diff options
author | Roger Dingledine <arma@torproject.org> | 2006-02-12 23:44:02 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2006-02-12 23:44:02 +0000 |
commit | b99f903e34b1d2b4548937480d2345ab4753454f (patch) | |
tree | ed002b0bea9e40145b7344c7799ff948567800c9 /src/or | |
parent | 53c54b75c9e3ba373cc43633eacc290f175fbb14 (diff) | |
download | tor-b99f903e34b1d2b4548937480d2345ab4753454f.tar.gz tor-b99f903e34b1d2b4548937480d2345ab4753454f.zip |
and don't warn when it happens here either, unless the user
wants to hear it.
svn:r5990
Diffstat (limited to 'src/or')
-rw-r--r-- | src/or/directory.c | 10 | ||||
-rw-r--r-- | src/or/test.c | 12 |
2 files changed, 12 insertions, 10 deletions
diff --git a/src/or/directory.c b/src/or/directory.c index f9c10b7b7c..d9a73e5d3d 100644 --- a/src/or/directory.c +++ b/src/or/directory.c @@ -945,18 +945,18 @@ connection_dir_client_reached_eof(connection_t *conn) /* Try declared compression first if we can. */ if (compression > 0) tor_gzip_uncompress(&new_body, &new_len, body, body_len, compression, - allow_partial); + allow_partial, LOG_PROTOCOL_WARN); /* Okay, if that didn't work, and we think that it was compressed * differently, try that. */ if (!new_body && guessed > 0 && compression != guessed) tor_gzip_uncompress(&new_body, &new_len, body, body_len, guessed, - allow_partial); + allow_partial, LOG_PROTOCOL_WARN); /* If we're pretty sure that we have a compressed directory, and * we didn't manage to uncompress it, then warn and bail. */ if (!plausible && !new_body) { - log(LOG_PROTOCOL_WARN, LD_HTTP, - "Unable to decompress HTTP body (server '%s:%d').", - conn->address, conn->port); + log_fn(LOG_PROTOCOL_WARN, LD_HTTP, + "Unable to decompress HTTP body (server '%s:%d').", + conn->address, conn->port); tor_free(body); tor_free(headers); tor_free(reason); return -1; } diff --git a/src/or/test.c b/src/or/test.c index 48bac48e9a..8f81eb2c05 100644 --- a/src/or/test.c +++ b/src/or/test.c @@ -928,7 +928,7 @@ test_gzip(void) test_eq(detect_compression_method(buf2, len1), GZIP_METHOD); test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1, - GZIP_METHOD, 1)); + GZIP_METHOD, 1, LOG_INFO)); test_assert(buf3); test_streq(buf1,buf3); @@ -942,7 +942,8 @@ test_gzip(void) test_assert(!memcmp(buf2, "\x78\xDA", 2)); /* deflate magic. */ test_eq(detect_compression_method(buf2, len1), ZLIB_METHOD); - test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1, ZLIB_METHOD, 1)); + test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1, + ZLIB_METHOD, 1, LOG_INFO)); test_assert(buf3); test_streq(buf1,buf3); @@ -951,7 +952,7 @@ test_gzip(void) buf2 = tor_realloc(buf2, len1*2); memcpy(buf2+len1, buf2, len1); test_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1*2, - ZLIB_METHOD, 1)); + ZLIB_METHOD, 1, LOG_INFO)); test_eq(len2, (strlen(buf1)+1)*2); test_memeq(buf3, "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAZAAAAAAAAAAAAAAAAAAAZ\0" @@ -970,14 +971,15 @@ test_gzip(void) tor_assert(len1>16); /* when we allow an uncomplete string, we should succeed.*/ tor_assert(!tor_gzip_uncompress(&buf3, &len2, buf2, len1-16, - ZLIB_METHOD, 0)); + ZLIB_METHOD, 0, LOG_INFO)); buf3[len2]='\0'; tor_assert(len2 > 5); tor_assert(!strcmpstart(buf1, buf3)); /* when we demand a complete string, this must fail. */ tor_free(buf3); - tor_assert(tor_gzip_uncompress(&buf3, &len2, buf2, len1-16, ZLIB_METHOD, 1)); + tor_assert(tor_gzip_uncompress(&buf3, &len2, buf2, len1-16, + ZLIB_METHOD, 1, LOG_INFO)); tor_assert(!buf3); tor_free(buf2); |