tor_tls_init();
nickname = crypto_random_hostname(8, 20, "www.", ".net");
+#ifdef DISABLE_V3_LINKPROTO_SERVERSIDE
+ nn2 = crypto_random_hostname(8, 20, "www.", ".net");
+#else
nn2 = crypto_random_hostname(8, 20, "www.", ".com");
+#endif
/* Generate short-term RSA key for use with TLS. */
if (!(rsa = crypto_new_pk_env()))
static int
dn_indicates_v3_cert(X509_NAME *name)
{
+#ifdef DISABLE_V3_LINKPROTO_CLIENTSIDE
+ (void)name;
+ return 0;
+#else
X509_NAME_ENTRY *entry;
int n_entries;
ASN1_OBJECT *obj;
r = fast_memneq(s + len - 4, ".net", 4);
OPENSSL_free(s);
return r;
+#endif
}
/** Return true iff the peer certificate we're received on <b>tls</b>
send_chall ? " AUTH_CHALLENGE" : "",
send_netinfo ? " NETINFO" : "");
+#ifdef DISABLE_V3_LINKPROTO_SERVERSIDE
+ if (1) {
+ connection_mark_for_close(TO_CONN(conn));
+ return;
+ }
+#endif
+
if (send_versions) {
if (connection_or_send_versions(conn, 1) < 0) {
log_warn(LD_OR, "Couldn't send versions cell");