[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] change WARNING to WARN
Update of /home/or/cvsroot/src/or
In directory moria.mit.edu:/home2/arma/work/onion/cvs/src/or
Modified Files:
buffers.c circuit.c command.c config.c connection.c
connection_edge.c connection_or.c cpuworker.c directory.c
dirserv.c dns.c main.c onion.c routers.c test.c
Log Message:
change WARNING to WARN
and fix a few typos
Index: buffers.c
===================================================================
RCS file: /home/or/cvsroot/src/or/buffers.c,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -d -r1.43 -r1.44
--- buffers.c 8 Oct 2003 02:04:07 -0000 1.43
+++ buffers.c 10 Oct 2003 01:48:31 -0000 1.44
@@ -221,7 +221,7 @@
/* this is the point where you would grow the buffer, if you want to */
if (string_len + buf->datalen > buf->len) { /* we're out of luck */
- log_fn(LOG_WARNING, "buflen too small. Time to implement growing dynamic bufs.");
+ log_fn(LOG_WARN, "buflen too small. Time to implement growing dynamic bufs.");
return -1;
}
@@ -280,11 +280,11 @@
log_fn(LOG_DEBUG,"headerlen %d, bodylen %d.",headerlen,bodylen);
if(headers_out && max_headerlen <= headerlen) {
- log_fn(LOG_WARNING,"headerlen %d larger than %d. Failing.", headerlen, max_headerlen-1);
+ log_fn(LOG_WARN,"headerlen %d larger than %d. Failing.", headerlen, max_headerlen-1);
return -1;
}
if(body_out && max_bodylen <= bodylen) {
- log_fn(LOG_WARNING,"bodylen %d larger than %d. Failing.", bodylen, max_bodylen-1);
+ log_fn(LOG_WARN,"bodylen %d larger than %d. Failing.", bodylen, max_bodylen-1);
return -1;
}
@@ -356,7 +356,7 @@
if(buf->datalen < 2+nummethods)
return 0;
if(!nummethods || !memchr(buf->buf+2, 0, nummethods)) {
- log_fn(LOG_WARNING,"socks5: offered methods don't include 'no auth'. Rejecting.");
+ log_fn(LOG_WARN,"socks5: offered methods don't include 'no auth'. Rejecting.");
*replylen = 2; /* 2 bytes of response */
*reply = 5; /* socks5 reply */
*(reply+1) = 0xFF; /* reject all methods */
@@ -377,7 +377,7 @@
if(buf->datalen < 8) /* basic info plus >=2 for addr plus 2 for port */
return 0; /* not yet */
if(*(buf->buf+1) != 1) { /* not a connect? we don't support it. */
- log_fn(LOG_WARNING,"socks5: command %d not '1'.",*(buf->buf+1));
+ log_fn(LOG_WARN,"socks5: command %d not '1'.",*(buf->buf+1));
return -1;
}
switch(*(buf->buf+3)) { /* address type */
@@ -389,7 +389,7 @@
in.s_addr = htonl(destip);
tmpbuf = inet_ntoa(in);
if(strlen(tmpbuf)+1 > max_addrlen) {
- log_fn(LOG_WARNING,"socks5 IP takes %d bytes, which doesn't fit in %d",
+ log_fn(LOG_WARN,"socks5 IP takes %d bytes, which doesn't fit in %d",
strlen(tmpbuf)+1,max_addrlen);
return -1;
}
@@ -404,7 +404,7 @@
if(buf->datalen < 7+len) /* addr/port there? */
return 0; /* not yet */
if(len+1 > max_addrlen) {
- log_fn(LOG_WARNING,"socks5 hostname is %d bytes, which doesn't fit in %d",
+ log_fn(LOG_WARN,"socks5 hostname is %d bytes, which doesn't fit in %d",
len+1,max_addrlen);
return -1;
}
@@ -415,7 +415,7 @@
memmove(buf->buf, buf->buf+(5+len+2), buf->datalen);
return 1;
default: /* unsupported */
- log_fn(LOG_WARNING,"socks5: unsupported address type %d",*(buf->buf+3));
+ log_fn(LOG_WARN,"socks5: unsupported address type %d",*(buf->buf+3));
return -1;
}
assert(0);
@@ -426,14 +426,14 @@
return 0; /* not yet */
if(*(buf->buf+1) != 1) { /* not a connect? we don't support it. */
- log_fn(LOG_WARNING,"socks4: command %d not '1'.",*(buf->buf+1));
+ log_fn(LOG_WARN,"socks4: command %d not '1'.",*(buf->buf+1));
return -1;
}
*port_out = ntohs(*(uint16_t*)(buf->buf+2));
destip = ntohl(*(uint32_t*)(buf->buf+4));
if(!*port_out || !destip) {
- log_fn(LOG_WARNING,"socks4: Port or DestIP is zero.");
+ log_fn(LOG_WARN,"socks4: Port or DestIP is zero.");
return -1;
}
if(destip >> 8) {
@@ -441,7 +441,7 @@
in.s_addr = htonl(destip);
tmpbuf = inet_ntoa(in);
if(strlen(tmpbuf)+1 > max_addrlen) {
- log_fn(LOG_WARNING,"socks4 addr (%d bytes) too long.", strlen(tmpbuf));
+ log_fn(LOG_WARN,"socks4 addr (%d bytes) too long.", strlen(tmpbuf));
return -1;
}
log_fn(LOG_DEBUG,"socks4: successfully read destip (%s)", tmpbuf);
@@ -462,7 +462,7 @@
return 0;
}
if(max_addrlen <= next-startaddr) {
- log_fn(LOG_WARNING,"Destaddr too long.");
+ log_fn(LOG_WARN,"Destaddr too long.");
return -1;
}
}
@@ -473,7 +473,7 @@
return 1;
default: /* version is not socks4 or socks5 */
- log_fn(LOG_WARNING,"Socks version %d not recognized.",*(buf->buf));
+ log_fn(LOG_WARN,"Socks version %d not recognized.",*(buf->buf));
return -1;
}
}
Index: circuit.c
===================================================================
RCS file: /home/or/cvsroot/src/or/circuit.c,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -d -r1.77 -r1.78
--- circuit.c 9 Oct 2003 18:45:13 -0000 1.77
+++ circuit.c 10 Oct 2003 01:48:31 -0000 1.78
@@ -231,7 +231,7 @@
log_fn(LOG_DEBUG,"direction %d, streamid %d before crypt.", cell_direction, *(int*)(cell->payload+1));
if(relay_crypt(circ, buf, 1+CELL_PAYLOAD_SIZE, cell_direction, &layer_hint, &recognized, &conn) < 0) {
- log_fn(LOG_WARNING,"relay crypt failed. Dropping connection.");
+ log_fn(LOG_WARN,"relay crypt failed. Dropping connection.");
return -1;
}
@@ -281,7 +281,7 @@
if(circ->cpath) { /* we're at the beginning of the circuit. We'll want to do layered crypts. */
thishop = circ->cpath;
if(thishop->state != CPATH_STATE_OPEN) {
- log_fn(LOG_WARNING,"Relay cell before first created cell?");
+ log_fn(LOG_WARN,"Relay cell before first created cell?");
return -1;
}
do { /* Remember: cpath is in forward order, that is, first hop first. */
@@ -290,7 +290,7 @@
log_fn(LOG_DEBUG,"before decrypt: %d",*(int*)(in+2));
/* decrypt */
if(crypto_cipher_decrypt(thishop->b_crypto, in, inlen, out)) {
- log_fn(LOG_WARNING,"Error performing onion decryption: %s", crypto_perror());
+ log_fn(LOG_WARN,"Error performing onion decryption: %s", crypto_perror());
return -1;
}
memcpy(in,out,inlen);
@@ -309,7 +309,7 @@
log_fn(LOG_DEBUG,"before encrypt: %d",*(int*)(in+2));
if(crypto_cipher_encrypt(circ->p_crypto, in, inlen, out)) {
- log_fn(LOG_WARNING,"Onion encryption failed for ACI %u: %s",
+ log_fn(LOG_WARN,"Onion encryption failed for ACI %u: %s",
circ->p_aci, crypto_perror());
return -1;
}
@@ -330,7 +330,7 @@
log_fn(LOG_DEBUG,"before encrypt: %d",*(int*)(in+2));
if(crypto_cipher_encrypt(thishop->f_crypto, in, inlen, out)) {
- log_fn(LOG_WARNING,"Error performing encryption: %s", crypto_perror());
+ log_fn(LOG_WARN,"Error performing encryption: %s", crypto_perror());
return -1;
}
memcpy(in,out,inlen);
@@ -341,7 +341,7 @@
} else { /* we're in the middle. Just one crypt. */
if(crypto_cipher_decrypt(circ->n_crypto,in, inlen, out)) {
- log_fn(LOG_WARNING,"Decryption failed for ACI %u: %s",
+ log_fn(LOG_WARN,"Decryption failed for ACI %u: %s",
circ->n_aci, crypto_perror());
return -1;
}
@@ -729,7 +729,7 @@
cell.length = DH_ONIONSKIN_LEN;
if(onion_skin_create(circ->n_conn->onion_pkey, &(circ->cpath->handshake_state), cell.payload) < 0) {
- log_fn(LOG_WARNING,"onion_skin_create (first hop) failed.");
+ log_fn(LOG_WARN,"onion_skin_create (first hop) failed.");
return -1;
}
@@ -753,7 +753,7 @@
router = router_get_by_addr_port(hop->addr,hop->port);
if(!router) {
- log_fn(LOG_WARNING,"couldn't lookup router %d:%d",hop->addr,hop->port);
+ log_fn(LOG_WARN,"couldn't lookup router %d:%d",hop->addr,hop->port);
return -1;
}
@@ -767,14 +767,14 @@
*(uint32_t*)(cell.payload+RELAY_HEADER_SIZE) = htonl(hop->addr);
*(uint16_t*)(cell.payload+RELAY_HEADER_SIZE+4) = htons(hop->port);
if(onion_skin_create(router->onion_pkey, &(hop->handshake_state), cell.payload+RELAY_HEADER_SIZE+6) < 0) {
- log_fn(LOG_WARNING,"onion_skin_create failed.");
+ log_fn(LOG_WARN,"onion_skin_create failed.");
return -1;
}
log_fn(LOG_DEBUG,"Sending extend relay cell.");
/* send it to hop->prev, because it will transfer it to a create cell and then send to hop */
if(circuit_deliver_relay_cell(&cell, circ, CELL_DIRECTION_OUT, hop->prev) < 0) {
- log_fn(LOG_WARNING,"failed to deliver extend cell. Closing.");
+ log_fn(LOG_WARN,"failed to deliver extend cell. Closing.");
return -1;
}
hop->state = CPATH_STATE_AWAITING_KEYS;
@@ -792,7 +792,7 @@
cell_t newcell;
if(circ->n_conn) {
- log_fn(LOG_WARNING,"n_conn already set. Bug/attack. Closing.");
+ log_fn(LOG_WARN,"n_conn already set. Bug/attack. Closing.");
return -1;
}
@@ -825,7 +825,7 @@
log_fn(LOG_DEBUG,"aci_type = %u.",aci_type);
circ->n_aci = get_unique_aci_by_addr_port(circ->n_addr, circ->n_port, aci_type);
if(!circ->n_aci) {
- log_fn(LOG_WARNING,"failed to get unique aci.");
+ log_fn(LOG_WARN,"failed to get unique aci.");
return -1;
}
log_fn(LOG_DEBUG,"Chosen ACI %u.",circ->n_aci);
@@ -856,14 +856,14 @@
hop != circ->cpath && hop->state == CPATH_STATE_OPEN;
hop=hop->next) ;
if(hop == circ->cpath) { /* got an extended when we're all done? */
- log_fn(LOG_WARNING,"got extended when circ already built? Closing.");
+ log_fn(LOG_WARN,"got extended when circ already built? Closing.");
return -1;
}
}
assert(hop->state == CPATH_STATE_AWAITING_KEYS);
if(onion_skin_client_handshake(hop->handshake_state, reply, keys, 32) < 0) {
- log_fn(LOG_WARNING,"onion_skin_client_handshake failed.");
+ log_fn(LOG_WARN,"onion_skin_client_handshake failed.");
return -1;
}
@@ -873,13 +873,13 @@
log_fn(LOG_DEBUG,"hop %d init cipher forward %d, backward %d.", (uint32_t)hop, *(uint32_t*)keys, *(uint32_t*)(keys+16));
if (!(hop->f_crypto =
crypto_create_init_cipher(CIRCUIT_CIPHER,keys,iv,1))) {
- log(LOG_WARNING,"forward cipher initialization failed.");
+ log(LOG_WARN,"forward cipher initialization failed.");
return -1;
}
if (!(hop->b_crypto =
crypto_create_init_cipher(CIRCUIT_CIPHER,keys+16,iv,0))) {
- log(LOG_WARNING,"backward cipher initialization failed.");
+ log(LOG_WARN,"backward cipher initialization failed.");
return -1;
}
Index: command.c
===================================================================
RCS file: /home/or/cvsroot/src/or/command.c,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -d -r1.44 -r1.45
--- command.c 8 Oct 2003 02:04:07 -0000 1.44
+++ command.c 10 Oct 2003 01:48:31 -0000 1.45
@@ -86,7 +86,7 @@
command_process_destroy_cell);
break;
default:
- log_fn(LOG_WARNING,"Cell of unknown type (%d) received. Dropping.", cell->command);
+ log_fn(LOG_WARN,"Cell of unknown type (%d) received. Dropping.", cell->command);
break;
}
}
@@ -97,14 +97,14 @@
circ = circuit_get_by_aci_conn(cell->aci, conn);
if(circ) {
- log_fn(LOG_WARNING,"received CREATE cell (aci %d) for known circ. Dropping.", cell->aci);
+ log_fn(LOG_WARN,"received CREATE cell (aci %d) for known circ. Dropping.", cell->aci);
return;
}
circ = circuit_new(cell->aci, conn);
circ->state = CIRCUIT_STATE_ONIONSKIN_PENDING;
if(cell->length != DH_ONIONSKIN_LEN) {
- log_fn(LOG_WARNING,"Bad cell length %d. Dropping.", cell->length);
+ log_fn(LOG_WARN,"Bad cell length %d. Dropping.", cell->length);
circuit_close(circ);
return;
}
@@ -113,7 +113,7 @@
/* hand it off to the cpuworkers, and then return */
if(assign_to_cpuworker(NULL, CPUWORKER_TASK_ONION, circ) < 0) {
- log_fn(LOG_WARNING,"Failed to hand off onionskin. Closing.");
+ log_fn(LOG_WARN,"Failed to hand off onionskin. Closing.");
circuit_close(circ);
return;
}
@@ -131,7 +131,7 @@
}
if(circ->n_aci != cell->aci) {
- log_fn(LOG_WARNING,"got created cell from OPward? Closing.");
+ log_fn(LOG_WARN,"got created cell from OPward? Closing.");
circuit_close(circ);
return;
}
@@ -140,13 +140,13 @@
if(circ->cpath) { /* we're the OP. Handshake this. */
log_fn(LOG_DEBUG,"at OP. Finishing handshake.");
if(circuit_finish_handshake(circ, cell->payload) < 0) {
- log_fn(LOG_WARNING,"circuit_finish_handshake failed.");
+ log_fn(LOG_WARN,"circuit_finish_handshake failed.");
circuit_close(circ);
return;
}
log_fn(LOG_DEBUG,"Moving to next skin.");
if(circuit_send_next_onion_skin(circ) < 0) {
- log_fn(LOG_WARNING,"circuit_send_next_onion_skin failed.");
+ log_fn(LOG_WARN,"circuit_send_next_onion_skin failed.");
circuit_close(circ);
return;
}
@@ -168,7 +168,7 @@
}
if(circ->state == CIRCUIT_STATE_ONIONSKIN_PENDING) {
- log_fn(LOG_WARNING,"circuit in create_wait. Closing.");
+ log_fn(LOG_WARN,"circuit in create_wait. Closing.");
circuit_close(circ);
return;
}
@@ -176,14 +176,14 @@
if(cell->aci == circ->p_aci) { /* it's an outgoing cell */
cell->aci = circ->n_aci; /* switch it */
if(circuit_deliver_relay_cell(cell, circ, CELL_DIRECTION_OUT, conn->cpath_layer) < 0) {
- log_fn(LOG_WARNING,"circuit_deliver_relay_cell (forward) failed. Closing.");
+ log_fn(LOG_WARN,"circuit_deliver_relay_cell (forward) failed. Closing.");
circuit_close(circ);
return;
}
} else { /* it's an ingoing cell */
cell->aci = circ->p_aci; /* switch it */
if(circuit_deliver_relay_cell(cell, circ, CELL_DIRECTION_IN, NULL) < 0) {
- log_fn(LOG_WARNING,"circuit_deliver_relay_cell (backward) failed. Closing.");
+ log_fn(LOG_WARN,"circuit_deliver_relay_cell (backward) failed. Closing.");
circuit_close(circ);
return;
}
Index: config.c
===================================================================
RCS file: /home/or/cvsroot/src/or/config.c,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -d -r1.56 -r1.57
--- config.c 8 Oct 2003 08:54:52 -0000 1.56
+++ config.c 10 Oct 2003 01:48:31 -0000 1.57
@@ -125,7 +125,7 @@
case CONFIG_TYPE_BOOL:
i = atoi(c->value);
if (i != 0 && i != 1) {
- log(LOG_WARNING, "Boolean keyword '%s' expects 0 or 1", c->key);
+ log(LOG_WARN, "Boolean keyword '%s' expects 0 or 1", c->key);
return 0;
}
*(int *)arg = i;
@@ -182,7 +182,7 @@
) {
/* then we're ok. it matched something. */
} else {
- log_fn(LOG_WARNING,"Ignoring unknown keyword '%s'.",list->key);
+ log_fn(LOG_WARN,"Ignoring unknown keyword '%s'.",list->key);
}
list = list->next;
@@ -227,7 +227,7 @@
cf = config_open(fname);
if(!cf) {
- log(LOG_WARNING, "Unable to open configuration file '%s'.",fname);
+ log(LOG_WARN, "Unable to open configuration file '%s'.",fname);
return -1;
}
@@ -247,76 +247,76 @@
if(options->LogLevel) {
if(!strcmp(options->LogLevel,"err"))
options->loglevel = LOG_ERR;
- else if(!strncmp(options->LogLevel,"warn",4))
- options->loglevel = LOG_WARNING;
+ else if(!strcmp(options->LogLevel,"warn"))
+ options->loglevel = LOG_WARN;
else if(!strcmp(options->LogLevel,"info"))
options->loglevel = LOG_INFO;
else if(!strcmp(options->LogLevel,"debug"))
options->loglevel = LOG_DEBUG;
else {
- log(LOG_WARNING,"LogLevel must be one of err|warning|info|debug.");
+ log(LOG_WARN,"LogLevel must be one of err|warn|info|debug.");
result = -1;
}
}
if(options->RouterFile == NULL) {
- log(LOG_WARNING,"RouterFile option required, but not found.");
+ log(LOG_WARN,"RouterFile option required, but not found.");
result = -1;
}
if(options->ORPort < 0) {
- log(LOG_WARNING,"ORPort option can't be negative.");
+ log(LOG_WARN,"ORPort option can't be negative.");
result = -1;
}
if(options->OnionRouter && options->ORPort == 0) {
- log(LOG_WARNING,"If OnionRouter is set, then ORPort must be positive.");
+ log(LOG_WARN,"If OnionRouter is set, then ORPort must be positive.");
result = -1;
}
if(options->OnionRouter && options->DataDirectory == NULL) {
- log(LOG_WARNING,"DataDirectory option required for OnionRouter, but not found.");
+ log(LOG_WARN,"DataDirectory option required for OnionRouter, but not found.");
result = -1;
}
if(options->OnionRouter && options->Nickname == NULL) {
- log_fn(LOG_WARNING,"Nickname required for OnionRouter, but not found.");
+ log_fn(LOG_WARN,"Nickname required for OnionRouter, but not found.");
result = -1;
}
if(options->APPort < 0) {
- log(LOG_WARNING,"APPort option can't be negative.");
+ log(LOG_WARN,"APPort option can't be negative.");
result = -1;
}
if(options->DirPort < 0) {
- log(LOG_WARNING,"DirPort option can't be negative.");
+ log(LOG_WARN,"DirPort option can't be negative.");
result = -1;
}
if(options->APPort > 1 &&
(options->CoinWeight < 0.0 || options->CoinWeight >= 1.0)) {
- log(LOG_WARNING,"CoinWeight option must be >=0.0 and <1.0.");
+ log(LOG_WARN,"CoinWeight option must be >=0.0 and <1.0.");
result = -1;
}
if(options->MaxConn < 1) {
- log(LOG_WARNING,"MaxConn option must be a non-zero positive integer.");
+ log(LOG_WARN,"MaxConn option must be a non-zero positive integer.");
result = -1;
}
if(options->MaxConn >= MAXCONNECTIONS) {
- log(LOG_WARNING,"MaxConn option must be less than %d.", MAXCONNECTIONS);
+ log(LOG_WARN,"MaxConn option must be less than %d.", MAXCONNECTIONS);
result = -1;
}
if(options->DirFetchPostPeriod < 1) {
- log(LOG_WARNING,"DirFetchPostPeriod option must be positive.");
+ log(LOG_WARN,"DirFetchPostPeriod option must be positive.");
result = -1;
}
if(options->KeepalivePeriod < 1) {
- log(LOG_WARNING,"KeepalivePeriod option must be positive.");
+ log(LOG_WARN,"KeepalivePeriod option must be positive.");
result = -1;
}
Index: connection.c
===================================================================
RCS file: /home/or/cvsroot/src/or/connection.c,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -d -r1.118 -r1.119
--- connection.c 9 Oct 2003 18:45:13 -0000 1.118
+++ connection.c 10 Oct 2003 01:48:32 -0000 1.119
@@ -127,7 +127,7 @@
s = socket(PF_INET,SOCK_STREAM,IPPROTO_TCP);
if (s < 0) {
- log_fn(LOG_WARNING,"Socket creation failed.");
+ log_fn(LOG_WARN,"Socket creation failed.");
return -1;
}
@@ -135,12 +135,12 @@
if(bind(s,(struct sockaddr *)bindaddr,sizeof(*bindaddr)) < 0) {
perror("bind ");
- log(LOG_WARNING,"Could not bind to port %u.",ntohs(bindaddr->sin_port));
+ log(LOG_WARN,"Could not bind to port %u.",ntohs(bindaddr->sin_port));
return -1;
}
if(listen(s,SOMAXCONN) < 0) {
- log(LOG_WARNING,"Could not listen on port %u.",ntohs(bindaddr->sin_port));
+ log(LOG_WARN,"Could not listen on port %u.",ntohs(bindaddr->sin_port));
return -1;
}
@@ -150,7 +150,7 @@
conn->s = s;
if(connection_add(conn) < 0) { /* no space, forget it */
- log_fn(LOG_WARNING,"connection_add failed. Giving up.");
+ log_fn(LOG_WARN,"connection_add failed. Giving up.");
connection_free(conn);
return -1;
}
@@ -184,7 +184,7 @@
#endif
}
/* else there was a real error. */
- log_fn(LOG_WARNING,"accept() failed. Closing listener.");
+ log_fn(LOG_WARN,"accept() failed. Closing listener.");
return -1;
}
log(LOG_INFO,"Connection accepted on socket %d (child of fd %d).",news, conn->s);
@@ -238,7 +238,7 @@
s=socket(PF_INET,SOCK_STREAM,IPPROTO_TCP);
if (s < 0) {
- log_fn(LOG_WARNING,"Error creating network socket.");
+ log_fn(LOG_WARN,"Error creating network socket.");
return -1;
}
set_socket_nonblocking(s);
@@ -430,7 +430,7 @@
int connection_handle_write(connection_t *conn) {
if(connection_is_listener(conn)) {
- log_fn(LOG_WARNING,"Got a listener socket. Can't happen!");
+ log_fn(LOG_WARN,"Got a listener socket. Can't happen!");
return -1;
}
@@ -497,7 +497,7 @@
}
if(write_to_buf(string, len, conn->outbuf) < 0) {
- log_fn(LOG_WARNING,"write_to_buf failed. Closing connection (fd %d).", conn->s);
+ log_fn(LOG_WARN,"write_to_buf failed. Closing connection (fd %d).", conn->s);
conn->marked_for_close = 1;
}
}
@@ -667,7 +667,7 @@
case CONN_TYPE_CPUWORKER:
return connection_cpu_process_inbuf(conn);
default:
- log_fn(LOG_WARNING,"got unexpected conn->type %d.", conn->type);
+ log_fn(LOG_WARN,"got unexpected conn->type %d.", conn->type);
return -1;
}
}
@@ -691,7 +691,7 @@
case CONN_TYPE_CPUWORKER:
return connection_cpu_finished_flushing(conn);
default:
- log_fn(LOG_WARNING,"got unexpected conn->type %d.", conn->type);
+ log_fn(LOG_WARN,"got unexpected conn->type %d.", conn->type);
return -1;
}
}
Index: connection_edge.c
===================================================================
RCS file: /home/or/cvsroot/src/or/connection_edge.c,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -d -r1.37 -r1.38
--- connection_edge.c 9 Oct 2003 18:45:13 -0000 1.37
+++ connection_edge.c 10 Oct 2003 01:48:32 -0000 1.38
@@ -63,7 +63,7 @@
int is_control_cell=0;
if(!circ) {
- log_fn(LOG_WARNING,"no circ. Closing.");
+ log_fn(LOG_WARN,"no circ. Closing.");
return;
}
@@ -95,7 +95,7 @@
cell_direction == CELL_DIRECTION_OUT ? "forward" : "backward");
if(circuit_deliver_relay_cell(&cell, circ, cell_direction, cpath_layer) < 0) {
- log_fn(LOG_WARNING,"circuit_deliver_relay_cell failed. Closing.");
+ log_fn(LOG_WARN,"circuit_deliver_relay_cell failed. Closing.");
circuit_close(circ);
}
}
@@ -127,7 +127,7 @@
}
return 0;
} else {
- log_fn(LOG_WARNING,"Got an unexpected relay cell, not in 'open' state. Closing.");
+ log_fn(LOG_WARN,"Got an unexpected relay cell, not in 'open' state. Closing.");
return -1;
}
}
@@ -135,11 +135,11 @@
switch(relay_command) {
case RELAY_COMMAND_BEGIN:
if(edge_type == EDGE_AP) {
- log_fn(LOG_WARNING,"relay begin request unsupported at AP. Dropping.");
+ log_fn(LOG_WARN,"relay begin request unsupported at AP. Dropping.");
return 0;
}
if(conn) {
- log_fn(LOG_WARNING,"begin cell for known stream. Dropping.");
+ log_fn(LOG_WARN,"begin cell for known stream. Dropping.");
return 0;
}
return connection_exit_begin_conn(cell, circ);
@@ -147,7 +147,7 @@
++stats_n_data_cells_received;
if((edge_type == EDGE_AP && --layer_hint->deliver_window < 0) ||
(edge_type == EDGE_EXIT && --circ->deliver_window < 0)) {
- log_fn(LOG_WARNING,"(relay data) circ deliver_window below 0. Killing.");
+ log_fn(LOG_WARN,"(relay data) circ deliver_window below 0. Killing.");
return -1;
}
log_fn(LOG_DEBUG,"circ deliver_window now %d.", edge_type == EDGE_AP ? layer_hint->deliver_window : circ->deliver_window);
@@ -161,7 +161,7 @@
}
if(--conn->deliver_window < 0) { /* is it below 0 after decrement? */
- log_fn(LOG_WARNING,"(relay data) conn deliver_window below 0. Killing.");
+ log_fn(LOG_WARN,"(relay data) conn deliver_window below 0. Killing.");
return -1; /* somebody's breaking protocol. kill the whole circuit. */
}
@@ -188,24 +188,24 @@
break;
case RELAY_COMMAND_EXTEND:
if(conn) {
- log_fn(LOG_WARNING,"'extend' for non-zero stream. Dropping.");
+ log_fn(LOG_WARN,"'extend' for non-zero stream. Dropping.");
return 0;
}
return circuit_extend(cell, circ);
case RELAY_COMMAND_EXTENDED:
if(edge_type == EDGE_EXIT) {
- log_fn(LOG_WARNING,"'extended' unsupported at exit. Dropping.");
+ log_fn(LOG_WARN,"'extended' unsupported at exit. Dropping.");
return 0;
}
log_fn(LOG_DEBUG,"Got an extended cell! Yay.");
if(circuit_finish_handshake(circ, cell->payload+RELAY_HEADER_SIZE) < 0) {
- log_fn(LOG_WARNING,"circuit_finish_handshake failed.");
+ log_fn(LOG_WARN,"circuit_finish_handshake failed.");
return -1;
}
return circuit_send_next_onion_skin(circ);
case RELAY_COMMAND_TRUNCATE:
if(edge_type == EDGE_AP) {
- log_fn(LOG_WARNING,"'truncate' unsupported at AP. Dropping.");
+ log_fn(LOG_WARN,"'truncate' unsupported at AP. Dropping.");
return 0;
}
if(circ->n_conn) {
@@ -218,13 +218,13 @@
return 0;
case RELAY_COMMAND_TRUNCATED:
if(edge_type == EDGE_EXIT) {
- log_fn(LOG_WARNING,"'truncated' unsupported at exit. Dropping.");
+ log_fn(LOG_WARN,"'truncated' unsupported at exit. Dropping.");
return 0;
}
return circuit_truncated(circ, layer_hint);
case RELAY_COMMAND_CONNECTED:
if(edge_type == EDGE_EXIT) {
- log_fn(LOG_WARNING,"'connected' unsupported at exit. Dropping.");
+ log_fn(LOG_WARN,"'connected' unsupported at exit. Dropping.");
return 0;
}
if(!conn) {
@@ -257,7 +257,7 @@
connection_edge_package_raw_inbuf(conn); /* handle whatever might still be on the inbuf */
break;
default:
- log_fn(LOG_WARNING,"unknown relay command %d.",relay_command);
+ log_fn(LOG_WARN,"unknown relay command %d.",relay_command);
return -1;
}
return 0;
@@ -303,7 +303,7 @@
connection_stop_writing(conn);
return 0;
default:
- log_fn(LOG_WARNING,"BUG: called in unexpected state.");
+ log_fn(LOG_WARN,"BUG: called in unexpected state.");
return -1;
}
return 0;
@@ -334,7 +334,7 @@
return 0;
if(conn->package_window <= 0) {
- log_fn(LOG_WARNING,"called with package_window %d. Tell Roger.", conn->package_window);
+ log_fn(LOG_WARN,"called with package_window %d. Tell Roger.", conn->package_window);
connection_stop_reading(conn);
return 0;
}
@@ -410,7 +410,7 @@
log_fn(LOG_DEBUG,"Outbuf %d, Queueing stream sendme.", conn->outbuf_flushlen);
conn->deliver_window += STREAMWINDOW_INCREMENT;
if(circuit_deliver_relay_cell(&cell, circ, CELL_DIRECTION(edge_type), conn->cpath_layer) < 0) {
- log_fn(LOG_WARNING,"circuit_deliver_relay_cell failed. Closing.");
+ log_fn(LOG_WARN,"circuit_deliver_relay_cell failed. Closing.");
circuit_close(circ);
return;
}
@@ -436,7 +436,7 @@
log_fn(LOG_DEBUG,"reply is already set for us. Using it.");
connection_ap_handshake_socks_reply(conn, reply, replylen, 0);
} else if(sockshere == -1) { /* send normal reject */
- log_fn(LOG_WARNING,"Fetching socks handshake failed. Closing.");
+ log_fn(LOG_WARN,"Fetching socks handshake failed. Closing.");
connection_ap_handshake_socks_reply(conn, NULL, 0, 0);
} else {
log_fn(LOG_DEBUG,"socks handshake not all here yet.");
@@ -535,18 +535,18 @@
if(!memchr(cell->payload+RELAY_HEADER_SIZE+STREAM_ID_SIZE,0,
cell->length-RELAY_HEADER_SIZE-STREAM_ID_SIZE)) {
- log_fn(LOG_WARNING,"relay begin cell has no \\0. Dropping.");
+ log_fn(LOG_WARN,"relay begin cell has no \\0. Dropping.");
return 0;
}
colon = strchr(cell->payload+RELAY_HEADER_SIZE+STREAM_ID_SIZE, ':');
if(!colon) {
- log_fn(LOG_WARNING,"relay begin cell has no colon. Dropping.");
+ log_fn(LOG_WARN,"relay begin cell has no colon. Dropping.");
return 0;
}
*colon = 0;
if(!atoi(colon+1)) { /* bad port */
- log_fn(LOG_WARNING,"relay begin cell has invalid port. Dropping.");
+ log_fn(LOG_WARN,"relay begin cell has invalid port. Dropping.");
return 0;
}
@@ -561,7 +561,7 @@
n_stream->package_window = STREAMWINDOW_START;
n_stream->deliver_window = STREAMWINDOW_START;
if(connection_add(n_stream) < 0) { /* no space, forget it */
- log_fn(LOG_WARNING,"connection_add failed. Dropping.");
+ log_fn(LOG_WARN,"connection_add failed. Dropping.");
connection_free(n_stream);
return 0;
}
@@ -577,7 +577,7 @@
return 0;
/* else fall through */
case -1: /* resolve failed */
- log_fn(LOG_WARNING,"Couldn't queue resolve request.");
+ log_fn(LOG_WARN,"Couldn't queue resolve request.");
connection_remove(n_stream);
connection_free(n_stream);
case 0: /* resolve added to pending list */
@@ -610,7 +610,7 @@
connection_set_poll_socket(conn);
conn->state = EXIT_CONN_STATE_OPEN;
if(connection_wants_to_flush(conn)) { /* in case there are any queued data cells */
- log_fn(LOG_WARNING,"tell roger: newly connected conn had data waiting!");
+ log_fn(LOG_WARN,"tell roger: newly connected conn had data waiting!");
// connection_start_writing(conn);
}
// connection_process_inbuf(conn);
Index: connection_or.c
===================================================================
RCS file: /home/or/cvsroot/src/or/connection_or.c,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -d -r1.67 -r1.68
--- connection_or.c 9 Oct 2003 18:45:13 -0000 1.67
+++ connection_or.c 10 Oct 2003 01:48:32 -0000 1.68
@@ -70,7 +70,7 @@
connection_stop_writing(conn);
return 0;
default:
- log_fn(LOG_WARNING,"BUG: called in unexpected state.");
+ log_fn(LOG_WARN,"BUG: called in unexpected state.");
return 0;
}
}
@@ -96,7 +96,7 @@
assert(router);
if(options.Nickname && !strcmp(router->nickname,options.Nickname)) {
- log_fn(LOG_WARNING,"You asked me to connect to myself! Failing.");
+ log_fn(LOG_WARN,"You asked me to connect to myself! Failing.");
return NULL;
}
@@ -148,7 +148,7 @@
conn->state = OR_CONN_STATE_HANDSHAKING;
conn->tls = tor_tls_new(conn->s, receiving);
if(!conn->tls) {
- log_fn(LOG_WARNING,"tor_tls_new failed. Closing.");
+ log_fn(LOG_WARN,"tor_tls_new failed. Closing.");
return -1;
}
connection_start_reading(conn);
@@ -189,20 +189,20 @@
if(tor_tls_peer_has_cert(conn->tls)) { /* it's another OR */
pk = tor_tls_verify(conn->tls);
if(!pk) {
- log_fn(LOG_WARNING,"Other side (%s:%d) has a cert but it's invalid. Closing.",
+ log_fn(LOG_WARN,"Other side (%s:%d) has a cert but it's invalid. Closing.",
conn->address, conn->port);
return -1;
}
router = router_get_by_link_pk(pk);
if (!router) {
- log_fn(LOG_WARNING,"Unrecognized public key from peer (%s:%d). Closing.",
+ log_fn(LOG_WARN,"Unrecognized public key from peer (%s:%d). Closing.",
conn->address, conn->port);
crypto_free_pk_env(pk);
return -1;
}
if(conn->link_pkey) { /* I initiated this connection. */
if(crypto_pk_cmp_keys(conn->link_pkey, pk)) {
- log_fn(LOG_WARNING,"We connected to '%s' but he gave us a different key. Closing.",
+ log_fn(LOG_WARN,"We connected to '%s' but he gave us a different key. Closing.",
router->nickname);
crypto_free_pk_env(pk);
return -1;
@@ -221,24 +221,24 @@
}
} else { /* I'm a client */
if(!tor_tls_peer_has_cert(conn->tls)) { /* it's a client too?! */
- log_fn(LOG_WARNING,"Neither peer sent a cert! Closing.");
+ log_fn(LOG_WARN,"Neither peer sent a cert! Closing.");
return -1;
}
pk = tor_tls_verify(conn->tls);
if(!pk) {
- log_fn(LOG_WARNING,"Other side (%s:%d) has a cert but it's invalid. Closing.",
+ log_fn(LOG_WARN,"Other side (%s:%d) has a cert but it's invalid. Closing.",
conn->address, conn->port);
return -1;
}
router = router_get_by_link_pk(pk);
if (!router) {
- log_fn(LOG_WARNING,"Unrecognized public key from peer (%s:%d). Closing.",
+ log_fn(LOG_WARN,"Unrecognized public key from peer (%s:%d). Closing.",
conn->address, conn->port);
crypto_free_pk_env(pk);
return -1;
}
if(crypto_pk_cmp_keys(conn->link_pkey, pk)) {
- log_fn(LOG_WARNING,"We connected to '%s' but he gave us a different key. Closing.",
+ log_fn(LOG_WARN,"We connected to '%s' but he gave us a different key. Closing.",
router->nickname);
crypto_free_pk_env(pk);
return -1;
Index: cpuworker.c
===================================================================
RCS file: /home/or/cvsroot/src/or/cpuworker.c,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -d -r1.11 -r1.12
--- cpuworker.c 4 Oct 2003 03:29:09 -0000 1.11
+++ cpuworker.c 10 Oct 2003 01:48:32 -0000 1.12
@@ -58,7 +58,7 @@
assert(conn && conn->type == CONN_TYPE_CPUWORKER);
if(conn->inbuf_reached_eof) {
- log_fn(LOG_WARNING,"Read eof. Worker dying.");
+ log_fn(LOG_WARN,"Read eof. Worker dying.");
if(conn->state != CPUWORKER_STATE_IDLE) {
/* XXX the circ associated with this cpuworker will wait forever. Oops. */
num_cpuworkers_busy--;
@@ -87,12 +87,12 @@
}
assert(circ->p_conn);
if(*buf == 0) {
- log_fn(LOG_WARNING,"decoding onionskin failed. Closing.");
+ log_fn(LOG_WARN,"decoding onionskin failed. Closing.");
circuit_close(circ);
goto done_processing;
}
if(onionskin_answer(circ, buf+1+TAG_LEN, buf+1+TAG_LEN+DH_KEY_LEN) < 0) {
- log_fn(LOG_WARNING,"onionskin_answer failed. Closing.");
+ log_fn(LOG_WARN,"onionskin_answer failed. Closing.");
circuit_close(circ);
goto done_processing;
}
@@ -145,7 +145,7 @@
if(onion_skin_server_handshake(question, get_onion_key(),
reply_to_proxy, keys, 32) < 0) {
/* failure */
- log_fn(LOG_WARNING,"onion_skin_server_handshake failed.");
+ log_fn(LOG_WARN,"onion_skin_server_handshake failed.");
memset(buf,0,LEN_ONION_RESPONSE); /* send all zeros for failure */
} else {
/* success */
@@ -187,7 +187,7 @@
conn->address = tor_strdup("localhost");
if(connection_add(conn) < 0) { /* no space, forget it */
- log_fn(LOG_WARNING,"connection_add failed. Giving up.");
+ log_fn(LOG_WARN,"connection_add failed. Giving up.");
connection_free(conn); /* this closes fd[0] */
return -1;
}
@@ -208,7 +208,7 @@
while(num_cpuworkers < num_cpuworkers_needed) {
if(spawn_cpuworker() < 0) {
- log_fn(LOG_WARNING,"spawn failed!");
+ log_fn(LOG_WARN,"spawn failed!");
return;
}
num_cpuworkers++;
@@ -227,7 +227,7 @@
if(!circ)
return;
if(assign_to_cpuworker(cpuworker, CPUWORKER_TASK_ONION, circ) < 0)
- log_fn(LOG_WARNING,"assign_to_cpuworker failed. Ignoring.");
+ log_fn(LOG_WARN,"assign_to_cpuworker failed. Ignoring.");
}
/* if cpuworker is defined, assert that he's idle, and use him. else,
Index: directory.c
===================================================================
RCS file: /home/or/cvsroot/src/or/directory.c,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -d -r1.44 -r1.45
--- directory.c 8 Oct 2003 02:04:07 -0000 1.44
+++ directory.c 10 Oct 2003 01:48:32 -0000 1.45
@@ -22,7 +22,7 @@
connection_t *conn;
if(!router) { /* i guess they didn't have one in mind for me to use */
- log_fn(LOG_WARNING,"No running dirservers known. This is really bad.");
+ log_fn(LOG_WARN,"No running dirservers known. This is really bad.");
/* XXX never again will a directory fetch work. Should we exit here, or what? */
return;
}
@@ -50,7 +50,7 @@
if (router->identity_pkey)
conn->identity_pkey = crypto_pk_dup_key(router->identity_pkey);
else {
- log_fn(LOG_WARNING, "No signing key known for dirserver %s; signature won't be checked", conn->address);
+ log_fn(LOG_WARN, "No signing key known for dirserver %s; signature won't be checked", conn->address);
conn->identity_pkey = NULL;
/* XXX is there really any situation where router doesn't have an identity_pkey? */
}
@@ -96,7 +96,7 @@
case DIR_CONN_STATE_CONNECTING_UPLOAD:
s = router_get_my_descriptor();
if(!s) {
- log_fn(LOG_WARNING,"Failed to get my descriptor.");
+ log_fn(LOG_WARN,"Failed to get my descriptor.");
return -1;
}
snprintf(tmp, sizeof(tmp), "POST / HTTP/1.0\r\nContent-Length: %d\r\n\r\n%s",
@@ -119,7 +119,7 @@
switch(fetch_from_buf_http(conn->inbuf,
NULL, 0, the_directory, MAX_DIR_SIZE)) {
case -1: /* overflow */
- log_fn(LOG_WARNING,"'fetch' response too large. Failing.");
+ log_fn(LOG_WARN,"'fetch' response too large. Failing.");
return -1;
case 0:
log_fn(LOG_INFO,"'fetch' response not all here, but we're at eof. Closing.");
@@ -173,7 +173,7 @@
switch(fetch_from_buf_http(conn->inbuf,
headers, sizeof(headers), body, sizeof(body))) {
case -1: /* overflow */
- log_fn(LOG_WARNING,"input too large. Failing.");
+ log_fn(LOG_WARN,"input too large. Failing.");
return -1;
case 0:
log_fn(LOG_DEBUG,"command not all here yet.");
@@ -189,7 +189,7 @@
dlen = dirserv_get_directory(&cp);
if(dlen == 0) {
- log_fn(LOG_WARNING,"My directory is empty. Closing.");
+ log_fn(LOG_WARN,"My directory is empty. Closing.");
return -1; /* XXX send some helpful http error code */
}
@@ -205,7 +205,7 @@
log_fn(LOG_DEBUG,"Received POST command.");
cp = body;
if(dirserv_add_descriptor(&cp) < 0) {
- log_fn(LOG_WARNING,"dirserv_add_descriptor() failed. Dropping.");
+ log_fn(LOG_WARN,"dirserv_add_descriptor() failed. Dropping.");
return -1; /* XXX should write an http failed code */
}
dirserv_get_directory(&cp); /* rebuild and write to disk */
@@ -214,7 +214,7 @@
return 0;
}
- log_fn(LOG_WARNING,"Got headers with unknown command. Closing.");
+ log_fn(LOG_WARN,"Got headers with unknown command. Closing.");
return -1;
}
@@ -255,7 +255,7 @@
log_fn(LOG_INFO,"Finished writing server response. Closing.");
return -1; /* kill it */
default:
- log_fn(LOG_WARNING,"BUG: called in unexpected state.");
+ log_fn(LOG_WARN,"BUG: called in unexpected state.");
return -1;
}
return 0;
Index: dirserv.c
===================================================================
RCS file: /home/or/cvsroot/src/or/dirserv.c,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -d -r1.9 -r1.10
--- dirserv.c 4 Oct 2003 03:29:09 -0000 1.9
+++ dirserv.c 10 Oct 2003 01:48:32 -0000 1.10
@@ -62,23 +62,23 @@
int i, result;
if(!(file = fopen(fname, "r"))) {
- log_fn(LOG_WARNING, "Cannot open fingerprint file %s", fname);
+ log_fn(LOG_WARN, "Cannot open fingerprint file %s", fname);
return -1;
}
while( (result=parse_line_from_file(line, sizeof(line),file,&nickname,&fingerprint)) > 0) {
if (strlen(nickname) > MAX_NICKNAME_LEN) {
- log(LOG_WARNING, "Nickname %s too long in fingerprint file. Skipping.", nickname);
+ log(LOG_WARN, "Nickname %s too long in fingerprint file. Skipping.", nickname);
continue;
}
if(strlen(fingerprint) != FINGERPRINT_LEN ||
!crypto_pk_check_fingerprint_syntax(fingerprint)) {
- log_fn(LOG_WARNING, "Invalid fingerprint (nickname %s, fingerprint %s). Skipping.",
+ log_fn(LOG_WARN, "Invalid fingerprint (nickname %s, fingerprint %s). Skipping.",
nickname, fingerprint);
continue;
}
for (i = 0; i < n_fingerprints_tmp; ++i) {
if (0==strcasecmp(fingerprint_list_tmp[i].nickname, nickname)) {
- log(LOG_WARNING, "Duplicate nickname %s. Skipping.",nickname);
+ log(LOG_WARN, "Duplicate nickname %s. Skipping.",nickname);
break; /* out of the for. the 'if' below means skip to the next line. */
}
}
@@ -97,7 +97,7 @@
return 0;
}
/* error */
- log_fn(LOG_WARNING, "Error reading from fingerprint file");
+ log_fn(LOG_WARN, "Error reading from fingerprint file");
for (i = 0; i < n_fingerprints_tmp; ++i) {
free(fingerprint_list_tmp[i].nickname);
free(fingerprint_list_tmp[i].fingerprint);
@@ -123,18 +123,18 @@
}
if (!ent) { /* No such server known */
- log_fn(LOG_WARNING,"no fingerprint found for %s",router->nickname);
+ log_fn(LOG_WARN,"no fingerprint found for %s",router->nickname);
return 0;
}
if (crypto_pk_get_fingerprint(router->identity_pkey, fp)) {
- log_fn(LOG_WARNING,"error computing fingerprint");
+ log_fn(LOG_WARN,"error computing fingerprint");
return 0;
}
if (0==strcasecmp(ent->fingerprint, fp)) {
log_fn(LOG_DEBUG,"good fingerprint for %s",router->nickname);
return 1; /* Right fingerprint. */
} else {
- log_fn(LOG_WARNING,"mismatched fingerprint for %s",router->nickname);
+ log_fn(LOG_WARN,"mismatched fingerprint for %s",router->nickname);
return 0; /* Wrong fingerprint. */
}
}
@@ -197,7 +197,7 @@
start = strstr(*desc, "router ");
if (!start) {
- log(LOG_WARNING, "no descriptor found.");
+ log(LOG_WARN, "no descriptor found.");
goto err;
}
if ((end = strstr(start+6, "\nrouter "))) {
@@ -215,13 +215,13 @@
/* Check: is the descriptor syntactically valid? */
ri = router_get_entry_from_string(&cp);
if (!ri) {
- log(LOG_WARNING, "Couldn't parse descriptor");
+ log(LOG_WARN, "Couldn't parse descriptor");
goto err;
}
free(desc_tmp); desc_tmp = NULL;
/* Okay. Now check whether the fingerprint is recognized. */
if (!dirserv_router_fingerprint_is_known(ri)) {
- log(LOG_WARNING, "Identity is unrecognized for descriptor");
+ log(LOG_WARN, "Identity is unrecognized for descriptor");
goto err;
}
/* Do we already have an entry for this router? */
@@ -372,11 +372,11 @@
cp = s + i;
if (router_get_dir_hash(s,digest)) {
- log_fn(LOG_WARNING,"couldn't compute digest");
+ log_fn(LOG_WARN,"couldn't compute digest");
return -1;
}
if (crypto_pk_private_sign(private_key, digest, 20, signature) < 0) {
- log_fn(LOG_WARNING,"couldn't sign digest");
+ log_fn(LOG_WARN,"couldn't sign digest");
return -1;
}
log(LOG_DEBUG,"generated directory digest begins with %02x:%02x:%02x:%02x",
@@ -389,7 +389,7 @@
i = strlen(s);
cp = s+i;
if (base64_encode(cp, maxlen-i, signature, 128) < 0) {
- log_fn(LOG_WARNING,"couldn't base64-encode signature");
+ log_fn(LOG_WARN,"couldn't base64-encode signature");
return -1;
}
@@ -398,7 +398,7 @@
strncat(cp, "-----END SIGNATURE-----\n", maxlen-i);
i = strlen(s);
if (i == maxlen) {
- log_fn(LOG_WARNING,"tried to exceed string length.");
+ log_fn(LOG_WARN,"tried to exceed string length.");
return -1;
}
@@ -413,7 +413,7 @@
new_directory = tor_malloc(MAX_DIR_SIZE);
if (dirserv_dump_directory_to_string(new_directory, MAX_DIR_SIZE,
get_identity_key())) {
- log(LOG_WARNING, "Error creating directory.");
+ log(LOG_WARN, "Error creating directory.");
free(new_directory);
return 0;
}
@@ -436,7 +436,7 @@
free(new_directory);
sprintf(filename,"%s/cached-directory", options.DataDirectory);
if(write_str_to_file(filename,the_directory) < 0) {
- log_fn(LOG_WARNING, "Couldn't write cached directory to disk. Ignoring.");
+ log_fn(LOG_WARN, "Couldn't write cached directory to disk. Ignoring.");
}
} else {
log(LOG_INFO,"Directory still clean, reusing.");
Index: dns.c
===================================================================
RCS file: /home/or/cvsroot/src/or/dns.c,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -d -r1.31 -r1.32
--- dns.c 4 Oct 2003 03:29:09 -0000 1.31
+++ dns.c 10 Oct 2003 01:48:32 -0000 1.32
@@ -160,7 +160,7 @@
dnsconn = connection_get_by_type_state(CONN_TYPE_DNSWORKER, DNSWORKER_STATE_IDLE);
if(!dnsconn) {
- log_fn(LOG_WARNING,"no idle dns workers. Failing.");
+ log_fn(LOG_WARN,"no idle dns workers. Failing.");
dns_cancel_pending_resolve(exitconn->address, NULL);
return -1;
}
@@ -190,7 +190,7 @@
resolve = SPLAY_FIND(cache_tree, &cache_root, &search);
if(!resolve) {
- log_fn(LOG_WARNING,"Question '%s' is not pending. Dropping.", question);
+ log_fn(LOG_WARN,"Question '%s' is not pending. Dropping.", question);
return;
}
@@ -255,7 +255,7 @@
resolve = SPLAY_FIND(cache_tree, &cache_root, &search);
if(!resolve) {
- log_fn(LOG_WARNING,"Answer to unasked question '%s'? Dropping.", question);
+ log_fn(LOG_WARN,"Answer to unasked question '%s'? Dropping.", question);
return;
}
@@ -293,7 +293,7 @@
assert(conn && conn->type == CONN_TYPE_DNSWORKER);
if(conn->inbuf_reached_eof) {
- log_fn(LOG_WARNING,"Read eof. Worker dying.");
+ log_fn(LOG_WARN,"Read eof. Worker dying.");
if(conn->state == DNSWORKER_STATE_BUSY) {
dns_cancel_pending_resolve(conn->address, NULL);
num_dnsworkers_busy--;
@@ -384,7 +384,7 @@
conn->address = tor_strdup("localhost");
if(connection_add(conn) < 0) { /* no space, forget it */
- log_fn(LOG_WARNING,"connection_add failed. Giving up.");
+ log_fn(LOG_WARN,"connection_add failed. Giving up.");
connection_free(conn); /* this closes fd[0] */
return -1;
}
@@ -422,7 +422,7 @@
while(num_dnsworkers < num_dnsworkers_needed) {
if(spawn_dnsworker() < 0) {
- log(LOG_WARNING,"spawn_enough_dnsworkers(): spawn failed!");
+ log(LOG_WARN,"spawn_enough_dnsworkers(): spawn failed!");
return;
}
num_dnsworkers++;
Index: main.c
===================================================================
RCS file: /home/or/cvsroot/src/or/main.c,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -d -r1.129 -r1.130
--- main.c 9 Oct 2003 18:45:13 -0000 1.129
+++ main.c 10 Oct 2003 01:48:32 -0000 1.130
@@ -80,7 +80,7 @@
int connection_add(connection_t *conn) {
if(nfds >= options.MaxConn-1) {
- log(LOG_WARNING,"connection_add(): failing because nfds is too high.");
+ log(LOG_WARN,"connection_add(): failing because nfds is too high.");
return -1;
}
@@ -103,7 +103,7 @@
poll_array[conn->poll_index].fd = conn->s;
}
-/* Remove the current function from the global list, and remove the
+/* Remove the connection from the global list, and remove the
* corresponding poll entry. Calling this function will shift the last
* connection (if any) into the position occupied by conn.
*/
@@ -114,10 +114,11 @@
assert(nfds>0);
log(LOG_INFO,"connection_remove(): removing socket %d, nfds now %d",conn->s, nfds-1);
- circuit_about_to_close_connection(conn); /* if it's an edge conn, remove it from the list
- * of conn's on this circuit. If it's not on an edge,
- * flush and send destroys for all circuits on this conn
- */
+ /* if it's an edge conn, remove it from the list
+ * of conn's on this circuit. If it's not on an edge,
+ * flush and send destroys for all circuits on this conn
+ */
+ circuit_about_to_close_connection(conn);
current_index = conn->poll_index;
if(current_index == nfds-1) { /* this is the end */
@@ -251,7 +252,7 @@
flush_buf(conn->s, conn->outbuf, &conn->outbuf_flushlen);
}
if(connection_wants_to_flush(conn)) /* not done flushing */
- log_fn(LOG_WARNING,"Conn (socket %d) still wants to flush. Losing %d bytes!",conn->s, (int)buf_datalen(conn->inbuf));
+ log_fn(LOG_WARN,"Conn (socket %d) still wants to flush. Losing %d bytes!",conn->s, (int)buf_datalen(conn->inbuf));
}
connection_remove(conn);
connection_free(conn);
@@ -262,7 +263,7 @@
}
}
-/* Perform regulare maintenance tasks for a single connection. This
+/* Perform regular maintenance tasks for a single connection. This
* function gets run once per second per connection by run_housekeeping.
*/
static void run_connection_housekeeping(int i, time_t now) {
@@ -333,7 +334,7 @@
time_to_fetch_directory = now + options.DirFetchPostPeriod;
}
- /* 2. Every NewCircuitPeriod seconds, we expire old ciruits and make a
+ /* 2. Every NewCircuitPeriod seconds, we expire old circuits and make a
* new one as needed.
*/
if(options.APPort && time_to_new_circuit < now) {
@@ -607,7 +608,7 @@
/* fetch a new directory */
if(options.DirPort) {
if(router_get_list_from_file(options.RouterFile) < 0) {
- log(LOG_WARNING,"Error reloading router list. Continuing with old list.");
+ log(LOG_WARN,"Error reloading router list. Continuing with old list.");
}
} else {
directory_initiate_command(router_pick_directory_server(), DIR_CONN_STATE_CONNECTING_FETCH);
@@ -677,7 +678,7 @@
please_reap_children = 1;
break;
default:
- log(LOG_WARNING,"Caught signal %d that we can't handle??", the_signal);
+ log(LOG_WARN,"Caught signal %d that we can't handle??", the_signal);
}
#endif /* signal stuff */
}
@@ -757,7 +758,7 @@
FILE *pidfile;
if ((pidfile = fopen(filename, "w")) == NULL) {
- log_fn(LOG_WARNING, "unable to open %s for writing: %s", filename,
+ log_fn(LOG_WARN, "unable to open %s for writing: %s", filename,
strerror(errno));
} else {
fprintf(pidfile, "%d", getpid());
Index: onion.c
===================================================================
RCS file: /home/or/cvsroot/src/or/onion.c,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -d -r1.73 -r1.74
--- onion.c 9 Oct 2003 18:45:13 -0000 1.73
+++ onion.c 10 Oct 2003 01:48:32 -0000 1.74
@@ -51,7 +51,7 @@
assert(!ol_tail->next);
if(ol_length >= options.MaxOnionsPending) {
- log_fn(LOG_WARNING,"Already have %d onions queued. Closing.", ol_length);
+ log_fn(LOG_WARN,"Already have %d onions queued. Closing.", ol_length);
free(tmp);
return -1;
}
@@ -141,13 +141,13 @@
if (!(circ->n_crypto =
crypto_create_init_cipher(CIRCUIT_CIPHER,keys,iv,0))) {
- log_fn(LOG_WARNING,"Cipher initialization failed (n).");
+ log_fn(LOG_WARN,"Cipher initialization failed (n).");
return -1;
}
if (!(circ->p_crypto =
crypto_create_init_cipher(CIRCUIT_CIPHER,keys+16,iv,1))) {
- log_fn(LOG_WARNING,"Cipher initialization failed (p).");
+ log_fn(LOG_WARN,"Cipher initialization failed (p).");
return -1;
}
@@ -193,7 +193,7 @@
*routelen = chooselen(cw);
if (*routelen == -1) {
- log_fn(LOG_WARNING,"Choosing route length failed.");
+ log_fn(LOG_WARN,"Choosing route length failed.");
return NULL;
}
log_fn(LOG_DEBUG,"Chosen route length %d (%d routers available).",*routelen, rarray_len);
@@ -211,7 +211,7 @@
}
if(*routelen < 1) {
- log_fn(LOG_WARNING,"Didn't find any acceptable routers. Failing.");
+ log_fn(LOG_WARN,"Didn't find any acceptable routers. Failing.");
return NULL;
}
Index: routers.c
===================================================================
RCS file: /home/or/cvsroot/src/or/routers.c,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -d -r1.78 -r1.79
--- routers.c 8 Oct 2003 02:04:08 -0000 1.78
+++ routers.c 10 Oct 2003 01:48:32 -0000 1.79
@@ -78,7 +78,7 @@
return;
if (!router_get_my_descriptor()) {
- log_fn(LOG_WARNING, "No descriptor; skipping upload");
+ log_fn(LOG_WARN, "No descriptor; skipping upload");
return;
}
@@ -192,12 +192,12 @@
string = read_file_to_str(routerfile);
if(!string) {
- log_fn(LOG_WARNING,"Failed to load routerfile %s.",routerfile);
+ log_fn(LOG_WARN,"Failed to load routerfile %s.",routerfile);
return -1;
}
if(router_get_list_from_string(string) < 0) {
- log_fn(LOG_WARNING,"The routerfile itself was corrupt.");
+ log_fn(LOG_WARN,"The routerfile itself was corrupt.");
free(string);
return -1;
}
@@ -458,11 +458,11 @@
int router_get_list_from_string(char *s)
{
if (router_get_list_from_string_impl(&s, &directory, -1, NULL)) {
- log(LOG_WARNING, "Error parsing router file");
+ log(LOG_WARN, "Error parsing router file");
return -1;
}
if (router_resolve_directory(directory)) {
- log(LOG_WARNING, "Error resolving directory");
+ log(LOG_WARN, "Error resolving directory");
return -1;
}
return 0;
@@ -474,23 +474,23 @@
char *start, *end;
start = strstr(s, start_str);
if (!start) {
- log_fn(LOG_WARNING,"couldn't find \"%s\"",start_str);
+ log_fn(LOG_WARN,"couldn't find \"%s\"",start_str);
return -1;
}
end = strstr(start+strlen(start_str), end_str);
if (!end) {
- log_fn(LOG_WARNING,"couldn't find \"%s\"",end_str);
+ log_fn(LOG_WARN,"couldn't find \"%s\"",end_str);
return -1;
}
end = strchr(end, '\n');
if (!end) {
- log_fn(LOG_WARNING,"couldn't find EOL");
+ log_fn(LOG_WARN,"couldn't find EOL");
return -1;
}
++end;
if (crypto_SHA_digest(start, end-start, digest)) {
- log_fn(LOG_WARNING,"couldn't compute digest");
+ log_fn(LOG_WARN,"couldn't compute digest");
return -1;
}
@@ -530,17 +530,17 @@
int router_get_dir_from_string(char *s, crypto_pk_env_t *pkey)
{
if (router_get_dir_from_string_impl(s, &directory, pkey)) {
- log_fn(LOG_WARNING, "Couldn't parse directory.");
+ log_fn(LOG_WARN, "Couldn't parse directory.");
return -1;
}
if (router_resolve_directory(directory)) {
- log_fn(LOG_WARNING, "Error resolving directory");
+ log_fn(LOG_WARN, "Error resolving directory");
return -1;
}
if (compare_recommended_versions(VERSION, directory->software_versions) < 0) {
- log(LOG_WARNING, "You are running tor version %s, which is no longer supported.\nPlease upgrade to one of %s.", VERSION, directory->software_versions);
+ log(LOG_WARN, "You are running tor version %s, which is no longer supported.\nPlease upgrade to one of %s.", VERSION, directory->software_versions);
if(options.IgnoreVersion) {
- log(LOG_WARNING, "IgnoreVersion is set. If it breaks, we told you so.");
+ log(LOG_WARN, "IgnoreVersion is set. If it breaks, we told you so.");
} else {
log(LOG_ERR,"Set IgnoreVersion config variable if you want to proceed.");
fflush(0);
@@ -567,19 +567,19 @@
#define NEXT_TOK() \
do { \
if (router_get_next_token(&s, &tok)) { \
- log_fn(LOG_WARNING, "Error reading directory: %s", tok.val.error);\
+ log_fn(LOG_WARN, "Error reading directory: %s", tok.val.error);\
return -1; \
} } while (0)
#define TOK_IS(type,name) \
do { \
if (tok.tp != type) { \
router_release_token(&tok); \
- log_fn(LOG_WARNING, "Error reading directory: expected %s", name);\
+ log_fn(LOG_WARN, "Error reading directory: expected %s", name);\
return -1; \
} } while(0)
if (router_get_dir_hash(s, digest)) {
- log_fn(LOG_WARNING, "Unable to compute digest of directory");
+ log_fn(LOG_WARN, "Unable to compute digest of directory");
goto err;
}
log(LOG_DEBUG,"Received directory hashes to %02x:%02x:%02x:%02x",
@@ -592,19 +592,19 @@
NEXT_TOK();
TOK_IS(K_PUBLISHED, "published");
if (tok.val.cmd.n_args != 2) {
- log_fn(LOG_WARNING, "Invalid published line");
+ log_fn(LOG_WARN, "Invalid published line");
goto err;
}
tok.val.cmd.args[1][-1] = ' ';
if (!strptime(tok.val.cmd.args[0], "%Y-%m-%d %H:%M:%S", &published)) {
- log_fn(LOG_WARNING, "Published time was unparseable"); goto err;
+ log_fn(LOG_WARN, "Published time was unparseable"); goto err;
}
published_on = timegm(&published);
NEXT_TOK();
TOK_IS(K_RECOMMENDED_SOFTWARE, "recommended-software");
if (tok.val.cmd.n_args != 1) {
- log_fn(LOG_WARNING, "Invalid recommended-software line");
+ log_fn(LOG_WARN, "Invalid recommended-software line");
goto err;
}
versions = tor_strdup(tok.val.cmd.args[0]);
@@ -616,7 +616,7 @@
if (router_get_list_from_string_impl(&s, &new_dir,
n_good_nicknames, good_nickname_lst)) {
- log_fn(LOG_WARNING, "Error reading routers from directory");
+ log_fn(LOG_WARN, "Error reading routers from directory");
goto err;
}
new_dir->software_versions = versions;
@@ -629,7 +629,7 @@
if (pkey) {
if (crypto_pk_public_checksig(pkey, tok.val.signature, 128, signed_digest)
!= 20) {
- log_fn(LOG_WARNING, "Error reading directory: invalid signature.");
+ log_fn(LOG_WARN, "Error reading directory: invalid signature.");
free(tok.val.signature);
goto err;
}
@@ -637,7 +637,7 @@
((int)signed_digest[0])&0xff,((int)signed_digest[1])&0xff,
((int)signed_digest[2])&0xff,((int)signed_digest[3])&0xff);
if (memcmp(digest, signed_digest, 20)) {
- log_fn(LOG_WARNING, "Error reading directory: signature does not match.");
+ log_fn(LOG_WARN, "Error reading directory: signature does not match.");
free(tok.val.signature);
goto err;
}
@@ -680,11 +680,11 @@
break;
router = router_get_entry_from_string(s);
if (!router) {
- log_fn(LOG_WARNING, "Error reading router");
+ log_fn(LOG_WARN, "Error reading router");
return -1;
}
if (rarray_len >= MAX_ROUTERS_IN_DIR) {
- log_fn(LOG_WARNING, "too many routers");
+ log_fn(LOG_WARN, "too many routers");
routerinfo_free(router);
continue;
}
@@ -719,7 +719,7 @@
rent = (struct hostent *)gethostbyname(router->address);
if (!rent) {
- log_fn(LOG_WARNING,"Could not get address for router %s.",router->address);
+ log_fn(LOG_WARN,"Could not get address for router %s.",router->address);
return -1;
}
assert(rent->h_length == 4);
@@ -740,7 +740,7 @@
for (i = 0; i < max; ++i) {
remove = 0;
if (router_resolve(dir->routers[i])) {
- log_fn(LOG_WARNING, "Couldn't resolve router %s; removing",
+ log_fn(LOG_WARN, "Couldn't resolve router %s; removing",
dir->routers[i]->address);
remove = 1;
routerinfo_free(dir->routers[i]);
@@ -773,14 +773,14 @@
#define NEXT_TOKEN() \
do { if (router_get_next_token(s, tok)) { \
- log_fn(LOG_WARNING, "Error reading directory: %s", tok->val.error);\
+ log_fn(LOG_WARN, "Error reading directory: %s", tok->val.error);\
goto err; \
} } while(0)
#define ARGS tok->val.cmd.args
if (router_get_router_hash(*s, digest) < 0) {
- log_fn(LOG_WARNING, "Couldn't compute router hash.");
+ log_fn(LOG_WARN, "Couldn't compute router hash.");
return NULL;
}
@@ -788,7 +788,7 @@
if (tok->tp != K_ROUTER) {
router_release_token(tok);
- log_fn(LOG_WARNING,"Entry does not start with \"router\"");
+ log_fn(LOG_WARN,"Entry does not start with \"router\"");
return NULL;
}
@@ -799,17 +799,17 @@
router->onion_pkey = router->identity_pkey = router->link_pkey = NULL;
if (tok->val.cmd.n_args != 6) {
- log_fn(LOG_WARNING,"Wrong # of arguments to \"router\"");
+ log_fn(LOG_WARN,"Wrong # of arguments to \"router\"");
goto err;
}
router->nickname = tor_strdup(ARGS[0]);
if (strlen(router->nickname) > MAX_NICKNAME_LEN) {
- log_fn(LOG_WARNING,"Router nickname too long.");
+ log_fn(LOG_WARN,"Router nickname too long.");
goto err;
}
if (strspn(router->nickname, LEGAL_NICKNAME_CHARACTERS) !=
strlen(router->nickname)) {
- log_fn(LOG_WARNING, "Router nickname contains illegal characters.");
+ log_fn(LOG_WARN, "Router nickname contains illegal characters.");
goto err;
}
@@ -820,7 +820,7 @@
/* Read router->or_port */
router->or_port = atoi(ARGS[2]);
if(!router->or_port) {
- log_fn(LOG_WARNING,"or_port unreadable or 0. Failing.");
+ log_fn(LOG_WARN,"or_port unreadable or 0. Failing.");
goto err;
}
@@ -833,7 +833,7 @@
/* Router->bandwidth */
router->bandwidth = atoi(ARGS[5]);
if (!router->bandwidth) {
- log_fn(LOG_WARNING,"bandwidth unreadable or 0. Failing.");
+ log_fn(LOG_WARN,"bandwidth unreadable or 0. Failing.");
goto err;
}
@@ -847,44 +847,44 @@
}
if (tok->tp != K_PUBLISHED) {
- log_fn(LOG_WARNING, "Missing published time"); goto err;
+ log_fn(LOG_WARN, "Missing published time"); goto err;
}
if (tok->val.cmd.n_args != 2) {
- log_fn(LOG_WARNING, "Wrong number of arguments to published"); goto err;
+ log_fn(LOG_WARN, "Wrong number of arguments to published"); goto err;
}
ARGS[1][-1] = ' '; /* Re-insert space. */
if (!strptime(ARGS[0], "%Y-%m-%d %H:%M:%S", &published)) {
- log_fn(LOG_WARNING, "Published time was unparseable"); goto err;
+ log_fn(LOG_WARN, "Published time was unparseable"); goto err;
}
router->published_on = timegm(&published);
NEXT_TOKEN();
if (tok->tp != K_ONION_KEY) {
- log_fn(LOG_WARNING, "Missing onion-key"); goto err;
+ log_fn(LOG_WARN, "Missing onion-key"); goto err;
}
NEXT_TOKEN();
if (tok->tp != _PUBLIC_KEY) {
- log_fn(LOG_WARNING, "Missing onion key"); goto err;
+ log_fn(LOG_WARN, "Missing onion key"); goto err;
} /* XXX Check key length */
router->onion_pkey = tok->val.public_key;
NEXT_TOKEN();
if (tok->tp != K_LINK_KEY) {
- log_fn(LOG_WARNING, "Missing link-key"); goto err;
+ log_fn(LOG_WARN, "Missing link-key"); goto err;
}
NEXT_TOKEN();
if (tok->tp != _PUBLIC_KEY) {
- log_fn(LOG_WARNING, "Missing link key"); goto err;
+ log_fn(LOG_WARN, "Missing link key"); goto err;
} /* XXX Check key length */
router->link_pkey = tok->val.public_key;
NEXT_TOKEN();
if (tok->tp != K_SIGNING_KEY) {
- log_fn(LOG_WARNING, "Missing signing-key"); goto err;
+ log_fn(LOG_WARN, "Missing signing-key"); goto err;
}
NEXT_TOKEN();
if (tok->tp != _PUBLIC_KEY) {
- log_fn(LOG_WARNING, "Missing signing key"); goto err;
+ log_fn(LOG_WARN, "Missing signing key"); goto err;
}
router->identity_pkey = tok->val.public_key;
@@ -895,23 +895,23 @@
}
if (tok->tp != K_ROUTER_SIGNATURE) {
- log_fn(LOG_WARNING,"Missing router signature");
+ log_fn(LOG_WARN,"Missing router signature");
goto err;
}
NEXT_TOKEN();
if (tok->tp != _SIGNATURE) {
- log_fn(LOG_WARNING,"Missing router signature");
+ log_fn(LOG_WARN,"Missing router signature");
goto err;
}
assert (router->identity_pkey);
if ((t=crypto_pk_public_checksig(router->identity_pkey, tok->val.signature,
128, signed_digest)) != 20) {
- log_fn(LOG_WARNING, "Invalid signature %d",t);
+ log_fn(LOG_WARN, "Invalid signature %d",t);
goto err;
}
if (memcmp(digest, signed_digest, 20)) {
- log_fn(LOG_WARNING, "Mismatched signature");
+ log_fn(LOG_WARN, "Mismatched signature");
goto err;
}
@@ -972,7 +972,7 @@
}
log_fn(LOG_DEBUG,"Adding new entry '%s'",line);
if(router_add_exit_policy_from_string(router,line) < 0)
- log_fn(LOG_WARNING,"Malformed exit policy %s; skipping.", line);
+ log_fn(LOG_WARN,"Malformed exit policy %s; skipping.", line);
if(last)
return;
s = e+1;
@@ -996,12 +996,12 @@
tmp[len]='\n';
tmp[len+1]='\0';
if (router_get_next_token(&cp, &tok)) {
- log_fn(LOG_WARNING, "Error reading exit policy: %s", tok.val.error);
+ log_fn(LOG_WARN, "Error reading exit policy: %s", tok.val.error);
free(tmp);
return -1;
}
if (tok.tp != K_ACCEPT && tok.tp != K_REJECT) {
- log_fn(LOG_WARNING, "Expected 'accept' or 'reject'.");
+ log_fn(LOG_WARN, "Expected 'accept' or 'reject'.");
free(tmp);
return -1;
}
@@ -1058,7 +1058,7 @@
policy_read_failed:
assert(newe->string);
- log_fn(LOG_WARNING,"Couldn't parse line '%s'. Dropping", newe->string);
+ log_fn(LOG_WARN,"Couldn't parse line '%s'. Dropping", newe->string);
if(newe->string)
free(newe->string);
if(newe->address)
@@ -1085,7 +1085,7 @@
log_fn(LOG_DEBUG,"Considering exit policy %s:%s",tmpe->address, tmpe->port);
if(strcmp(tmpe->address,"*") &&
inet_aton(tmpe->address,&in) == 0) { /* malformed IP. reject. */
- log_fn(LOG_WARNING,"Malformed IP %s in exit policy. Rejecting.",tmpe->address);
+ log_fn(LOG_WARN,"Malformed IP %s in exit policy. Rejecting.",tmpe->address);
return -1;
}
if((!strcmp(tmpe->address,"*") || conn->addr == ntohl(in.s_addr)) &&
@@ -1126,7 +1126,7 @@
if(!address) { /* if not specified in config, we find a default */
if(gethostname(localhostname,sizeof(localhostname)) < 0) {
- log_fn(LOG_WARNING,"Error obtaining local hostname");
+ log_fn(LOG_WARN,"Error obtaining local hostname");
return -1;
}
address = localhostname;
@@ -1149,7 +1149,7 @@
routerinfo_free(desc_routerinfo);
desc_routerinfo = ri;
if (router_dump_router_to_string(descriptor, 8192, ri, get_identity_key())<0) {
- log_fn(LOG_WARNING, "Couldn't dump router to string.");
+ log_fn(LOG_WARN, "Couldn't dump router to string.");
return -1;
}
return 0;
@@ -1184,25 +1184,25 @@
get_platform_str(platform, sizeof(platform));
if (crypto_pk_cmp_keys(ident_key, router->identity_pkey)) {
- log_fn(LOG_WARNING,"Tried to sign a router with a private key that didn't match router's public key!");
+ log_fn(LOG_WARN,"Tried to sign a router with a private key that didn't match router's public key!");
return -1;
}
if(crypto_pk_write_public_key_to_string(router->onion_pkey,
&onion_pkey,&onion_pkeylen)<0) {
- log_fn(LOG_WARNING,"write onion_pkey to string failed!");
+ log_fn(LOG_WARN,"write onion_pkey to string failed!");
return -1;
}
if(crypto_pk_write_public_key_to_string(router->identity_pkey,
&identity_pkey,&identity_pkeylen)<0) {
- log_fn(LOG_WARNING,"write identity_pkey to string failed!");
+ log_fn(LOG_WARN,"write identity_pkey to string failed!");
return -1;
}
if(crypto_pk_write_public_key_to_string(router->link_pkey,
&link_pkey,&link_pkeylen)<0) {
- log_fn(LOG_WARNING,"write link_pkey to string failed!");
+ log_fn(LOG_WARN,"write link_pkey to string failed!");
return -1;
}
strftime(published, 32, "%Y-%m-%d %H:%M:%S", gmtime(&router->published_on));
@@ -1254,13 +1254,13 @@
return -1;
if (crypto_pk_private_sign(ident_key, digest, 20, signature) < 0) {
- log_fn(LOG_WARNING, "Error signing digest");
+ log_fn(LOG_WARN, "Error signing digest");
return -1;
}
strcat(s+written, "-----BEGIN SIGNATURE-----\n");
written += strlen(s+written);
if (base64_encode(s+written, maxlen-written, signature, 128) < 0) {
- log_fn(LOG_WARNING, "Couldn't base64-encode signature");
+ log_fn(LOG_WARN, "Couldn't base64-encode signature");
return -1;
}
written += strlen(s+written);
Index: test.c
===================================================================
RCS file: /home/or/cvsroot/src/or/test.c,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -d -r1.41 -r1.42
--- test.c 8 Oct 2003 02:04:08 -0000 1.41
+++ test.c 10 Oct 2003 01:48:32 -0000 1.42
@@ -554,7 +554,7 @@
&pk3_str_len));
memset(buf, 0, 2048);
- log_set_severity(LOG_WARNING);
+ log_set_severity(LOG_WARN);
test_assert(router_dump_router_to_string(buf, 2048, &r1, pk2)>0);
strcpy(buf2, "router Magri testaddr1.foo.bar 9000 9002 9003 1000\n"