tls

package
v0.0.3 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 14, 2026 License: MIT Imports: 18 Imported by: 0

Documentation

Overview

Package tls runs the modern TLS probe — protocol enumeration, cipher enumeration per legacy protocol, certificate-chain extraction with system-root validation, OCSP-stapling presence and presence-based weakness heuristics. SSLv2 and SSLv3 are handled by dedicated raw-probe packages (internal/sslv2, internal/sslv3).

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func DeriveWeaknesses

func DeriveWeaknesses(protocols []scan.ProtocolSupport, ciphers []scan.Cipher, serverHeader string) []scan.VulnerabilityFinding

DeriveWeaknesses turns the observed TLS protocols + ciphers and the HTTP Server header into a list of presence-based vulnerability findings. Active-probing-only weaknesses are emitted as info-level placeholders so the report stays exhaustive.

The function is called by the scan orchestrator after both the TLS and headers probes complete, because Heartbleed and Ticketbleed need the HTTP Server header to fingerprint the running software.

func Probe

func Probe(ctx context.Context, target *safehttp.Target) *scan.TLSReport

Probe runs the full modern-TLS probe against target and returns a partially-populated TLSReport. The Grade and Scores fields are left zero — they are filled in by the scoring engine in Phase 6.

Types

This section is empty.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL