aboutsummaryrefslogtreecommitdiff
path: root/src/or
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-05-26 16:32:16 +0000
committerRoger Dingledine <arma@torproject.org>2006-05-26 16:32:16 +0000
commit7f611f473268ed884dbc5bf0e91dfff84985d370 (patch)
tree05231073c99379a3bbade7b9fd429213075a6bb7 /src/or
parent82ae38f649a15e3df02cdf6d35ab8b316a317aad (diff)
downloadtor-7f611f473268ed884dbc5bf0e91dfff84985d370.tar
tor-7f611f473268ed884dbc5bf0e91dfff84985d370.tar.gz
if we're a server and some peer has a broken tls certificate, don't
shout about it unless we want to hear about protocol violations. svn:r6507
Diffstat (limited to 'src/or')
-rw-r--r--src/or/connection_or.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/src/or/connection_or.c b/src/or/connection_or.c
index 7fd717717..946cefbb2 100644
--- a/src/or/connection_or.c
+++ b/src/or/connection_or.c
@@ -581,11 +581,13 @@ connection_or_check_valid_handshake(connection_t *conn, char *digest_rcvd)
check_no_tls_errors();
if (! tor_tls_peer_has_cert(conn->tls)) {
- log_info(LD_PROTOCOL,"Peer didn't send a cert! Closing.");
+ log_info(LD_PROTOCOL,"Peer (%s:%d) didn't send a cert! Closing.",
+ conn->address, conn->port);
return -1;
}
check_no_tls_errors();
- if (tor_tls_get_peer_cert_nickname(conn->tls, nickname, sizeof(nickname))) {
+ if (tor_tls_get_peer_cert_nickname(severity, conn->tls, nickname,
+ sizeof(nickname))) {
log_fn(severity,LD_PROTOCOL,"Other side (%s:%d) has a cert without a "
"valid nickname. Closing.",
conn->address, conn->port);