aboutsummaryrefslogtreecommitdiff
path: root/apps
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2006-06-15 19:00:34 +0000
committerBodo Möller <bodo@openssl.org>2006-06-15 19:00:34 +0000
commitb166f13eb575e891575fe386b1ec57f01c6c9a6b (patch)
tree3a48b2735bf7540886a52f3a3f818080609ffcab /apps
parent076944d9204222458eac5d90b9743a296ff9d0c5 (diff)
downloadopenssl-b166f13eb575e891575fe386b1ec57f01c6c9a6b.zip
openssl-b166f13eb575e891575fe386b1ec57f01c6c9a6b.tar.gz
openssl-b166f13eb575e891575fe386b1ec57f01c6c9a6b.tar.bz2
Call 'print_stuff' even if a handshake failed.
Diffstat (limited to 'apps')
-rw-r--r--apps/s_client.c10
1 files changed, 6 insertions, 4 deletions
diff --git a/apps/s_client.c b/apps/s_client.c
index 8eeb726..d105a74 100644
--- a/apps/s_client.c
+++ b/apps/s_client.c
@@ -925,10 +925,10 @@ re_start:
{
in_init=0;
#ifndef OPENSSL_NO_TLSEXT
- if (servername != NULL && !SSL_session_reused(con))
- {
- BIO_printf(bio_c_out,"Server did %sacknowledge servername extension.\n",tlsextcbp.ack?"":"not ");
- }
+ if (servername != NULL && !SSL_session_reused(con))
+ {
+ BIO_printf(bio_c_out,"Server did %sacknowledge servername extension.\n",tlsextcbp.ack?"":"not ");
+ }
#endif
print_stuff(bio_c_out,con,full_log);
if (full_log > 0) full_log--;
@@ -1261,6 +1261,8 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
}
}
shut:
+ if (in_init)
+ print_stuff(bio_c_out,con,full_log);
SSL_shutdown(con);
SHUTDOWN(SSL_get_fd(con));
ret=0;