@@ -5216,7 +5216,7 @@ run_client_simulation() {
5216
5216
fi
5217
5217
if [[ $sclient_success -eq 0 ]]; then
5218
5218
# If an ephemeral DH key was used, check that the number of bits is within range.
5219
- temp=$(awk -F': ' '/^Server Temp Key/ { print $2 }' "$TMPFILE") # extract line
5219
+ temp=$(awk -F': ' '/^Server Temp Key|^Peer Temp Key / { print $2 }' "$TMPFILE") # extract line
5220
5220
what_dh="${temp%%,*}"
5221
5221
bits="${temp##*, }"
5222
5222
# formatting
@@ -6706,7 +6706,7 @@ pr_cipher_quality() {
6706
6706
read_dhtype_from_file() {
6707
6707
local temp kx
6708
6708
6709
- temp=$(awk -F': ' '/^Server Temp Key/ { print $2 }' "$1") # extract line
6709
+ temp=$(awk -F': ' '/^Server Temp Key|^Peer Temp Key|^Negotiated TLS1.3 group / { print $2 }' "$1") # extract line
6710
6710
kx="Kx=${temp%%,*}"
6711
6711
[[ "$kx" == "Kx=X25519" ]] && kx="Kx=ECDH"
6712
6712
[[ "$kx" == "Kx=X448" ]] && kx="Kx=ECDH"
@@ -6739,7 +6739,7 @@ read_dhbits_from_file() {
6739
6739
local add=""
6740
6740
local old_fart=" (your $OPENSSL cannot show DH bits)"
6741
6741
6742
- temp=$(awk -F': ' '/^Server Temp Key/ { print $2 }' "$1") # extract line
6742
+ temp=$(awk -F': ' '/^Server Temp Key|^Peer Temp Key|^Negotiated TLS1.3 group / { print $2 }' "$1") # extract line
6743
6743
what_dh="${temp%%,*}"
6744
6744
bits="${temp##*, }"
6745
6745
curve="${temp#*, }"
@@ -10910,7 +10910,7 @@ run_fs() {
10910
10910
[[ -z "$curves_to_test" ]] && break
10911
10911
$OPENSSL s_client $(s_client_options "$proto -cipher "\'${ecdhe_cipher_list:1}\'" -ciphersuites "\'${tls13_cipher_list:1}\'" -curves "${curves_to_test:1}" $STARTTLS $BUGS -connect $NODEIP:$PORT $PROXY $SNI") &>$TMPFILE </dev/null
10912
10912
sclient_connect_successful $? $TMPFILE || break
10913
- temp=$(awk -F': ' '/^Server Temp Key/ { print $2 }' "$TMPFILE")
10913
+ temp=$(awk -F': ' '/^Server Temp Key|^Peer Temp Key|^Negotiated TLS1.3 group / { print $2 }' "$TMPFILE")
10914
10914
curve_found="${temp%%,*}"
10915
10915
if [[ "$curve_found" == ECDH ]]; then
10916
10916
curve_found="${temp#*, }"
@@ -10943,7 +10943,7 @@ run_fs() {
10943
10943
done
10944
10944
$OPENSSL s_client $(s_client_options "$proto -cipher "\'${ecdhe_cipher_list:1}\'" -ciphersuites "\'${tls13_cipher_list:1}\'" -curves "${curves_to_test:1}" $STARTTLS $BUGS -connect $NODEIP:$PORT $PROXY $SNI") &>$TMPFILE </dev/null
10945
10945
sclient_connect_successful $? $TMPFILE || break
10946
- temp=$(awk -F': ' '/^Server Temp Key/ { print $2 }' "$TMPFILE")
10946
+ temp=$(awk -F': ' '/^Server Temp Key|^Peer Temp Key|^Negotiated TLS1.3 group / { print $2 }' "$TMPFILE")
10947
10947
curve_found="${temp%%,*}"
10948
10948
if [[ "$curve_found" == ECDH ]]; then
10949
10949
curve_found="${temp#*, }"
@@ -22354,7 +22354,7 @@ determine_optimal_proto() {
22354
22354
22355
22355
debugme echo "OPTIMAL_PROTO: $OPTIMAL_PROTO"
22356
22356
fi
22357
- [[ "$optimal_proto" != -ssl2 ]] && ! "$all_failed" && grep -q '^Server Temp Key' $TMPFILE && HAS_DH_BITS=true # FIX #190
22357
+ [[ "$optimal_proto" != -ssl2 ]] && ! "$all_failed" && grep -Eq '^Server Temp Key|^Peer Temp Key|^Negotiated TLS1.3 group ' $TMPFILE && HAS_DH_BITS=true # FIX #190
22358
22358
if [[ "$(has_server_protocol "tls1_3")" -eq 0 ]] && [[ "$(has_server_protocol "tls1_2")" -ne 0 ]] &&
22359
22359
[[ "$(has_server_protocol "tls1_1")" -ne 0 ]] && [[ "$(has_server_protocol "tls1")" -ne 0 ]] &&
22360
22360
[[ "$(has_server_protocol "ssl3")" -ne 0 ]]; then
0 commit comments