dmiller
298be5bfaa
Re-indent some scripts. Whitespace-only commit
...
https://secwiki.org/w/Nmap/Code_Standards
2014-01-31 17:36:09 +00:00
dmiller
4eaa21e7cb
Integrate David's ssl-enum-ciphers improvements
...
From this thread: http://seclists.org/nmap-dev/2014/q1/105
* Extensions now better supported in tls.lua
* ssl-enum-ciphers sends all EC options to ensure servers reply with
supported EC suites
* tls.lua supports multiple messages of a single type within 1 record
* tls.record_buffer will read an entire TLS record into a buffer
* ssl-date and tls-nextprotoneg updated to use tls.record_buffer
2014-01-30 18:12:14 +00:00
dmiller
620f9fdb34
Remove trailing whitespace in lua files
...
Whitespace is not significant, so this should not be a problem.
https://secwiki.org/w/Nmap/Code_Standards
2014-01-23 21:51:58 +00:00
dmiller
645ef2a0bd
Update ssl-date to use tls lib
2014-01-16 18:10:04 +00:00
dmiller
760da1788f
Let tls-nextprotoneg use tls.lua library
...
Required fixes to tls lib's extensions (did not previously support
extension data)
2014-01-16 18:10:02 +00:00
dmiller
1b07c5ce54
Add xmloutput to tls-nextprotoneg.nse
2013-10-18 18:34:54 +00:00
patrik
217b27bace
nse_check_globals cleanup
2012-07-24 10:08:43 +00:00
kroosec
e1793d5961
tls-nextprotoneg: Replaced hard fixed protocols search for a dynamic extraction one.
2012-07-13 10:29:35 +00:00
kroosec
bc2b9a99b5
Added http1.1 to the list of known protocols. (Checked by Chromium)
2012-07-08 19:00:34 +00:00
kroosec
b7cc883a0f
Added tls-nextprotoneg, a script that enumerates a TLS server's supported protocols by using the next protocol negotiation extension.
2012-07-07 14:38:56 +00:00