summaryrefslogtreecommitdiff
path: root/src/common/tortls.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2015-10-07 10:10:08 -0400
committerNick Mathewson <nickm@torproject.org>2015-10-07 10:13:39 -0400
commit6505d529a5cc669ee723d818a614fe7663e5c0ea (patch)
tree101a15213cc6ba402df85569f47482a345fbef97 /src/common/tortls.c
parent2ad6e1bb0eeec88e8a2580a9b33a5dbadc995ba2 (diff)
downloadtor-6505d529a5cc669ee723d818a614fe7663e5c0ea.tar.gz
tor-6505d529a5cc669ee723d818a614fe7663e5c0ea.zip
Remove client-side support for detecting v1 handshake
Fixes more of 11150
Diffstat (limited to 'src/common/tortls.c')
-rw-r--r--src/common/tortls.c22
1 files changed, 3 insertions, 19 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c
index 62d8cab50f..4321330708 100644
--- a/src/common/tortls.c
+++ b/src/common/tortls.c
@@ -1941,25 +1941,9 @@ tor_tls_finish_handshake(tor_tls_t *tls)
tls->wasV2Handshake = 0;
}
} else {
-#if 1111
- /* XXXXXXXX remove v1 detection support, NM! */
- /* If we got no ID cert, we're a v2 handshake. */
- X509 *cert = SSL_get_peer_certificate(tls->ssl);
- STACK_OF(X509) *chain = SSL_get_peer_cert_chain(tls->ssl);
- int n_certs = sk_X509_num(chain);
- if (n_certs > 1 || (n_certs == 1 && cert != sk_X509_value(chain, 0))) {
- log_debug(LD_HANDSHAKE, "Server sent back multiple certificates; it "
- "looks like a v1 handshake on %p", tls);
- tls->wasV2Handshake = 0;
- } else {
- log_debug(LD_HANDSHAKE,
- "Server sent back a single certificate; looks like "
- "a v2 handshake on %p.", tls);
- tls->wasV2Handshake = 1;
- }
- if (cert)
- X509_free(cert);
-#endif
+ /* Client-side */
+ tls->wasV2Handshake = 1;
+ /* XXXX this can move, probably? -NM */
if (SSL_set_cipher_list(tls->ssl, SERVER_CIPHER_LIST) == 0) {
tls_log_errors(NULL, LOG_WARN, LD_HANDSHAKE, "re-setting ciphers");
r = TOR_TLS_ERROR_MISC;