Codebase list sslscan / upstream/2.0.5
New upstream version 2.0.5 Sophie Brun 3 years ago
3 changed file(s) with 12 addition(s) and 7 deletion(s). Raw diff Collapse all Expand all
00 Changelog
11 =========
2 Version: 2.0.5
3 Date : 24/10/2020
4 Author : rbsec <[email protected]>
5 Changes: The following are a list of changes
6 > Fix --targets not working properly
7
28 Version: 2.0.4
39 Date : 13/10/2020
410 Author : rbsec <[email protected]>
328328
329329 # Runs nginx with client certificate checking (signed by the CA in docker_test/ca_cert.pem). sslscan will connect and make an HTTP request (--http). The HTTP response code should be 200 to signify that the certificate was accepted. Otherwise, nginx returns HTTP code 400 if no client certificates were presented.
330330 function run_test_9 {
331 run_test $1 '9' "/usr/sbin/nginx -c /etc/nginx/nginx_test9.conf" "--no-fallback --no-renegotiation --no-compression --no-heartbleed --certs=docker_test/cert_3072.crt --pk=docker_test/key_3072.pem --http"
331 #run_test $1 '9' "/usr/sbin/nginx -c /etc/nginx/nginx_test9.conf" "--no-fallback --no-renegotiation --no-compression --no-heartbleed --certs=docker_test/cert_3072.crt --pk=docker_test/key_3072.pem --http"
332 echo "Test #9 skipped."
332333 }
333334
334335
335336 # Runs nginx with client certificate checking, just as above. Except this time, we connect with no certificate. The HTTP response code should be "400 Bad Request".
336337 function run_test_10 {
337 run_test $1 '10' "/usr/sbin/nginx -c /etc/nginx/nginx_test9.conf" "--no-fallback --no-renegotiation --no-compression --no-heartbleed --http"
338 #run_test $1 '10' "/usr/sbin/nginx -c /etc/nginx/nginx_test9.conf" "--no-fallback --no-renegotiation --no-compression --no-heartbleed --http"
339 echo "Test #10 skipped."
338340 }
339341
340342
16701670 int socketDescriptor = 0;
16711671 SSL *ssl = NULL;
16721672 BIO *cipherConnectionBio = NULL;
1673 char requestBuffer[1024];
1674 char buffer[64];
16751673 int cipherbits = -1;
16761674 uint32_t cipherid = 0;
16771675 const SSL_CIPHER *sslCipherPointer = NULL;
16801678 struct timeval tval_start = {0};
16811679 unsigned int milliseconds_elapsed = 0;
16821680
1683
1684 memset(requestBuffer, 0, sizeof(requestBuffer));
1685 memset(buffer, 0, sizeof(buffer));
16861681
16871682 if (options->showTimes)
16881683 {
41284123 // Open targets file...
41294124 targetsFile = fopen(argv[options->targets] + 10, "r");
41304125 if (targetsFile == NULL)
4126 {
41314127 printf_error("Could not open targets file %s.", argv[options->targets] + 10);
4128 }
41324129 else
41334130 {
41344131 readLine(targetsFile, line, sizeof(line));