Comparison

core/s2smanager.lua @ 1894:53f34ba6f6d6

Minor changes; outgoing TLS works.
author Paul Aurich <paul@darkrain42.org>
date Sat, 03 Oct 2009 19:20:20 -0700
parent 1891:fd725a28141d
child 1895:b7c838a1b0ca
comparison
equal deleted inserted replaced
1893:2d202336c9b6 1894:53f34ba6f6d6
335 335
336 function streamopened(session, attr) 336 function streamopened(session, attr)
337 local send = session.sends2s; 337 local send = session.sends2s;
338 338
339 -- TODO: #29: SASL/TLS on s2s streams 339 -- TODO: #29: SASL/TLS on s2s streams
340 session.version = 0; --tonumber(attr.version) or 0; 340 session.version = tonumber(attr.version) or 0;
341 341
342 if session.version >= 1.0 and not (attr.to and attr.from) then 342 if session.version >= 1.0 and not (attr.to and attr.from) then
343 log("warn", (session.to_host or "(unknown)").." failed to specify 'to' or 'from' hostname as per RFC"); 343 log("warn", (session.to_host or "(unknown)").." failed to specify 'to' or 'from' hostname as per RFC");
344 end 344 end
345 345
385 session.send_buffer = nil; 385 session.send_buffer = nil;
386 386
387 -- If server is pre-1.0, don't wait for features, just do dialback 387 -- If server is pre-1.0, don't wait for features, just do dialback
388 if session.version < 1.0 then 388 if session.version < 1.0 then
389 if not session.dialback_verifying then 389 if not session.dialback_verifying then
390 log("debug", "Initiating dialback...");
390 initiate_dialback(session); 391 initiate_dialback(session);
391 else 392 else
392 mark_connected(session); 393 mark_connected(session);
393 end 394 end
394 end 395 end