Fix mtu fragment size probing

This commit is contained in:
Erik Ekman 2009-09-20 16:54:29 +00:00
parent 1e72e7cc78
commit ed36bbdf65

View File

@ -1191,11 +1191,12 @@ fragsize_check(char *in, int read, int proposed_fragsize, int *max_fragsize)
*max_fragsize = acked_fragsize; *max_fragsize = acked_fragsize;
return 1; return 1;
} else { } else {
if (downenc != ' ' && downenc != 'T') if (downenc != ' ' && downenc != 'T') {
fprintf(stderr, "%d corrupted at %d.. (Try -O Base32)\n", acked_fragsize, i); fprintf(stderr, "%d corrupted at %d.. (Try -O Base32)\n", acked_fragsize, i);
else } else {
fprintf(stderr, "%d corrupted at %d.. ", acked_fragsize, i); fprintf(stderr, "%d corrupted at %d.. ", acked_fragsize, i);
fflush(stderr); fflush(stderr);
}
return 1; return 1;
} }
} /* always returns */ } /* always returns */
@ -1241,7 +1242,7 @@ handshake_autoprobe_fragsize(int dns_fd)
r = select(dns_fd + 1, &fds, NULL, NULL, &tv); r = select(dns_fd + 1, &fds, NULL, NULL, &tv);
if(r >= 2) { if(r > 0) {
read = read_dns(dns_fd, 0, in, sizeof(in)); read = read_dns(dns_fd, 0, in, sizeof(in));
if (read > 0) { if (read > 0) {