no need for empty fragments with TLS 1.1 and later due to explicit IV
[openssl.git] / ssl / ssl_txt.c
index 26dee73bfaaa0ead803786290d2f0a2857f2446b..cab712b9a8a52ef2727dd5e5c6f2278907982217 100644 (file)
@@ -115,8 +115,14 @@ int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x)
                s="SSLv2";
        else if (x->ssl_version == SSL3_VERSION)
                s="SSLv3";
+       else if (x->ssl_version == TLS1_1_VERSION)
+               s="TLSv1.1";
        else if (x->ssl_version == TLS1_VERSION)
                s="TLSv1";
+       else if (x->ssl_version == DTLS1_VERSION)
+               s="DTLSv1";
+       else if (x->ssl_version == DTLS1_BAD_VER)
+               s="DTLSv1-bad";
        else
                s="unknown";
        if (BIO_printf(bp,"    Protocol  : %s\n",s) <= 0) goto err;
@@ -207,11 +213,11 @@ int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x)
                ssl_cipher_get_evp(x,NULL,NULL,NULL,NULL,&comp);
                if (comp == NULL)
                        {
-                       if (BIO_printf(bp,"\n   Compression: %d",x->compress_meth) <= 0) goto err;
+                       if (BIO_printf(bp,"\n    Compression: %d",x->compress_meth) <= 0) goto err;
                        }
                else
                        {
-                       if (BIO_printf(bp,"\n   Compression: %d (%s)", comp->id,comp->method->name) <= 0) goto err;
+                       if (BIO_printf(bp,"\n    Compression: %d (%s)", comp->id,comp->method->name) <= 0) goto err;
                        }
                }       
 #endif