@@ -245,7 +245,7 @@ CIPHERS_BY_STRENGTH_FILE=""
245245TLS_DATA_FILE="" # mandatory file for socket-based handshakes
246246OPENSSL="" # ~/bin/openssl.$(uname).$(uname -m) if you run this from GitHub. Linux otherwise probably /usr/bin/openssl
247247OPENSSL2=${OPENSSL2:-/usr/bin/openssl} # This will be openssl version >=1.1.1 (auto determined) as opposed to openssl-bad (OPENSSL)
248- OPENSSL2_HAS_TLS_1_3=false # If we run with supplied binary AND $OPENSSL2 supports TLS 1.3 this wil be set to true
248+ OPENSSL2_HAS_TLS_1_3=false # If we run with supplied binary AND $OPENSSL2 supports TLS 1.3 this will be set to true
249249OSSL_SHORTCUT=${OSSL_SHORTCUT:-true} # Hack: if during the scan turns out the OpenSSL binary supports TLS 1.3 would be a better choice
250250OPENSSL_LOCATION=""
251251IKNOW_FNAME=false
@@ -21015,8 +21015,8 @@ EOF
2101521015
2101621016# arg1: text to display before "-->"
2101721017# arg2: arg needed to accept to continue
21018- # ret=0 : arg was acceppted to continue (batch mode doesn't do this,or warnings are turned off)
21019- # 1 : arg was not acceppted by user or we're in bacth mode
21018+ # ret=0 : arg was accepted to continue (batch mode doesn't do this,or warnings are turned off)
21019+ # 1 : arg was not accepted by user or we're in bacth mode
2102021020
2102121021ignore_no_or_lame() {
2102221022 local a
@@ -22039,8 +22039,8 @@ determine_optimal_proto() {
2203922039 if "$OPENSSL2_HAS_TLS_1_3"; then
2204022040 if "$OSSL_SHORTCUT" || [[ "$WARNINGS" == batch ]]; then
2204122041 # switch w/o asking
22042- OPEN_MSG=" $NODE:$PORT appeared to support TLS 1.3 ONLY. Thus switched implictly from\n \"$OPENSSL\" to \"$OPENSSL2\"."
22043- fileout "$jsonID" "INFO" "$NODE:$PORT appears to support TLS 1.3 ONLY, switching from $OPENSSL to $OPENSSL2 was implictly enforced"
22042+ OPEN_MSG=" $NODE:$PORT appeared to support TLS 1.3 ONLY. Thus switched implicitly from\n \"$OPENSSL\" to \"$OPENSSL2\"."
22043+ fileout "$jsonID" "INFO" "$NODE:$PORT appears to support TLS 1.3 ONLY, switching from $OPENSSL to $OPENSSL2 was implicitly enforced"
2204422044 OPENSSL="$OPENSSL2"
2204522045 find_openssl_binary
2204622046 prepare_arrays
@@ -22102,7 +22102,7 @@ determine_optimal_proto() {
2210222102
2210322103# Check messages which needed to be processed. I.e. those which would have destroyed the nice
2210422104# screen output and thus havve been postponed. This is just an idea and is only used once
22105- # but can be extended in the future. An array migh be more handy
22105+ # but can be extended in the future. An array might be more handy
2210622106#
2210722107check_msg() {
2210822108 if [[ -n "$OPEN_MSG" ]]; then
0 commit comments