diff options
author | nelsonb%netscape.com <devnull@localhost> | 2000-11-17 21:57:02 +0000 |
---|---|---|
committer | nelsonb%netscape.com <devnull@localhost> | 2000-11-17 21:57:02 +0000 |
commit | 0ac026c6b791208e6be02310786ca9d198fcc16d (patch) | |
tree | 791b51edfeb8d719f946cdcd809a7cd7081fe04c | |
parent | 8f9d6ce8486a89885cfe59f729d20c3878158ae2 (diff) | |
download | nss-hg-0ac026c6b791208e6be02310786ca9d198fcc16d.tar.gz |
When disabling SSL2, also disable ssl2 compatible client hellos.
This allows us to test with TLS servers that don't grok ssl2 hellos.
-rw-r--r-- | security/nss/cmd/tstclnt/tstclnt.c | 4 |
1 files changed, 1 insertions, 3 deletions
diff --git a/security/nss/cmd/tstclnt/tstclnt.c b/security/nss/cmd/tstclnt/tstclnt.c index 69e6a5614..cf217dc40 100644 --- a/security/nss/cmd/tstclnt/tstclnt.c +++ b/security/nss/cmd/tstclnt/tstclnt.c @@ -506,14 +506,12 @@ int main(int argc, char **argv) return -1; } -#if 0 /* disable ssl2 and ssl2-compatible client hellos. */ - rv = SSL_Enable(s, SSL_V2_COMPATIBLE_HELLO, 0); + rv = SSL_Enable(s, SSL_V2_COMPATIBLE_HELLO, !disableSSL2); if (rv != SECSuccess) { SECU_PrintError(progName, "error disabling v2 compatibility"); return -1; } -#endif if (useCommandLinePassword) { SSL_SetPKCS11PinArg(s, password); |