summaryrefslogtreecommitdiff
path: root/src/common
diff options
context:
space:
mode:
authorSebastian Hahn <sebastian@torproject.org>2010-04-19 22:38:44 +0200
committerRoger Dingledine <arma@torproject.org>2010-04-20 03:57:33 -0400
commit0b82ce3eb6feeb48e2e3094de297156e536527a0 (patch)
tree5cbc97d72dabfdeaaeb99ff74043315889f3dd3d /src/common
parent18678e5f1ecf1b5b2d6b3900bf22a856958b1a46 (diff)
downloadtor-0b82ce3eb6feeb48e2e3094de297156e536527a0.tar.gz
tor-0b82ce3eb6feeb48e2e3094de297156e536527a0.zip
Demote a warning about missing client ciphers
Diffstat (limited to 'src/common')
-rw-r--r--src/common/tortls.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c
index 9adbfa41f1..218f110d8c 100644
--- a/src/common/tortls.c
+++ b/src/common/tortls.c
@@ -746,11 +746,11 @@ tor_tls_client_is_using_v2_ciphers(const SSL *ssl, const char *address)
/* If we reached this point, we just got a client hello. See if there is
* a cipher list. */
if (!(session = SSL_get_session((SSL *)ssl))) {
- log_warn(LD_NET, "No session on TLS?");
+ log_info(LD_NET, "No session on TLS?");
return 0;
}
if (!session->ciphers) {
- log_warn(LD_NET, "No ciphers on session");
+ log_info(LD_NET, "No ciphers on session");
return 0;
}
/* Now we need to see if there are any ciphers whose presence means we're