diff options
author | Roger Dingledine <arma@torproject.org> | 2006-02-12 23:44:02 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2006-02-12 23:44:02 +0000 |
commit | b99f903e34b1d2b4548937480d2345ab4753454f (patch) | |
tree | ed002b0bea9e40145b7344c7799ff948567800c9 /src/or/test.c | |
parent | 53c54b75c9e3ba373cc43633eacc290f175fbb14 (diff) | |
download | tor-b99f903e34b1d2b4548937480d2345ab4753454f.tar.gz tor-b99f903e34b1d2b4548937480d2345ab4753454f.zip |
and don't warn when it happens here either, unless the user
wants to hear it.
svn:r5990
Diffstat (limited to 'src/or/test.c')
-rw-r--r-- | src/or/test.c | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/src/or/test.c b/src/or/test.c index 48bac48e9a..8f81eb2c05 100644 --- a/src/or/test.c +++ b/src/or/test.c @@ -928,7 +928,7 @@ test_gzip(void) test_eq(detect_compression_method(buf2, len1), GZIP_METHOD); test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1, - GZIP_METHOD, 1)); + GZIP_METHOD, 1, LOG_INFO)); test_assert(buf3); test_streq(buf1,buf3); @@ -942,7 +942,8 @@ test_gzip(void) test_assert(!memcmp(buf2, "\x78\xDA", 2)); /* deflate magic. */ test_eq(detect_compression_method(buf2, len1), ZLIB_METHOD); - test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1, ZLIB_METHOD, 1)); + test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1, + ZLIB_METHOD, 1, LOG_INFO)); test_assert(buf3); test_streq(buf1,buf3); @@ -951,7 +952,7 @@ test_gzip(void) buf2 = tor_realloc(buf2, len1*2); memcpy(buf2+len1, buf2, len1); test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1*2, - ZLIB_METHOD, 1)); + ZLIB_METHOD, 1, LOG_INFO)); test_eq(len2, (strlen(buf1)+1)*2); test_memeq(buf3, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAZAAAAAAAAAAAAAAAAAAAZ\0" @@ -970,14 +971,15 @@ test_gzip(void) tor_assert(len1>16); /* when we allow an uncomplete string, we should succeed.*/ tor_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1-16, - ZLIB_METHOD, 0)); + ZLIB_METHOD, 0, LOG_INFO)); buf3[len2]='\0'; tor_assert(len2 > 5); tor_assert(!strcmpstart(buf1, buf3)); /* when we demand a complete string, this must fail. */ tor_free(buf3); - tor_assert(tor_gzip_uncompress(&buf3, &len2, buf2, len1-16, ZLIB_METHOD, 1)); + tor_assert(tor_gzip_uncompress(&buf3, &len2, buf2, len1-16, + ZLIB_METHOD, 1, LOG_INFO)); tor_assert(!buf3); tor_free(buf2); |