Nmap Development mailing list archives
Re: [NSE] Diagnostic leftover in ssl-enum-ciphers
From: Daniel Miller <bonsaiviking () gmail com>
Date: Mon, 31 Mar 2014 09:31:09 -0500
On 03/28/2014 01:11 PM, nnposter () users sourceforge net wrote:
The current version of ssl-enum-ciphers.nse seems to contain a hex dump leftover from some prior testing. Cheers, nnposter Patch against revision 32785 follows: --- scripts/ssl-enum-ciphers.nse.orig 2014-03-28 12:00:35.312834700 -0600 +++ scripts/ssl-enum-ciphers.nse 2014-03-28 12:02:48.003834700 -0600 @@ -166,8 +166,6 @@ status, buffer, err = tls.record_buffer(sock, buffer, 1) if not status then stdnse.print_debug(1, "Couldn't read a TLS record: %s", err) - local nsedebug = require "nsedebug" - nsedebug.print_hex(req) return nil end -- Parse response. _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Thanks, that was mine. Removed in r32786. Dan _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] Diagnostic leftover in ssl-enum-ciphers nnposter (Mar 28)
- Re: [NSE] Diagnostic leftover in ssl-enum-ciphers Daniel Miller (Mar 31)