From: Dave B. <bla...@us...> - 2013-05-21 15:06:52
|
Update of /cvsroot/sblim/jsr48-client In directory sfp-cvs-1.v30.ch3.sourceforge.com:/tmp/cvs-serv1792 Modified Files: Tag: Experimental sblim-cim-client2.properties Log Message: 2642 Seperate properties needed for cim client and listener to filter out ciphers Index: sblim-cim-client2.properties =================================================================== RCS file: /cvsroot/sblim/jsr48-client/sblim-cim-client2.properties,v retrieving revision 1.1.2.40 retrieving revision 1.1.2.41 diff -u -d -r1.1.2.40 -r1.1.2.41 --- sblim-cim-client2.properties 16 May 2013 18:55:52 -0000 1.1.2.40 +++ sblim-cim-client2.properties 21 May 2013 15:06:49 -0000 1.1.2.41 @@ -517,15 +517,27 @@ # #sblim.wbem.sslServerSocketProvider= -# The comma-separated list of cipher suites that are to be disabled when -# connecting via an SSL socket. In general, this is the list of cipher -# suites considered "too weak" for use in a particular environment. +# The comma-separated list of cipher suites that are to be disabled by +# the client when connecting via an SSL socket. In general, this is the +# list of cipher suites considered "too weak" for use in a particular +# environment. # # Type: String -# Recognition: On initialization of a new client/listener +# Recognition: On initialization of a new client # Default: none # -#sblim.wbem.sslCipherSuitesToDisable= +#sblim.wbem.sslClientCipherSuitesToDisable= + +# The comma-separated list of cipher suites that are to be disabled by +# the listener when connecting via an SSL socket. In general, this is +# the list of cipher suites considered "too weak" for use in a particular +# environment. +# +# Type: String +# Recognition: On next call to addListener() +# Default: none +# +#sblim.wbem.sslListenerCipherSuitesToDisable= # The protocol used for SSLContext.getInstance(String protocol). For IBMJSSE2 provider it can # be "SSL_TLS". |