From 2d719e5ebeb36005c56abb046e1428a91061ef5e Mon Sep 17 00:00:00 2001 From: Dirk Wetter Date: Fri, 3 May 2019 19:25:37 +0200 Subject: [PATCH] Add cmdlines * t / --starttls irc/ircs (which will fail later for now) * --vulnerabilities : not yet the moment for renaming --- testssl.sh | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/testssl.sh b/testssl.sh index 4ae8eff..4aa9f2a 100755 --- a/testssl.sh +++ b/testssl.sh @@ -18705,8 +18705,8 @@ parse_cmd_line() { STARTTLS_PROTOCOL="$(parse_opt_equal_sign "$1" "$2")" [[ $? -eq 0 ]] && shift case $STARTTLS_PROTOCOL in - ftp|smtp|lmtp|pop3|imap|xmpp|telnet|ldap|nntp|postgres|mysql) ;; - ftps|smtps|lmtps|pop3s|imaps|xmpps|telnets|ldaps|nntps) ;; + ftp|smtp|lmtp|pop3|imap|xmpp|telnet|ldap|irc|nntp|postgres|mysql) ;; + ftps|smtps|lmtps|pop3s|imaps|xmpps|telnets|ldaps|ircs|nntps) ;; *) tmln_magenta "\nunrecognized STARTTLS protocol \"$1\", see help" 1>&2 help 1 ;; esac @@ -18739,7 +18739,7 @@ parse_cmd_line() { -c|--client-simulation) do_client_simulation=true ;; - -U|--vulnerable) + -U|--vulnerable|--vulnerabilities) do_vulnerabilities=true do_heartbleed="$OFFENSIVE" do_ccs_injection="$OFFENSIVE"