Documentation
¶
Overview ¶
Package tls runs the modern TLS probe — protocol enumeration, cipher enumeration per legacy protocol, certificate-chain extraction with system-root validation, OCSP-stapling presence and presence-based weakness heuristics. SSLv2 and SSLv3 are handled by dedicated raw-probe packages (internal/sslv2, internal/sslv3).
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func DeriveWeaknesses ¶
func DeriveWeaknesses(protocols []scan.ProtocolSupport, ciphers []scan.Cipher, serverHeader string) []scan.VulnerabilityFinding
DeriveWeaknesses turns the observed TLS protocols + ciphers and the HTTP Server header into a list of presence-based vulnerability findings. Active-probing-only weaknesses are emitted as info-level placeholders so the report stays exhaustive.
The function is called by the scan orchestrator after both the TLS and headers probes complete, because Heartbleed and Ticketbleed need the HTTP Server header to fingerprint the running software.
Types ¶
This section is empty.