mirror of
https://github.com/drwetter/testssl.sh.git
synced 2024-12-29 04:49:44 +01:00
6088eddab6
This commit modifies run_fs() to show the signature algorithms the server supports in the ServerKeyExchange message for TLS 1.2 and in the CertificateVerify message for TLS 1.3. Signature algorithms are not shown for TLS 1.1 and earlier, since for those protocol versions the signature algorithm to use is specified by the protocol. While the signature algorithm used in TLS 1.1 and earlier is weak, testssl.sh already warns if these protocol versions are supported. |
||
---|---|---|
.. | ||
baseline_data | ||
00_testssl_help.t | ||
01_testssl_banner.t | ||
02_clientsim_txt_parsable.t | ||
05_ca_hashes_up_to_date.t | ||
10_baseline_ipv4_http.t | ||
11_baseline_ipv6_http.t.DISABLED | ||
21_baseline_starttls.t | ||
23_client_simulation.t | ||
31_isJSON_valid.t | ||
32_isHTML_valid.t | ||
33_isJSON_severitylevel_valid.t | ||
51_badssl.com.t | ||
59_hpkp.t.tmpDISABLED | ||
61_diff_testsslsh.t | ||
Readme.md |
Naming scheme
- 00-05: Does the bare testssl.sh work at all?
- 10-29: Do scans work fine (client side)?
- 30-39: Does reporting work?
- 50-69: Are the results what I expect (server side)?
Please help to write Travis/CI tests! Documentation can be found here.
You can consult the existing code here. Feel free to use 10_baseline_ipv4_http.t
or 23_client_simulation.t
as a
template.