Nmap Development mailing list archives
Re: [NSE] Diagnostic leftover in ssl-enum-ciphers
From: Daniel Miller <bonsaiviking () gmail com>
Date: Mon, 31 Mar 2014 09:31:09 -0500
On 03/28/2014 01:11 PM, nnposter () users sourceforge net wrote:
The current version of ssl-enum-ciphers.nse seems to contain a hex dump
leftover from some prior testing.
Cheers,
nnposter
Patch against revision 32785 follows:
--- scripts/ssl-enum-ciphers.nse.orig 2014-03-28 12:00:35.312834700 -0600
+++ scripts/ssl-enum-ciphers.nse 2014-03-28 12:02:48.003834700 -0600
@@ -166,8 +166,6 @@
status, buffer, err = tls.record_buffer(sock, buffer, 1)
if not status then
stdnse.print_debug(1, "Couldn't read a TLS record: %s", err)
- local nsedebug = require "nsedebug"
- nsedebug.print_hex(req)
return nil
end
-- Parse response.
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/
Thanks, that was mine. Removed in r32786. Dan _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] Diagnostic leftover in ssl-enum-ciphers nnposter (Mar 28)
- Re: [NSE] Diagnostic leftover in ssl-enum-ciphers Daniel Miller (Mar 31)
