From 0e54075a6a3babae8d5adaa9122540a6e3bee2e8 Mon Sep 17 00:00:00 2001 From: Dirk Wetter Date: Tue, 8 Sep 2020 22:09:57 +0200 Subject: [PATCH] Reverse double dash option for vulnerabilities (cmd line) --- testssl.sh | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/testssl.sh b/testssl.sh index 3221630..be0c734 100755 --- a/testssl.sh +++ b/testssl.sh @@ -18950,7 +18950,7 @@ single check as ("$PROG_NAME URI" does everything except -E and -g): -H, --heartbleed tests for Heartbleed vulnerability -I, --ccs, --ccs-injection tests for CCS injection vulnerability -T, --ticketbleed tests for Ticketbleed vulnerability in BigIP loadbalancers - --BB, --robot tests for Return of Bleichenbacher's Oracle Threat (ROBOT) vulnerability + -BB, --robot tests for Return of Bleichenbacher's Oracle Threat (ROBOT) vulnerability -R, --renegotiation tests for renegotiation vulnerabilities -C, --compression, --crime tests for CRIME vulnerability (TLS compression issue) -B, --breach tests for BREACH vulnerability (HTTP compression issue) @@ -18959,7 +18959,7 @@ single check as ("$PROG_NAME URI" does everything except -E and -g): -W, --sweet32 tests 64 bit block ciphers (3DES, RC2 and IDEA): SWEET32 vulnerability -A, --beast tests for BEAST vulnerability -L, --lucky13 tests for LUCKY13 - --WS, --winshock tests for winshock vulnerability + -WS, --winshock tests for winshock vulnerability -F, --freak tests for FREAK vulnerability -J, --logjam tests for LOGJAM vulnerability -D, --drown tests for DROWN vulnerability @@ -21569,7 +21569,7 @@ parse_cmd_line() { do_ticketbleed=true let "VULN_COUNT++" ;; - -BB|--BB|--robot) + -BB|--robot) do_robot=true ;; -R|--renegotiation) @@ -21617,7 +21617,7 @@ parse_cmd_line() { do_lucky13=true let "VULN_COUNT++" ;; - -WS|--WS|--winshock) + -WS|--winshock) do_winshock=true let "VULN_COUNT++" ;;