Nmap Development mailing list archives

Re: [NSE] Diagnostic leftover in ssl-enum-ciphers


From: Daniel Miller <bonsaiviking () gmail com>
Date: Mon, 31 Mar 2014 09:31:09 -0500

On 03/28/2014 01:11 PM, nnposter () users sourceforge net wrote:
The current version of ssl-enum-ciphers.nse seems to contain a hex dump
leftover from some prior testing.


Cheers,
nnposter



Patch against revision 32785 follows:

--- scripts/ssl-enum-ciphers.nse.orig   2014-03-28 12:00:35.312834700 -0600
+++ scripts/ssl-enum-ciphers.nse        2014-03-28 12:02:48.003834700 -0600
@@ -166,8 +166,6 @@
      status, buffer, err = tls.record_buffer(sock, buffer, 1)
      if not status then
        stdnse.print_debug(1, "Couldn't read a TLS record: %s", err)
-      local nsedebug = require "nsedebug"
-      nsedebug.print_hex(req)
        return nil
      end
      -- Parse response.
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Thanks, that was mine. Removed in r32786.

Dan
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: