_NO == err_state) ? MHD_YES : MHD_NO;
   return MHD_NO;
 }
@@ -2915,13 +2999,15 @@
     if (NULL == p)
       {
 #ifdef HAVE_MESSAGES
-        MHD_DLOG(daemon,
-                 "Error allocating memory: %s\n",
-                 MHD_strerror_(errno));
+        MHD_DLOG (daemon,
+                  _("Error allocating memory: %s\n"),
+                  MHD_strerror_(errno));
 #endif
         return MHD_NO;
       }
-    memset (p, 0, sizeof (struct pollfd) * (2 + num_connections));
+    memset (p,
+            0,
+            sizeof (struct pollfd) * (2 + num_connections));
     poll_server = 0;
     poll_listen = -1;
     if ( (MHD_INVALID_SOCKET != daemon->socket_fd) &&
@@ -2947,7 +3033,8 @@
     if (may_block == MHD_NO)
       timeout = 0;
     else if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) ||
-             (MHD_YES != MHD_get_timeout (daemon, &ltimeout)) )
+             (MHD_YES != MHD_get_timeout (daemon,
+                                           &ltimeout)) )
       timeout = -1;
     else
       timeout = (ltimeout > INT_MAX) ? INT_MAX : (int) ltimeout;
@@ -3010,7 +3097,7 @@
       }
 #ifdef HAVE_MESSAGES
        MHD_DLOG (daemon,
-                 "poll failed: %s\n",
+                 _("poll failed: %s\n"),
                  MHD_socket_strerr_ (err));
 #endif
         free(p);
@@ -3101,7 +3188,9 @@
   unsigned int poll_count;
   int poll_listen;
 
-  memset (&p, 0, sizeof (p));
+  memset (&p,
+          0,
+          sizeof (p));
   poll_count = 0;
   poll_listen = -1;
   if (MHD_INVALID_SOCKET != daemon->socket_fd)
@@ -3125,14 +3214,17 @@
     timeout = -1;
   if (0 == poll_count)
     return MHD_YES;
-  if (MHD_sys_poll_(p, poll_count, timeout) < 0)
+  if (MHD_sys_poll_(p,
+                    poll_count,
+                    timeout) < 0)
     {
       const int err = MHD_socket_get_error_ ();
+
       if (MHD_SCKT_ERR_IS_EINTR_ (err))
        return MHD_YES;
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "poll failed: %s\n",
+                _("poll failed: %s\n"),
                 MHD_socket_strerr_ (err));
 #endif
       return MHD_NO;
@@ -3163,9 +3255,10 @@
   if (MHD_YES == daemon->shutdown)
     return MHD_NO;
   if (0 == (daemon->options & MHD_USE_THREAD_PER_CONNECTION))
-    return MHD_poll_all (daemon, may_block);
-  else
-    return MHD_poll_listen_socket (daemon, may_block);
+    return MHD_poll_all (daemon,
+                         may_block);
+  return MHD_poll_listen_socket (daemon,
+                                 may_block);
 #else
   return MHD_NO;
 #endif
@@ -3216,7 +3309,7 @@
            return MHD_YES;
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Call to epoll_wait failed: %s\n",
+                    _("Call to epoll_wait failed: %s\n"),
                     MHD_socket_strerr_ (err));
 #endif
          return MHD_NO;
@@ -3311,7 +3404,7 @@
        {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Call to epoll_ctl failed: %s\n",
+                    _("Call to epoll_ctl failed: %s\n"),
                     MHD_socket_last_strerr_ ());
 #endif
          return MHD_NO;
@@ -3331,7 +3424,7 @@
        {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Call to epoll_ctl failed: %s\n",
+                    _("Call to epoll_ctl failed: %s\n"),
                     MHD_socket_last_strerr_ ());
 #endif
          return MHD_NO;
@@ -3349,7 +3442,7 @@
                          EPOLL_CTL_DEL,
                          daemon->socket_fd,
                          NULL))
-       MHD_PANIC ("Failed to remove listen FD from epoll set\n");
+       MHD_PANIC (_("Failed to remove listen FD from epoll set\n"));
       daemon->listen_socket_in_epoll = MHD_NO;
     }
   if (MHD_YES == may_block)
@@ -3387,7 +3480,7 @@
            return MHD_YES;
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Call to epoll_wait failed: %s\n",
+                    _("Call to epoll_wait failed: %s\n"),
                     MHD_socket_strerr_ (err));
 #endif
          return MHD_NO;
@@ -3566,7 +3659,7 @@
  * Thread that runs the select loop until the daemon
  * is explicitly shut down.
  *
- * @param cls 'struct MHD_Deamon' to run select loop in a thread for
+ * @param cls `struct MHD_Deamon` to run select loop in a thread for
  * @return always 0 (on shutdown)
  */
 static MHD_THRD_RTRN_TYPE_ MHD_THRD_CALL_SPEC_
@@ -3631,13 +3724,22 @@
                   uint16_t port,
                   MHD_AcceptPolicyCallback apc,
                   void *apc_cls,
-                  MHD_AccessHandlerCallback dh, void *dh_cls, ...)
+                  MHD_AccessHandlerCallback dh,
+                  void *dh_cls,
+                  ...)
 {
   struct MHD_Daemon *daemon;
   va_list ap;
 
-  va_start (ap, dh_cls);
-  daemon = MHD_start_daemon_va (flags, port, apc, apc_cls, dh, dh_cls, ap);
+  va_start (ap,
+            dh_cls);
+  daemon = MHD_start_daemon_va (flags,
+                                port,
+                                apc,
+                                apc_cls,
+                                dh,
+                                dh_cls,
+                                ap);
   va_end (ap);
   return daemon;
 }
@@ -3694,7 +3796,7 @@
                                EPOLL_CTL_DEL,
                                ret,
                                NULL))
-             MHD_PANIC ("Failed to remove listen FD from epoll set\n");
+             MHD_PANIC (_("Failed to remove listen FD from epoll set\n"));
            daemon->worker_pool[i].listen_socket_in_epoll = MHD_NO;
          }
         else
@@ -3701,8 +3803,10 @@
 #endif
         if (MHD_INVALID_PIPE_ != daemon->worker_pool[i].wpipe[1])
           {
-            if (1 != MHD_pipe_write_ (daemon->worker_pool[i].wpipe[1], "q", 1))
-              MHD_PANIC ("failed to signal quiesce via pipe");
+            if (1 != MHD_pipe_write_ (daemon->worker_pool[i].wpipe[1],
+                                      "q",
+                                      1))
+              MHD_PANIC (_("Failed to signal quiesce via pipe"));
           }
       }
   daemon->socket_fd = MHD_INVALID_SOCKET;
@@ -3722,8 +3826,10 @@
 #endif
   if (MHD_INVALID_PIPE_ != daemon->wpipe[1])
     {
-      if (1 != MHD_pipe_write_ (daemon->wpipe[1], "q", 1))
-       MHD_PANIC ("failed to signal quiesce via pipe");
+      if (1 != MHD_pipe_write_ (daemon->wpipe[1],
+                                "q",
+                                1))
+       MHD_PANIC (_("failed to signal quiesce via pipe"));
     }
 
   return ret;
@@ -3774,7 +3880,9 @@
   int ret;
 
   va_start (ap, servaddr);
-  ret = parse_options_va (daemon, servaddr, ap);
+  ret = parse_options_va (daemon,
+                          servaddr,
+                          ap);
   va_end (ap);
   return ret;
 }
@@ -3806,45 +3914,55 @@
       switch (opt)
         {
         case MHD_OPTION_CONNECTION_MEMORY_LIMIT:
-          daemon->pool_size = va_arg (ap, size_t);
+          daemon->pool_size = va_arg (ap,
+                                      size_t);
           break;
         case MHD_OPTION_CONNECTION_MEMORY_INCREMENT:
-          daemon->pool_increment= va_arg (ap, size_t);
+          daemon->pool_increment= va_arg (ap,
+                                          size_t);
           break;
         case MHD_OPTION_CONNECTION_LIMIT:
-          daemon->connection_limit = va_arg (ap, unsigned int);
+          daemon->connection_limit = va_arg (ap,
+                                             unsigned int);
           break;
         case MHD_OPTION_CONNECTION_TIMEOUT:
-          daemon->connection_timeout = va_arg (ap, unsigned int);
+          daemon->connection_timeout = va_arg (ap,
+                                               unsigned int);
           break;
         case MHD_OPTION_NOTIFY_COMPLETED:
-          daemon->notify_completed =
-            va_arg (ap, MHD_RequestCompletedCallback);
-          daemon->notify_completed_cls = va_arg (ap, void *);
+          daemon->notify_completed = va_arg (ap,
+                                             MHD_RequestCompletedCallback);
+          daemon->notify_completed_cls = va_arg (ap,
+                                                 void *);
           break;
         case MHD_OPTION_NOTIFY_CONNECTION:
-          daemon->notify_connection =
-            va_arg (ap, MHD_NotifyConnectionCallback);
-          daemon->notify_connection_cls = va_arg (ap, void *);
+          daemon->notify_connection = va_arg (ap,
+                                              MHD_NotifyConnectionCallback);
+          daemon->notify_connection_cls = va_arg (ap,
+                                                  void *);
           break;
         case MHD_OPTION_PER_IP_CONNECTION_LIMIT:
-          daemon->per_ip_connection_limit = va_arg (ap, unsigned int);
+          daemon->per_ip_connection_limit = va_arg (ap,
+                                                    unsigned int);
           break;
         case MHD_OPTION_SOCK_ADDR:
-          *servaddr = va_arg (ap, const struct sockaddr *);
+          *servaddr = va_arg (ap,
+                              const struct sockaddr *);
           break;
         case MHD_OPTION_URI_LOG_CALLBACK:
-          daemon->uri_log_callback =
-            va_arg (ap, LogCallback);
-          daemon->uri_log_callback_cls = va_arg (ap, void *);
+          daemon->uri_log_callback = va_arg (ap,
+                                             LogCallback);
+          daemon->uri_log_callback_cls = va_arg (ap,
+                                                 void *);
           break;
         case MHD_OPTION_THREAD_POOL_SIZE:
-          daemon->worker_pool_size = va_arg (ap, unsigned int);
+          daemon->worker_pool_size = va_arg (ap,
+                                             unsigned int);
          if (daemon->worker_pool_size >= (SIZE_MAX / sizeof (struct 
MHD_Daemon)))
            {
 #ifdef HAVE_MESSAGES
              MHD_DLOG (daemon,
-                       "Specified thread pool size (%u) too big\n",
+                       _("Specified thread pool size (%u) too big\n"),
                        daemon->worker_pool_size);
 #endif
              return MHD_NO;
@@ -3853,51 +3971,57 @@
 #if HTTPS_SUPPORT
         case MHD_OPTION_HTTPS_MEM_KEY:
          if (0 != (daemon->options & MHD_USE_SSL))
-           daemon->https_mem_key = va_arg (ap, const char *);
+           daemon->https_mem_key = va_arg (ap,
+                                            const char *);
 #ifdef HAVE_MESSAGES
          else
            MHD_DLOG (daemon,
-                     "MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n",
+                     _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n"),
                      opt);
 #endif
           break;
         case MHD_OPTION_HTTPS_KEY_PASSWORD:
          if (0 != (daemon->options & MHD_USE_SSL))
-           daemon->https_key_password = va_arg (ap, const char *);
+           daemon->https_key_password = va_arg (ap,
+                                                 const char *);
 #ifdef HAVE_MESSAGES
          else
            MHD_DLOG (daemon,
-                     "MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n",
+                     _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n"),
                      opt);
 #endif
           break;
         case MHD_OPTION_HTTPS_MEM_CERT:
          if (0 != (daemon->options & MHD_USE_SSL))
-           daemon->https_mem_cert = va_arg (ap, const char *);
+           daemon->https_mem_cert = va_arg (ap,
+                                             const char *);
 #ifdef HAVE_MESSAGES
          else
            MHD_DLOG (daemon,
-                     "MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n",
+                     _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n"),
                      opt);
 #endif
           break;
         case MHD_OPTION_HTTPS_MEM_TRUST:
          if (0 != (daemon->options & MHD_USE_SSL))
-           daemon->https_mem_trust = va_arg (ap, const char *);
+           daemon->https_mem_trust = va_arg (ap,
+                                              const char *);
 #ifdef HAVE_MESSAGES
          else
            MHD_DLOG (daemon,
-                     "MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n",
+                     _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n"),
                      opt);
 #endif
           break;
        case MHD_OPTION_HTTPS_CRED_TYPE:
-         daemon->cred_type = (gnutls_credentials_type_t) va_arg (ap, int);
+         daemon->cred_type = (gnutls_credentials_type_t) va_arg (ap,
+                                                                  int);
          break;
         case MHD_OPTION_HTTPS_MEM_DHPARAMS:
           if (0 != (daemon->options & MHD_USE_SSL))
             {
-              const char *arg = va_arg (ap, const char *);
+              const char *arg = va_arg (ap,
+                                        const char *);
               gnutls_datum_t dhpar;
 
               if (gnutls_dh_params_init (&daemon->https_mem_dhparams) < 0)
@@ -3904,18 +4028,19 @@
                 {
 #ifdef HAVE_MESSAGES
                   MHD_DLOG (daemon,
-                            "Error initializing DH parameters\n");
+                            _("Error initializing DH parameters\n"));
 #endif
                   return MHD_NO;
                 }
               dhpar.data = (unsigned char *) arg;
               dhpar.size = strlen (arg);
-              if (gnutls_dh_params_import_pkcs3 (daemon->https_mem_dhparams, 
&dhpar,
+              if (gnutls_dh_params_import_pkcs3 (daemon->https_mem_dhparams,
+                                                 &dhpar,
                                                  GNUTLS_X509_FMT_PEM) < 0)
                 {
 #ifdef HAVE_MESSAGES
                   MHD_DLOG (daemon,
-                            "Bad Diffie-Hellman parameters format\n");
+                            _("Bad Diffie-Hellman parameters format\n"));
 #endif
                   gnutls_dh_params_deinit (daemon->https_mem_dhparams);
                   return MHD_NO;
@@ -3926,7 +4051,7 @@
             {
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "MHD HTTPS option %d passed to MHD but MHD_USE_SSL not 
set\n",
+                        _("MHD HTTPS option %d passed to MHD but MHD_USE_SSL 
not set\n"),
                         opt);
 #endif
               return MHD_NO;
@@ -3943,7 +4068,7 @@
              {
 #ifdef HAVE_MESSAGES
                MHD_DLOG (daemon,
-                         "Setting priorities to `%s' failed: %s\n",
+                         _("Setting priorities to `%s' failed: %s\n"),
                          pstr,
                          gnutls_strerror (ret));
 #endif
@@ -3956,50 +4081,62 @@
 #if GNUTLS_VERSION_MAJOR < 3
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "MHD_OPTION_HTTPS_CERT_CALLBACK requires building MHD with 
GnuTLS >= 3.0\n");
+                    _("MHD_OPTION_HTTPS_CERT_CALLBACK requires building MHD 
with GnuTLS >= 3.0\n"));
 #endif
           return MHD_NO;
 #else
           if (0 != (daemon->options & MHD_USE_SSL))
-            daemon->cert_callback = va_arg (ap, 
gnutls_certificate_retrieve_function2 *);
+            daemon->cert_callback = va_arg (ap,
+                                            
gnutls_certificate_retrieve_function2 *);
           break;
 #endif
 #endif
 #ifdef DAUTH_SUPPORT
        case MHD_OPTION_DIGEST_AUTH_RANDOM:
-         daemon->digest_auth_rand_size = va_arg (ap, size_t);
-         daemon->digest_auth_random = va_arg (ap, const char *);
+         daemon->digest_auth_rand_size = va_arg (ap,
+                                                  size_t);
+         daemon->digest_auth_random = va_arg (ap,
+                                               const char *);
          break;
        case MHD_OPTION_NONCE_NC_SIZE:
-         daemon->nonce_nc_size = va_arg (ap, unsigned int);
+         daemon->nonce_nc_size = va_arg (ap,
+                                          unsigned int);
          break;
 #endif
        case MHD_OPTION_LISTEN_SOCKET:
-         daemon->socket_fd = va_arg (ap, MHD_socket);
+         daemon->socket_fd = va_arg (ap,
+                                      MHD_socket);
          break;
         case MHD_OPTION_EXTERNAL_LOGGER:
 #ifdef HAVE_MESSAGES
-          daemon->custom_error_log =
-            va_arg (ap, VfprintfFunctionPointerType);
-          daemon->custom_error_log_cls = va_arg (ap, void *);
+          daemon->custom_error_log = va_arg (ap,
+                                             VfprintfFunctionPointerType);
+          daemon->custom_error_log_cls = va_arg (ap,
+                                                 void *);
 #else
-          va_arg (ap, VfprintfFunctionPointerType);
-          va_arg (ap, void *);
+          va_arg (ap,
+                  VfprintfFunctionPointerType);
+          va_arg (ap,
+                  void *);
 #endif
           break;
         case MHD_OPTION_THREAD_STACK_SIZE:
-          daemon->thread_stack_size = va_arg (ap, size_t);
+          daemon->thread_stack_size = va_arg (ap,
+                                              size_t);
           break;
 #ifdef TCP_FASTOPEN
         case MHD_OPTION_TCP_FASTOPEN_QUEUE_SIZE:
-          daemon->fastopen_queue_size = va_arg (ap, unsigned int);
+          daemon->fastopen_queue_size = va_arg (ap,
+                                                unsigned int);
           break;
 #endif
        case MHD_OPTION_LISTENING_ADDRESS_REUSE:
-         daemon->listening_address_reuse = va_arg (ap, unsigned int) ? 1 : -1;
+         daemon->listening_address_reuse = va_arg (ap,
+                                                    unsigned int) ? 1 : -1;
          break;
        case MHD_OPTION_LISTEN_BACKLOG_SIZE:
-         daemon->listen_backlog_size = va_arg (ap, unsigned int);
+         daemon->listen_backlog_size = va_arg (ap,
+                                                unsigned int);
          break;
        case MHD_OPTION_ARRAY:
          oa = va_arg (ap, struct MHD_OptionItem*);
@@ -4101,23 +4238,25 @@
            }
          break;
         case MHD_OPTION_UNESCAPE_CALLBACK:
-          daemon->unescape_callback =
-            va_arg (ap, UnescapeCallback);
-          daemon->unescape_callback_cls = va_arg (ap, void *);
+          daemon->unescape_callback = va_arg (ap,
+                                              UnescapeCallback);
+          daemon->unescape_callback_cls = va_arg (ap,
+                                                  void *);
           break;
         default:
 #ifdef HAVE_MESSAGES
-          if (((opt >= MHD_OPTION_HTTPS_MEM_KEY) &&
-              (opt <= MHD_OPTION_HTTPS_PRIORITIES)) || (opt == 
MHD_OPTION_HTTPS_MEM_TRUST))
+          if ( ( (opt >= MHD_OPTION_HTTPS_MEM_KEY) &&
+                 (opt <= MHD_OPTION_HTTPS_PRIORITIES) ) ||
+               (opt == MHD_OPTION_HTTPS_MEM_TRUST))
             {
               MHD_DLOG (daemon,
-                       "MHD HTTPS option %d passed to MHD compiled without 
HTTPS support\n",
+                       _("MHD HTTPS option %d passed to MHD compiled without 
HTTPS support\n"),
                        opt);
             }
           else
             {
               MHD_DLOG (daemon,
-                       "Invalid option %d! (Did you terminate the list with 
MHD_OPTION_END?)\n",
+                       _("Invalid option %d! (Did you terminate the list with 
MHD_OPTION_END?)\n"),
                        opt);
             }
 #endif
@@ -4143,7 +4282,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Call to epoll_create1 failed: %s\n",
+                _("Call to epoll_create1 failed: %s\n"),
                 MHD_socket_last_strerr_ ());
 #endif
       return MHD_INVALID_SOCKET;
@@ -4153,7 +4292,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Failed to set noninheritable mode on epoll FD.\n");
+                _("Failed to set noninheritable mode on epoll FD.\n"));
 #endif
     }
 #endif /* ! USE_EPOLL_CREATE1 */
@@ -4195,7 +4334,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Call to epoll_ctl failed: %s\n",
+                _("Call to epoll_ctl failed: %s\n"),
                 MHD_socket_last_strerr_ ());
 #endif
       return MHD_NO;
@@ -4213,7 +4352,7 @@
         {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Call to epoll_ctl failed: %s\n",
+                    _("Call to epoll_ctl failed: %s\n"),
                     MHD_socket_last_strerr_ ());
 #endif
           return MHD_NO;
@@ -4247,7 +4386,8 @@
                      uint16_t port,
                      MHD_AcceptPolicyCallback apc,
                      void *apc_cls,
-                     MHD_AccessHandlerCallback dh, void *dh_cls,
+                     MHD_AccessHandlerCallback dh,
+                     void *dh_cls,
                     va_list ap)
 {
   const MHD_SCKT_OPT_BOOL_ on = 1;
@@ -4282,7 +4422,9 @@
     return NULL;
   if (NULL == (daemon = malloc (sizeof (struct MHD_Daemon))))
     return NULL;
-  memset (daemon, 0, sizeof (struct MHD_Daemon));
+  memset (daemon,
+          0,
+          sizeof (struct MHD_Daemon));
 #ifdef EPOLL_SUPPORT
   daemon->epoll_fd = -1;
 #if HTTPS_SUPPORT
@@ -4332,11 +4474,11 @@
     use_pipe = 0; /* useless if we are using 'external' select */
   if (use_pipe)
   {
-    if (!MHD_pipe_ (daemon->wpipe))
+    if (! MHD_pipe_ (daemon->wpipe))
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "Failed to create control pipe: %s\n",
+               _("Failed to create control pipe: %s\n"),
                MHD_pipe_last_strerror_ ());
 #endif
       free (daemon);
@@ -4346,13 +4488,13 @@
       {
 #ifdef HAVE_MESSAGES
         MHD_DLOG (daemon,
-                 "Failed to make read side of inter-thread control channel 
non-blocking: %s\n",
+                 _("Failed to make read side of inter-thread control channel 
non-blocking: %s\n"),
                  MHD_pipe_last_strerror_ ());
 #endif
         if (0 != MHD_pipe_close_ (daemon->wpipe[0]))
-          MHD_PANIC ("close failed\n");
+          MHD_PANIC (_("close failed\n"));
         if (0 != MHD_pipe_close_ (daemon->wpipe[1]))
-          MHD_PANIC ("close failed\n");
+          MHD_PANIC (_("close failed\n"));
         free (daemon);
         return NULL;
       }
@@ -4360,7 +4502,7 @@
       {
 #ifdef HAVE_MESSAGES
         MHD_DLOG (daemon,
-                  "Failed to make write side of inter-thread control channel 
non-blocking: %s\n",
+                  _("Failed to make write side of inter-thread control channel 
non-blocking: %s\n"),
                   MHD_pipe_last_strerror_ ());
 #endif
       }
@@ -4367,16 +4509,17 @@
   }
   if ( (0 == (flags & (MHD_USE_POLL | MHD_USE_EPOLL))) &&
        (1 == use_pipe) &&
-       (! MHD_SCKT_FD_FITS_FDSET_(daemon->wpipe[0], NULL)) )
+       (! MHD_SCKT_FD_FITS_FDSET_(daemon->wpipe[0],
+                                  NULL)) )
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "file descriptor for control pipe exceeds maximum value\n");
+               _("file descriptor for control pipe exceeds maximum value\n"));
 #endif
       if (0 != MHD_pipe_close_ (daemon->wpipe[0]))
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       if (0 != MHD_pipe_close_ (daemon->wpipe[1]))
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       free (daemon);
       return NULL;
     }
@@ -4393,7 +4536,9 @@
 #endif
 
 
-  if (MHD_YES != parse_options_va (daemon, &servaddr, ap))
+  if (MHD_YES != parse_options_va (daemon,
+                                   &servaddr,
+                                   ap))
     {
 #if HTTPS_SUPPORT
       if ( (0 != (flags & MHD_USE_SSL)) &&
@@ -4411,7 +4556,7 @@
        {
 #ifdef HAVE_MESSAGES
          MHD_DLOG (daemon,
-                   "Specified value for NC_SIZE too large\n");
+                   _("Specified value for NC_SIZE too large\n"));
 #endif
 #if HTTPS_SUPPORT
          if (0 != (flags & MHD_USE_SSL))
@@ -4425,7 +4570,7 @@
        {
 #ifdef HAVE_MESSAGES
          MHD_DLOG (daemon,
-                   "Failed to allocate memory for nonce-nc map: %s\n",
+                   _("Failed to allocate memory for nonce-nc map: %s\n"),
                    MHD_strerror_ (errno));
 #endif
 #if HTTPS_SUPPORT
@@ -4437,11 +4582,11 @@
        }
     }
 
-  if (!MHD_mutex_init_ (&daemon->nnc_lock))
+  if (! MHD_mutex_init_ (&daemon->nnc_lock))
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "MHD failed to initialize nonce-nc mutex\n");
+               _("MHD failed to initialize nonce-nc mutex\n"));
 #endif
 #if HTTPS_SUPPORT
       if (0 != (flags & MHD_USE_SSL))
@@ -4459,7 +4604,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "MHD thread pooling only works with 
MHD_USE_SELECT_INTERNALLY\n");
+               _("MHD thread pooling only works with 
MHD_USE_SELECT_INTERNALLY\n"));
 #endif
       goto free_and_fail;
     }
@@ -4469,7 +4614,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Combining MHD_USE_THREAD_PER_CONNECTION and 
MHD_USE_SUSPEND_RESUME is not supported.\n");
+                _("Combining MHD_USE_THREAD_PER_CONNECTION and 
MHD_USE_SUSPEND_RESUME is not supported.\n"));
 #endif
       goto free_and_fail;
     }
@@ -4479,7 +4624,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "Threaded operations are not supported on Symbian.\n");
+               _("Threaded operations are not supported on Symbian.\n"));
 #endif
       goto free_and_fail;
     }
@@ -4493,7 +4638,7 @@
        {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Failed to create socket for listening: %s\n",
+                    _("Failed to create socket for listening: %s\n"),
                     MHD_socket_last_strerr_ ());
 #endif
          goto free_and_fail;
@@ -4511,7 +4656,7 @@
           {
 #ifdef HAVE_MESSAGES
             MHD_DLOG (daemon,
-                      "setsockopt failed: %s\n",
+                      _("setsockopt failed: %s\n"),
                       MHD_socket_last_strerr_ ());
 #endif
           }
@@ -4550,11 +4695,12 @@
           if (0 > setsockopt (socket_fd,
                               SOL_SOCKET,
                               SO_REUSEPORT,
-                              (void*)&on, sizeof (on)))
+                              (void *) &on,
+                              sizeof (on)))
             {
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "setsockopt failed: %s\n",
+                        _("setsockopt failed: %s\n"),
                         MHD_socket_last_strerr_ ());
 #endif
               goto free_and_fail;
@@ -4564,7 +4710,7 @@
              on this platform we cannot; fail hard */
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Cannot allow listening address reuse: SO_REUSEPORT not 
defined\n");
+                    _("Cannot allow listening address reuse: SO_REUSEPORT not 
defined\n"));
 #endif
           goto free_and_fail;
 #endif
@@ -4581,11 +4727,12 @@
           if (0 > setsockopt (socket_fd,
                               SOL_SOCKET,
                               SO_EXCLUSIVEADDRUSE,
-                              (void*)&on, sizeof (on)))
+                              (void *) &on,
+                              sizeof (on)))
             {
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "setsockopt failed: %s\n",
+                        _("setsockopt failed: %s\n"),
                         MHD_socket_last_strerr_ ());
 #endif
               goto free_and_fail;
@@ -4593,7 +4740,7 @@
 #else /* SO_EXCLUSIVEADDRUSE not defined on W32? */
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Cannot disallow listening address reuse: 
SO_EXCLUSIVEADDRUSE not defined\n");
+                    _("Cannot disallow listening address reuse: 
SO_EXCLUSIVEADDRUSE not defined\n"));
 #endif
           goto free_and_fail;
 #endif
@@ -4612,7 +4759,9 @@
 #if HAVE_INET6
          if (0 != (flags & MHD_USE_IPv6))
            {
-             memset (&servaddr6, 0, sizeof (struct sockaddr_in6));
+             memset (&servaddr6,
+                      0,
+                      sizeof (struct sockaddr_in6));
              servaddr6.sin6_family = AF_INET6;
              servaddr6.sin6_port = htons (port);
 #if HAVE_SOCKADDR_IN_SIN_LEN
@@ -4623,7 +4772,9 @@
          else
 #endif
            {
-             memset (&servaddr4, 0, sizeof (struct sockaddr_in));
+             memset (&servaddr4,
+                      0,
+                      sizeof (struct sockaddr_in));
              servaddr4.sin_family = AF_INET;
              servaddr4.sin_port = htons (port);
 #if HAVE_SOCKADDR_IN_SIN_LEN
@@ -4646,11 +4797,12 @@
             (MHD_USE_DUAL_STACK != (flags & MHD_USE_DUAL_STACK));
          if (0 > setsockopt (socket_fd,
                               IPPROTO_IPV6, IPV6_V6ONLY,
-                              (const void*)&v6_only, sizeof (v6_only)))
+                              (const void *) &v6_only,
+                              sizeof (v6_only)))
       {
 #ifdef HAVE_MESSAGES
             MHD_DLOG (daemon,
-                      "setsockopt failed: %s\n",
+                      _("setsockopt failed: %s\n"),
                       MHD_socket_last_strerr_ ());
 #endif
       }
@@ -4661,12 +4813,12 @@
        {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Failed to bind to port %u: %s\n",
+                    _("Failed to bind to port %u: %s\n"),
                     (unsigned int) port,
                     MHD_socket_last_strerr_ ());
 #endif
          if (0 != MHD_socket_close_ (socket_fd))
-           MHD_PANIC ("close failed\n");
+           MHD_PANIC (_("close failed\n"));
          goto free_and_fail;
        }
 #ifdef TCP_FASTOPEN
@@ -4675,27 +4827,29 @@
         if (0 == daemon->fastopen_queue_size)
           daemon->fastopen_queue_size = MHD_TCP_FASTOPEN_QUEUE_SIZE_DEFAULT;
         if (0 != setsockopt (socket_fd,
-                             IPPROTO_TCP, TCP_FASTOPEN,
+                             IPPROTO_TCP,
+                             TCP_FASTOPEN,
                              &daemon->fastopen_queue_size,
                              sizeof (daemon->fastopen_queue_size)))
         {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "setsockopt failed: %s\n",
+                    _("setsockopt failed: %s\n"),
                     MHD_socket_last_strerr_ ());
 #endif
         }
       }
 #endif
-      if (listen (socket_fd, daemon->listen_backlog_size) < 0)
+      if (listen (socket_fd,
+                  daemon->listen_backlog_size) < 0)
        {
 #ifdef HAVE_MESSAGES
           MHD_DLOG (daemon,
-                    "Failed to listen for connections: %s\n",
+                    _("Failed to listen for connections: %s\n"),
                     MHD_socket_last_strerr_ ());
 #endif
          if (0 != MHD_socket_close_ (socket_fd))
-           MHD_PANIC ("close failed\n");
+           MHD_PANIC (_("close failed\n"));
          goto free_and_fail;
        }
     }
@@ -4708,7 +4862,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Failed to set nonblocking mode on listening socket: %s\n",
+                _("Failed to set nonblocking mode on listening socket: %s\n"),
                 MHD_socket_last_strerr_());
 #endif
       if (0 != (flags & MHD_USE_EPOLL) ||
@@ -4718,21 +4872,22 @@
             * to handle a new connection, but only one will win the race.
             * The others must immediately return. */
           if (0 != MHD_socket_close_ (socket_fd))
-            MHD_PANIC ("close failed\n");
+            MHD_PANIC (_("close failed\n"));
           goto free_and_fail;
         }
     }
-  if ( (!MHD_SCKT_FD_FITS_FDSET_(socket_fd, NULL)) &&
+  if ( (!MHD_SCKT_FD_FITS_FDSET_(socket_fd,
+                                 NULL)) &&
        (0 == (flags & (MHD_USE_POLL | MHD_USE_EPOLL)) ) )
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Socket descriptor larger than FD_SETSIZE: %d > %d\n",
+                _("Socket descriptor larger than FD_SETSIZE: %d > %d\n"),
                 socket_fd,
                 FD_SETSIZE);
 #endif
       if (0 != MHD_socket_close_ (socket_fd))
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       goto free_and_fail;
     }
 
@@ -4745,7 +4900,7 @@
        {
 #ifdef HAVE_MESSAGES
          MHD_DLOG (daemon,
-                   "Combining MHD_USE_THREAD_PER_CONNECTION and MHD_USE_EPOLL 
is not supported.\n");
+                   _("Combining MHD_USE_THREAD_PER_CONNECTION and 
MHD_USE_EPOLL is not supported.\n"));
 #endif
          goto free_and_fail;
        }
@@ -4757,7 +4912,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "epoll is not supported on this platform by this build.\n");
+               _("epoll is not supported on this platform by this build.\n"));
 #endif
       goto free_and_fail;
     }
@@ -4767,11 +4922,11 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "MHD failed to initialize IP connection limit mutex\n");
+                _("MHD failed to initialize IP connection limit mutex\n"));
 #endif
       if ( (MHD_INVALID_SOCKET != socket_fd) &&
           (0 != MHD_socket_close_ (socket_fd)) )
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       goto free_and_fail;
     }
   if (! MHD_mutex_init_ (&daemon->cleanup_connection_mutex))
@@ -4778,26 +4933,27 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "MHD failed to initialize IP connection limit mutex\n");
+                _("MHD failed to initialize IP connection limit mutex\n"));
 #endif
       (void) MHD_mutex_destroy_ (&daemon->cleanup_connection_mutex);
       if ( (MHD_INVALID_SOCKET != socket_fd) &&
           (0 != MHD_socket_close_ (socket_fd)) )
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       goto free_and_fail;
     }
 
 #if HTTPS_SUPPORT
   /* initialize HTTPS daemon certificate aspects & send / recv functions */
-  if ((0 != (flags & MHD_USE_SSL)) && (0 != MHD_TLS_init (daemon)))
+  if ( (0 != (flags & MHD_USE_SSL)) &&
+       (0 != MHD_TLS_init (daemon)) )
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-               "Failed to initialize TLS support\n");
+               _("Failed to initialize TLS support\n"));
 #endif
       if ( (MHD_INVALID_SOCKET != socket_fd) &&
           (0 != MHD_socket_close_ (socket_fd)) )
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       (void) MHD_mutex_destroy_ (&daemon->cleanup_connection_mutex);
       (void) MHD_mutex_destroy_ (&daemon->per_ip_connection_mutex);
       goto free_and_fail;
@@ -4816,7 +4972,7 @@
     {
 #ifdef HAVE_MESSAGES
       MHD_DLOG (daemon,
-                "Failed to create listen thread: %s\n",
+                _("Failed to create listen thread: %s\n"),
                MHD_strerror_ (errno));
 #endif
       (void) MHD_mutex_destroy_ (&daemon->cleanup_connection_mutex);
@@ -4823,7 +4979,7 @@
       (void) MHD_mutex_destroy_ (&daemon->per_ip_connection_mutex);
       if ( (MHD_INVALID_SOCKET != socket_fd) &&
           (0 != MHD_socket_close_ (socket_fd)) )
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       goto free_and_fail;
     }
   if ( (daemon->worker_pool_size > 0) &&
@@ -4862,44 +5018,45 @@
           /* Always use individual control pipes */
           if (1)
             {
-              if (!MHD_pipe_ (d->wpipe))
+              if (! MHD_pipe_ (d->wpipe))
                 {
 #ifdef HAVE_MESSAGES
                   MHD_DLOG (daemon,
-                            "Failed to create worker control pipe: %s\n",
+                            _("Failed to create worker control pipe: %s\n"),
                             MHD_pipe_last_strerror_() );
 #endif
                   goto thread_failed;
                 }
-              if (!MHD_itc_nonblocking_(d->wpipe[0]))
+              if (! MHD_itc_nonblocking_(d->wpipe[0]))
                 {
 #ifdef HAVE_MESSAGES
                   MHD_DLOG (daemon,
-                            "Failed to make read side of worker inter-thread 
control channel non-blocking: %s\n",
+                            _("Failed to make read side of worker inter-thread 
control channel non-blocking: %s\n"),
                             MHD_pipe_last_strerror_ ());
 #endif
                   goto thread_failed;
                 }
-              if (!MHD_itc_nonblocking_(d->wpipe[1]))
+              if (! MHD_itc_nonblocking_(d->wpipe[1]))
                 {
 #ifdef HAVE_MESSAGES
                   MHD_DLOG (daemon,
-                            "Failed to make write side of worker inter-thread 
control channel non-blocking: %s\n",
+                            _("Failed to make write side of worker 
inter-thread control channel non-blocking: %s\n"),
                             MHD_pipe_last_strerror_ ());
 #endif
                 }
             }
           if ( (0 == (flags & (MHD_USE_POLL | MHD_USE_EPOLL))) &&
-               (!MHD_SCKT_FD_FITS_FDSET_(d->wpipe[0], NULL)) )
+               (! MHD_SCKT_FD_FITS_FDSET_(d->wpipe[0],
+                                          NULL)) )
             {
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "File descriptor for worker control pipe exceeds 
maximum value\n");
+                        _("File descriptor for worker control pipe exceeds 
maximum value\n"));
 #endif
               if (0 != MHD_pipe_close_ (d->wpipe[0]))
-                MHD_PANIC ("close failed\n");
+                MHD_PANIC (_("close failed\n"));
               if (0 != MHD_pipe_close_ (d->wpipe[1]))
-                MHD_PANIC ("close failed\n");
+                MHD_PANIC (_("close failed\n"));
               goto thread_failed;
             }
 
@@ -4915,11 +5072,11 @@
            goto thread_failed;
 #endif
           /* Must init cleanup connection mutex for each worker */
-          if (!MHD_mutex_init_ (&d->cleanup_connection_mutex))
+          if (! MHD_mutex_init_ (&d->cleanup_connection_mutex))
             {
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                       "MHD failed to initialize cleanup connection mutex for 
thread worker %d\n", i);
+                        _("MHD failed to initialize cleanup connection 
mutex\n"));
 #endif
               goto thread_failed;
             }
@@ -4933,7 +5090,7 @@
             {
 #ifdef HAVE_MESSAGES
               MHD_DLOG (daemon,
-                        "Failed to create pool thread: %s\n",
+                        _("Failed to create pool thread: %s\n"),
                        MHD_strerror_ (errno));
 #endif
               /* Free memory for this worker; cleanup below handles
@@ -4960,7 +5117,7 @@
     {
       if ( (MHD_INVALID_SOCKET != socket_fd) &&
           (0 != MHD_socket_close_ (socket_fd)) )
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       (void) MHD_mutex_destroy_ (&daemon->cleanup_connection_mutex);
       (void) MHD_mutex_destroy_ (&daemon->per_ip_connection_mutex);
       if (NULL != daemon->worker_pool)
@@ -4987,7 +5144,7 @@
                          EPOLL_CTL_DEL,
                          daemon->epoll_upgrade_fd,
                          NULL))
-       MHD_PANIC ("Failed to remove FD from epoll set\n");
+       MHD_PANIC (_("Failed to remove FD from epoll set\n"));
       daemon->upgrade_fd_in_epoll = MHD_NO;
     }
 #endif
@@ -5008,10 +5165,10 @@
 #endif
   if ( (MHD_INVALID_PIPE_ != daemon->wpipe[0]) &&
        (0 != MHD_pipe_close_ (daemon->wpipe[0])) )
-    MHD_PANIC ("close failed\n");
+    MHD_PANIC (_("close failed\n"));
   if ( (MHD_INVALID_PIPE_ != daemon->wpipe[1]) &&
        (0 != MHD_pipe_close_ (daemon->wpipe[1])) )
-    MHD_PANIC ("close failed\n");
+    MHD_PANIC (_("close failed\n"));
   free (daemon);
   return NULL;
 }
@@ -5065,10 +5222,10 @@
   /* first, make sure all threads are aware of shutdown; need to
      traverse DLLs in peace... */
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
-       (!MHD_mutex_lock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to acquire cleanup mutex\n");
+       (! MHD_mutex_lock_ (&daemon->cleanup_connection_mutex)) )
+    MHD_PANIC (_("Failed to acquire cleanup mutex\n"));
   if (NULL != daemon->suspended_connections_head)
-    MHD_PANIC ("MHD_stop_daemon() called while we have suspended 
connections.\n");
+    MHD_PANIC (_("MHD_stop_daemon() called while we have suspended 
connections.\n"));
   for (pos = daemon->connections_head; NULL != pos; pos = pos->next)
     {
       shutdown (pos->socket_fd, SHUT_RDWR);
@@ -5076,12 +5233,12 @@
       if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
            (MHD_INVALID_PIPE_ != daemon->wpipe[1]) &&
            (1 != MHD_pipe_write_ (daemon->wpipe[1], "e", 1)) )
-        MHD_PANIC ("Failed to signal shutdown via pipe");
+        MHD_PANIC (_("Failed to signal shutdown via pipe"));
 #endif
     }
   if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
-       (!MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
-    MHD_PANIC ("Failed to release cleanup mutex\n");
+       (! MHD_mutex_unlock_ (&daemon->cleanup_connection_mutex)) )
+    MHD_PANIC (_("Failed to release cleanup mutex\n"));
 
   /* now, collect per-connection threads */
   if (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION))
@@ -5091,8 +5248,8 @@
       {
         if (MHD_YES != pos->thread_joined)
           {
-            if (!MHD_join_thread_ (pos->pid))
-              MHD_PANIC ("Failed to join a thread\n");
+            if (! MHD_join_thread_ (pos->pid))
+              MHD_PANIC (_("Failed to join a thread\n"));
             pos->thread_joined = MHD_YES;
             /* The thread may have concurrently modified the DLL,
                need to restart from the beginning */
@@ -5107,7 +5264,7 @@
   {
     if ( (0 != (daemon->options & MHD_USE_THREAD_PER_CONNECTION)) &&
          (MHD_YES != pos->thread_joined) )
-      MHD_PANIC ("Failed to join a thread\n");
+      MHD_PANIC (_("Failed to join a thread\n"));
     close_connection (pos);
   }
   MHD_cleanup_connections (daemon);
@@ -5128,7 +5285,7 @@
   if (MHD_INVALID_PIPE_ == daemon->wpipe[1])
     {
       /* wpipe was required in this mode, how could this happen? */
-      MHD_PANIC ("Internal error\n");
+      MHD_PANIC (_("Internal error\n"));
     }
   event.events = EPOLLOUT;
   event.data.ptr = NULL;
@@ -5136,7 +5293,7 @@
                      EPOLL_CTL_ADD,
                      daemon->wpipe[1],
                      &event))
-    MHD_PANIC ("Failed to add wpipe to epoll set to signal termination\n");
+    MHD_PANIC (_("Failed to add wpipe to epoll set to signal termination\n"));
 }
 #endif
 
@@ -5180,7 +5337,7 @@
   if (MHD_INVALID_PIPE_ != daemon->wpipe[1])
     {
       if (1 != MHD_pipe_write_ (daemon->wpipe[1], "e", 1))
-       MHD_PANIC ("failed to signal shutdown via pipe");
+       MHD_PANIC (_("Failed to signal shutdown via pipe"));
     }
 #ifdef HAVE_LISTEN_SHUTDOWN
   else
@@ -5188,7 +5345,8 @@
       /* fd might be MHD_INVALID_SOCKET here due to 'MHD_quiesce_daemon' */
       if ( (MHD_INVALID_SOCKET != fd) &&
            (0 == (daemon->options & MHD_USE_PIPE_FOR_SHUTDOWN)) )
-       (void) shutdown (fd, SHUT_RDWR);
+       (void) shutdown (fd,
+                         SHUT_RDWR);
     }
 #endif
 #ifdef EPOLL_SUPPORT
@@ -5201,7 +5359,7 @@
 #if DEBUG_CLOSE
 #ifdef HAVE_MESSAGES
   MHD_DLOG (daemon,
-            "MHD listen socket shutdown\n");
+            _("MHD listen socket shutdown\n"));
 #endif
 #endif
 
@@ -5214,21 +5372,23 @@
        {
          if (MHD_INVALID_PIPE_ != daemon->worker_pool[i].wpipe[1])
            {
-             if (1 != MHD_pipe_write_ (daemon->worker_pool[i].wpipe[1], "e", 
1))
-               MHD_PANIC ("failed to signal shutdown via pipe");
+             if (1 != MHD_pipe_write_ (daemon->worker_pool[i].wpipe[1],
+                                        "e",
+                                        1))
+               MHD_PANIC (_("Failed to signal shutdown via pipe."));
            }
          if (!MHD_join_thread_ (daemon->worker_pool[i].pid))
-             MHD_PANIC ("Failed to join a thread\n");
+            MHD_PANIC (_("Failed to join a thread\n"));
          close_all_connections (&daemon->worker_pool[i]);
          (void) MHD_mutex_destroy_ 
(&daemon->worker_pool[i].cleanup_connection_mutex);
 #ifdef EPOLL_SUPPORT
          if ( (-1 != daemon->worker_pool[i].epoll_fd) &&
               (0 != MHD_socket_close_ (daemon->worker_pool[i].epoll_fd)) )
-           MHD_PANIC ("close failed\n");
+           MHD_PANIC (_("close failed\n"));
 #if HTTPS_SUPPORT
          if ( (-1 != daemon->worker_pool[i].epoll_upgrade_fd) &&
               (0 != MHD_socket_close_ 
(daemon->worker_pool[i].epoll_upgrade_fd)) )
-           MHD_PANIC ("close failed\n");
+           MHD_PANIC (_("close failed\n"));
 #endif
 #endif
           /* Individual pipes are always used */
@@ -5237,9 +5397,9 @@
               if (MHD_INVALID_PIPE_ != daemon->worker_pool[i].wpipe[1])
                 {
                   if (0 != MHD_pipe_close_ (daemon->worker_pool[i].wpipe[0]))
-                    MHD_PANIC ("close failed\n");
+                    MHD_PANIC (_("close failed\n"));
                   if (0 != MHD_pipe_close_ (daemon->worker_pool[i].wpipe[1]))
-                    MHD_PANIC ("close failed\n");
+                    MHD_PANIC (_("close failed\n"));
                 }
            }
        }
@@ -5254,7 +5414,7 @@
        {
          if (!MHD_join_thread_ (daemon->pid))
            {
-             MHD_PANIC ("Failed to join a thread\n");
+             MHD_PANIC (_("Failed to join a thread\n"));
            }
        }
     }
@@ -5261,7 +5421,7 @@
   close_all_connections (daemon);
   if ( (MHD_INVALID_SOCKET != fd) &&
        (0 != MHD_socket_close_ (fd)) )
-    MHD_PANIC ("close failed\n");
+    MHD_PANIC (_("close failed\n"));
 
   /* TLS clean up */
 #if HTTPS_SUPPORT
@@ -5281,12 +5441,12 @@
   if ( (0 != (daemon->options & MHD_USE_EPOLL)) &&
        (-1 != daemon->epoll_fd) &&
        (0 != MHD_socket_close_ (daemon->epoll_fd)) )
-    MHD_PANIC ("close failed\n");
+    MHD_PANIC (_("close failed\n"));
 #if HTTPS_SUPPORT
   if ( (0 != (daemon->options & MHD_USE_EPOLL)) &&
        (-1 != daemon->epoll_upgrade_fd) &&
        (0 != MHD_socket_close_ (daemon->epoll_upgrade_fd)) )
-    MHD_PANIC ("close failed\n");
+    MHD_PANIC (_("close failed\n"));
 #endif
 #endif
 
@@ -5300,9 +5460,9 @@
   if (MHD_INVALID_PIPE_ != daemon->wpipe[1])
     {
       if (0 != MHD_pipe_close_ (daemon->wpipe[0]))
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
       if (0 != MHD_pipe_close_ (daemon->wpipe[1]))
-       MHD_PANIC ("close failed\n");
+       MHD_PANIC (_("close failed\n"));
     }
   free (daemon);
 }
@@ -5397,7 +5557,9 @@
   static char ver[12] = "\0\0\0\0\0\0\0\0\0\0\0";
   if (0 == ver[0])
   {
-    int res = MHD_snprintf_(ver, sizeof(ver), "%x.%x.%x",
+    int res = MHD_snprintf_(ver,
+                            sizeof(ver),
+                            "%x.%x.%x",
                             (((int)MHD_VERSION >> 24) & 0xFF),
                             (((int)MHD_VERSION >> 16) & 0xFF),
                             (((int)MHD_VERSION >> 8) & 0xFF));
@@ -5596,24 +5758,26 @@
 
 #ifdef _WIN32
   if (0 != WSAStartup(MAKEWORD(2, 2), &wsd))
-    MHD_PANIC ("Failed to initialize winsock\n");
+    MHD_PANIC (_("Failed to initialize winsock\n"));
   mhd_winsock_inited_ = 1;
   if (2 != LOBYTE(wsd.wVersion) && 2 != HIBYTE(wsd.wVersion))
-    MHD_PANIC ("Winsock version 2.2 is not available\n");
+    MHD_PANIC (_("Winsock version 2.2 is not available\n"));
 #endif
 #if HTTPS_SUPPORT
 #if GCRYPT_VERSION_NUMBER < 0x010600
 #if defined(MHD_USE_POSIX_THREADS)
-  if (0 != gcry_control (GCRYCTL_SET_THREAD_CBS, &gcry_threads_pthread))
-    MHD_PANIC ("Failed to initialise multithreading in libgcrypt\n");
+  if (0 != gcry_control (GCRYCTL_SET_THREAD_CBS,
+                         &gcry_threads_pthread))
+    MHD_PANIC (_("Failed to initialise multithreading in libgcrypt\n"));
 #elif defined(MHD_W32_MUTEX_)
-  if (0 != gcry_control (GCRYCTL_SET_THREAD_CBS, &gcry_threads_w32))
-    MHD_PANIC ("Failed to initialise multithreading in libgcrypt\n");
+  if (0 != gcry_control (GCRYCTL_SET_THREAD_CBS,
+                         &gcry_threads_w32))
+    MHD_PANIC (_("Failed to initialise multithreading in libgcrypt\n"));
 #endif /* defined(MHD_W32_MUTEX_) */
   gcry_check_version (NULL);
 #else
   if (NULL == gcry_check_version ("1.6.0"))
-    MHD_PANIC ("libgcrypt is too old. MHD was compiled for libgcrypt 1.6.0 or 
newer\n");
+    MHD_PANIC (_("libgcrypt is too old. MHD was compiled for libgcrypt 1.6.0 
or newer\n"));
 #endif
   gnutls_global_init ();
 #endif




reply via email to

[Prev in Thread] Current Thread [Next in Thread]