projects
/
privoxy.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
ChangeLog: Add entries for Privoxy 3.0.34 stable
[privoxy.git]
/
jcc.c
diff --git
a/jcc.c
b/jcc.c
index
43d9acc
..
61fc1ac
100644
(file)
--- a/
jcc.c
+++ b/
jcc.c
@@
-2122,12
+2122,12
@@
static int read_http_request_body(struct client_state *csp)
if (to_read != 0)
{
log_error(LOG_LEVEL_CONNECT,
if (to_read != 0)
{
log_error(LOG_LEVEL_CONNECT,
- "Not enough request body has been read: expected %lu more bytes",
+ "Not enough request body has been read: expected %lu more bytes
.
",
to_read);
return 1;
}
log_error(LOG_LEVEL_CONNECT,
to_read);
return 1;
}
log_error(LOG_LEVEL_CONNECT,
- "The last %d bytes of the request body have been read", len);
+ "The last %d bytes of the request body have been read
.
", len);
return 0;
}
return 0;
}
@@
-2302,7
+2302,7
@@
static int read_https_request_body(struct client_state *csp)
if (len <= 0)
{
log_error(LOG_LEVEL_CONNECT,
if (len <= 0)
{
log_error(LOG_LEVEL_CONNECT,
- "Did not receive the whole encrypted request body from %s",
+ "Did not receive the whole encrypted request body from %s
.
",
csp->ip_addr_str);
return 1;
}
csp->ip_addr_str);
return 1;
}
@@
-2316,13
+2316,13
@@
static int read_https_request_body(struct client_state *csp)
if (to_read != 0)
{
log_error(LOG_LEVEL_CONNECT,
if (to_read != 0)
{
log_error(LOG_LEVEL_CONNECT,
- "Not enough encrypted request body has been read: expected %lu more bytes",
+ "Not enough encrypted request body has been read: expected %lu more bytes
.
",
to_read);
return 1;
}
log_error(LOG_LEVEL_CONNECT,
to_read);
return 1;
}
log_error(LOG_LEVEL_CONNECT,
- "The last %llu bytes of the encrypted request body have been read",
+ "The last %llu bytes of the encrypted request body have been read
.
",
csp->expected_client_content_length);
return 0;
}
csp->expected_client_content_length);
return 0;
}
@@
-2371,7
+2371,7
@@
static int receive_and_send_encrypted_post_data(struct client_state *csp)
/* XXX: Does this actually happen? */
break;
}
/* XXX: Does this actually happen? */
break;
}
- log_error(LOG_LEVEL_CONNECT, "Forwarding %d bytes of encrypted request body",
+ log_error(LOG_LEVEL_CONNECT, "Forwarding %d bytes of encrypted request body
.
",
len);
len = ssl_send_data(&(csp->ssl_server_attr), buf, (size_t)len);
if (len == -1)
len);
len = ssl_send_data(&(csp->ssl_server_attr), buf, (size_t)len);
if (len == -1)
@@
-2386,13
+2386,13
@@
static int receive_and_send_encrypted_post_data(struct client_state *csp)
}
if (csp->expected_client_content_length == 0)
{
}
if (csp->expected_client_content_length == 0)
{
- log_error(LOG_LEVEL_CONNECT, "Forwarded the last %d bytes", len);
+ log_error(LOG_LEVEL_CONNECT, "Forwarded the last %d bytes
.
", len);
break;
}
}
}
break;
}
}
}
- log_error(LOG_LEVEL_CONNECT, "Done forwarding encrypted request body");
+ log_error(LOG_LEVEL_CONNECT, "Done forwarding encrypted request body
.
");
return 0;
return 0;
@@
-4167,8
+4167,8
@@
static void handle_established_connection(struct client_state *csp)
*/
if (chunk_offset >= len)
{
*/
if (chunk_offset >= len)
{
- log_error(LOG_LEVEL_CONNECT,
- "
Reducing chunk offset from %lu to %lu after flushing %ld bytes
",
+ log_error(LOG_LEVEL_CONNECT,
"Reducing the chunk offset "
+ "
from %lu to %lu after flushing %ld bytes.
",
chunk_offset, (chunk_offset - (unsigned)len), len);
chunk_offset = chunk_offset - (unsigned)len;
}
chunk_offset, (chunk_offset - (unsigned)len), len);
chunk_offset = chunk_offset - (unsigned)len;
}