summaryrefslogtreecommitdiff
path: root/src/or/command.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2008-02-06 21:53:13 +0000
committerNick Mathewson <nickm@torproject.org>2008-02-06 21:53:13 +0000
commit46b1a21dc49c83e57e7d8e6a90968fc908e739f8 (patch)
tree16207dc36f00b6394187cfd2cdd1129f6fa41518 /src/or/command.c
parent46532d8111b9842aee8f0b600a1d1abd0ae53a9f (diff)
downloadtor-46b1a21dc49c83e57e7d8e6a90968fc908e739f8.tar.gz
tor-46b1a21dc49c83e57e7d8e6a90968fc908e739f8.zip
r17955@catbus: nickm | 2008-02-06 16:53:07 -0500
The SSL portion of the revised handshake now seems to work: I just finally got a client and a server to negotiate versions. Now to make sure certificate verification is really happening, connections are getting opened, etc. svn:r13409
Diffstat (limited to 'src/or/command.c')
-rw-r--r--src/or/command.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/src/or/command.c b/src/or/command.c
index 6dae387a6f..5765431d77 100644
--- a/src/or/command.c
+++ b/src/or/command.c
@@ -476,6 +476,8 @@ command_process_versions_cell(var_cell_t *cell, or_connection_t *conn)
conn->link_proto = highest_supported_version;
conn->handshake_state->received_versions = 1;
+ // log_notice(LD_OR, "Negotiated version %d", highest_supported_version);
+
if (highest_supported_version >= 2) {
if (connection_or_send_netinfo(conn) < 0) {
connection_mark_for_close(TO_CONN(conn));