summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authornelsonb%netscape.com <devnull@localhost>2000-11-17 21:57:02 +0000
committernelsonb%netscape.com <devnull@localhost>2000-11-17 21:57:02 +0000
commit0ac026c6b791208e6be02310786ca9d198fcc16d (patch)
tree791b51edfeb8d719f946cdcd809a7cd7081fe04c
parent8f9d6ce8486a89885cfe59f729d20c3878158ae2 (diff)
downloadnss-hg-0ac026c6b791208e6be02310786ca9d198fcc16d.tar.gz
When disabling SSL2, also disable ssl2 compatible client hellos.
This allows us to test with TLS servers that don't grok ssl2 hellos.
-rw-r--r--security/nss/cmd/tstclnt/tstclnt.c4
1 files changed, 1 insertions, 3 deletions
diff --git a/security/nss/cmd/tstclnt/tstclnt.c b/security/nss/cmd/tstclnt/tstclnt.c
index 69e6a5614..cf217dc40 100644
--- a/security/nss/cmd/tstclnt/tstclnt.c
+++ b/security/nss/cmd/tstclnt/tstclnt.c
@@ -506,14 +506,12 @@ int main(int argc, char **argv)
return -1;
}
-#if 0
/* disable ssl2 and ssl2-compatible client hellos. */
- rv = SSL_Enable(s, SSL_V2_COMPATIBLE_HELLO, 0);
+ rv = SSL_Enable(s, SSL_V2_COMPATIBLE_HELLO, !disableSSL2);
if (rv != SECSuccess) {
SECU_PrintError(progName, "error disabling v2 compatibility");
return -1;
}
-#endif
if (useCommandLinePassword) {
SSL_SetPKCS11PinArg(s, password);