Nmap Development mailing list archives
[NSE] Diagnostic leftover in ssl-enum-ciphers
From: nnposter () users sourceforge net
Date: Fri, 28 Mar 2014 18:11:25 +0000
The current version of ssl-enum-ciphers.nse seems to contain a hex dump
leftover from some prior testing.
Cheers,
nnposter
Patch against revision 32785 follows:
--- scripts/ssl-enum-ciphers.nse.orig 2014-03-28 12:00:35.312834700 -0600
+++ scripts/ssl-enum-ciphers.nse 2014-03-28 12:02:48.003834700 -0600
@@ -166,8 +166,6 @@
status, buffer, err = tls.record_buffer(sock, buffer, 1)
if not status then
stdnse.print_debug(1, "Couldn't read a TLS record: %s", err)
- local nsedebug = require "nsedebug"
- nsedebug.print_hex(req)
return nil
end
-- Parse response.
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] Diagnostic leftover in ssl-enum-ciphers nnposter (Mar 28)
- Re: [NSE] Diagnostic leftover in ssl-enum-ciphers Daniel Miller (Mar 31)
