]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
log when we finish ssl handshake and move to renegotiation
authorRoger Dingledine <arma@torproject.org>
Fri, 17 Jun 2011 07:31:59 +0000 (03:31 -0400)
committerRoger Dingledine <arma@torproject.org>
Fri, 17 Jun 2011 07:31:59 +0000 (03:31 -0400)
debug-level since it will be quite common. logged at both client
and server side. this step should help us track what's going on
with people filtering tor connections by our ssl habits.

src/or/connection_or.c

index ed174c922e4ecc2406be35549e0f11f4dff92da8..c019f6592b9dcfe31730dfc8993ee7ebaca1f0dc 100644 (file)
@@ -929,13 +929,16 @@ connection_tls_continue_handshake(or_connection_t *conn)
       if (! tor_tls_used_v1_handshake(conn->tls)) {
         if (!tor_tls_is_server(conn->tls)) {
           if (conn->_base.state == OR_CONN_STATE_TLS_HANDSHAKING) {
-            // log_notice(LD_OR,"Done. state was TLS_HANDSHAKING.");
+            log_debug(LD_OR, "Done with initial SSL handshake (client-side). "
+                             "Requesting renegotiation.");
             conn->_base.state = OR_CONN_STATE_TLS_CLIENT_RENEGOTIATING;
             goto again;
           }
           // log_notice(LD_OR,"Done. state was %d.", conn->_base.state);
         } else {
           /* improved handshake, but not a client. */
+          log_debug(LD_OR, "Done with initial SSL handshake (server-side). "
+                           "Expecting renegotiation.");
           tor_tls_set_renegotiate_callback(conn->tls,
                                            connection_or_tls_renegotiated_cb,
                                            conn);