From 381fdfa985ea4a891c2de82c4b0fa1a4cf81019f Mon Sep 17 00:00:00 2001
From: Dirk
Date: Sat, 2 May 2020 19:49:01 +0200
Subject: [PATCH] Fix typo in docs: Strong grade Ciphers / AEAD
---
doc/testssl.1 | 2 +-
doc/testssl.1.html | 2 +-
doc/testssl.1.md | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/doc/testssl.1 b/doc/testssl.1
index fb6cb33..05cbe3d 100644
--- a/doc/testssl.1
+++ b/doc/testssl.1
@@ -212,7 +212,7 @@ Any single check switch supplied as an argument prevents testssl\.sh from doing
\fBAverage grade Ciphers\fR: \'HIGH:MEDIUM:AES:CAMELLIA:ARIA:!IDEA:!CHACHA20:!3DES:!RC2:!RC4:!AESCCM8:!AESCCM:!AESGCM:!ARIAGCM:!aNULL\'
.
.IP "\(bu" 4
-\fBStrong grade Ciphers\fR (AEAD): \'AESGCM:CHACHA20:AESGCM:CamelliaGCM:AESCCM8:AESCCM\'
+\fBStrong grade Ciphers\fR (AEAD): \'AESGCM:CHACHA20:CamelliaGCM:AESCCM\'
.
.IP "" 0
.
diff --git a/doc/testssl.1.html b/doc/testssl.1.html
index 37fb4dc..2609c6f 100644
--- a/doc/testssl.1.html
+++ b/doc/testssl.1.html
@@ -240,7 +240,7 @@ ADDTL_CA_FILES is the environment variable for this.
LOW
(64 Bit + DES ciphers, without EXPORT ciphers): 'LOW:DES:RC2:RC4:!ADH:!EXP:!NULL:!eNULL'
3DES + IDEA Ciphers
: '3DES:IDEA:!aNULL:!ADH'
Average grade Ciphers
: 'HIGH:MEDIUM:AES:CAMELLIA:ARIA:!IDEA:!CHACHA20:!3DES:!RC2:!RC4:!AESCCM8:!AESCCM:!AESGCM:!ARIAGCM:!aNULL'
-Strong grade Ciphers
(AEAD): 'AESGCM:CHACHA20:AESGCM:CamelliaGCM:AESCCM8:AESCCM'
+Strong grade Ciphers
(AEAD): 'AESGCM:CHACHA20:CamelliaGCM:AESCCM8:AESCCM'
diff --git a/doc/testssl.1.md b/doc/testssl.1.md
index 63cfa88..536762e 100644
--- a/doc/testssl.1.md
+++ b/doc/testssl.1.md
@@ -165,7 +165,7 @@ Any single check switch supplied as an argument prevents testssl.sh from doing a
* `LOW` (64 Bit + DES ciphers, without EXPORT ciphers): 'LOW:DES:RC2:RC4:!ADH:!EXP:!NULL:!eNULL'
* `3DES + IDEA Ciphers`: '3DES:IDEA:!aNULL:!ADH'
* `Average grade Ciphers`: 'HIGH:MEDIUM:AES:CAMELLIA:ARIA:!IDEA:!CHACHA20:!3DES:!RC2:!RC4:!AESCCM8:!AESCCM:!AESGCM:!ARIAGCM:!aNULL'
-* `Strong grade Ciphers` (AEAD): 'AESGCM:CHACHA20:AESGCM:CamelliaGCM:AESCCM8:AESCCM'
+* `Strong grade Ciphers` (AEAD): 'AESGCM:CHACHA20:CamelliaGCM:AESCCM8:AESCCM'
`-f, --fs, --nsa, --forward-secrecy` Checks robust forward secrecy key exchange. "Robust" means that ciphers having intrinsic severe weaknesses like Null Authentication or Encryption, 3DES and RC4 won't be considered here. There shouldn't be the wrong impression that a secure key exchange has been taking place and everything is fine when in reality the encryption sucks. Also this section lists the available elliptical curves and Diffie Hellman groups, as well as FFDHE groups (TLS 1.2 and TLS 1.3).