diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-02-06 21:53:13 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-02-06 21:53:13 +0000 |
commit | 46b1a21dc49c83e57e7d8e6a90968fc908e739f8 (patch) | |
tree | 16207dc36f00b6394187cfd2cdd1129f6fa41518 /src/or/command.c | |
parent | 46532d8111b9842aee8f0b600a1d1abd0ae53a9f (diff) | |
download | tor-46b1a21dc49c83e57e7d8e6a90968fc908e739f8.tar.gz tor-46b1a21dc49c83e57e7d8e6a90968fc908e739f8.zip |
r17955@catbus: nickm | 2008-02-06 16:53:07 -0500
The SSL portion of the revised handshake now seems to work: I just finally got a client and a server to negotiate versions. Now to make sure certificate verification is really happening, connections are getting opened, etc.
svn:r13409
Diffstat (limited to 'src/or/command.c')
-rw-r--r-- | src/or/command.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/src/or/command.c b/src/or/command.c index 6dae387a6f..5765431d77 100644 --- a/src/or/command.c +++ b/src/or/command.c @@ -476,6 +476,8 @@ command_process_versions_cell(var_cell_t *cell, or_connection_t *conn) conn->link_proto = highest_supported_version; conn->handshake_state->received_versions = 1; + // log_notice(LD_OR, "Negotiated version %d", highest_supported_version); + if (highest_supported_version >= 2) { if (connection_or_send_netinfo(conn) < 0) { connection_mark_for_close(TO_CONN(conn)); |