Skip to content

Commit 2cb96d4

Browse files
authored
Merge pull request #1798 from drwetter/client_always_wide
Client simulation per default as wide
2 parents f6e2a5c + d76829c commit 2cb96d4

File tree

2 files changed

+22
-28
lines changed

2 files changed

+22
-28
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,8 @@
2626
* Added environment variable for amount of attempts for ssl renegotiation check
2727
* Added --user-agent argument to support using a custom User Agent
2828
* Added --overwrite argument to support overwriting output files without warning
29-
* Headerflag X-XSS-Protection is labeled as INFO
29+
* Headerflag X-XSS-Protection is now labeled as INFO
30+
* Client simulation runs in wide mode which is even better readable
3031

3132
### Features implemented / improvements in 3.0
3233

testssl.sh

Lines changed: 20 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -4814,21 +4814,19 @@ run_client_simulation() {
48144814
outln
48154815
debugme echo
48164816

4817-
if "$WIDE"; then
4818-
if [[ "$DISPLAY_CIPHERNAMES" =~ openssl ]]; then
4819-
out " Browser Protocol Cipher Suite Name (OpenSSL) "
4820-
( "$using_sockets" || "$HAS_DH_BITS") && out "Forward Secrecy"
4821-
outln
4822-
out "--------------------------------------------------------------------------"
4823-
else
4824-
out " Browser Protocol Cipher Suite Name (IANA/RFC) "
4825-
( "$using_sockets" || "$HAS_DH_BITS") && out "Forward Secrecy"
4826-
outln
4827-
out "------------------------------------------------------------------------------------------"
4828-
fi
4829-
( "$using_sockets" || "$HAS_DH_BITS") && out "----------------------"
4817+
if [[ "$DISPLAY_CIPHERNAMES" =~ openssl ]]; then
4818+
out " Browser Protocol Cipher Suite Name (OpenSSL) "
4819+
( "$using_sockets" || "$HAS_DH_BITS") && out "Forward Secrecy"
48304820
outln
4821+
out "--------------------------------------------------------------------------"
4822+
else
4823+
out " Browser Protocol Cipher Suite Name (IANA/RFC) "
4824+
( "$using_sockets" || "$HAS_DH_BITS") && out "Forward Secrecy"
4825+
outln
4826+
out "------------------------------------------------------------------------------------------"
48314827
fi
4828+
( "$using_sockets" || "$HAS_DH_BITS") && out "----------------------"
4829+
outln
48324830
if ! "$using_sockets"; then
48334831
# We can't use the connectivity checker here as of now the openssl reply is always empty (reason??)
48344832
save_max_ossl_fail=$MAX_OSSL_FAIL
@@ -4938,35 +4936,30 @@ run_client_simulation() {
49384936
cipher="$(openssl2rfc "$cipher")"
49394937
[[ -z "$cipher" ]] && cipher=$(get_cipher $TMPFILE)
49404938
fi
4941-
out "$proto "
4942-
"$WIDE" && out " "
4939+
out "$proto "
49434940
if [[ "$COLOR" -le 2 ]]; then
49444941
out "$cipher"
49454942
else
49464943
pr_cipher_quality "$cipher"
49474944
fi
4948-
if "$WIDE"; then
4949-
if [[ "$DISPLAY_CIPHERNAMES" =~ openssl ]]; then
4950-
for (( j=${#cipher}; j < 34; j++ )); do
4951-
out " "
4952-
done
4953-
else
4954-
for (( j=${#cipher}; j < 50; j++ )); do
4955-
out " "
4956-
done
4957-
fi
4945+
if [[ "$DISPLAY_CIPHERNAMES" =~ openssl ]]; then
4946+
for (( j=${#cipher}; j < 34; j++ )); do
4947+
out " "
4948+
done
4949+
else
4950+
for (( j=${#cipher}; j < 50; j++ )); do
4951+
out " "
4952+
done
49584953
fi
49594954
if [[ -n "$what_dh" ]]; then
49604955
[[ -n "$curve" ]] && curve="($curve)"
4961-
"$WIDE" || out ", "
49624956
if [[ "$what_dh" == ECDH ]]; then
49634957
pr_ecdh_quality "$bits" "$(printf -- "%-12s" "$bits bit $what_dh") $curve"
49644958
else
49654959
pr_dh_quality "$bits" "$(printf -- "%-12s" "$bits bit $what_dh") $curve"
49664960
fi
49674961
else
49684962
if "$HAS_DH_BITS" || ( "$using_sockets" && [[ -n "${handshakebytes[i]}" ]] ); then
4969-
"$WIDE" || out ", "
49704963
out "No FS"
49714964
fi
49724965
fi

0 commit comments

Comments
 (0)