gnutls-commit
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[SCM] GNU gnutls branch, master, updated. gnutls_3_1_2-67-gf74101b


From: Nikos Mavrogiannopoulos
Subject: [SCM] GNU gnutls branch, master, updated. gnutls_3_1_2-67-gf74101b
Date: Tue, 09 Oct 2012 18:54:17 +0000

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "GNU gnutls".

http://git.savannah.gnu.org/cgit/gnutls.git/commit/?id=f74101bf4114d625cdac874cbcac4a1ddc9688c8

The branch, master has been updated
       via  f74101bf4114d625cdac874cbcac4a1ddc9688c8 (commit)
       via  1c601bb18f6674f84239f8a4e35f170e022b85d8 (commit)
       via  087dffde727e207c834417841835bf60afd30f26 (commit)
       via  592e020965fd865058f2457c60af0b9936e0da51 (commit)
      from  2c8f79e627bcf158ef8bc0e72cd8a7f7975c590a (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit f74101bf4114d625cdac874cbcac4a1ddc9688c8
Author: Nikos Mavrogiannopoulos <address@hidden>
Date:   Tue Oct 9 20:53:35 2012 +0200

    Documentation updates

commit 1c601bb18f6674f84239f8a4e35f170e022b85d8
Author: Nikos Mavrogiannopoulos <address@hidden>
Date:   Tue Oct 9 20:31:30 2012 +0200

    bumped versions

commit 087dffde727e207c834417841835bf60afd30f26
Author: Nikos Mavrogiannopoulos <address@hidden>
Date:   Tue Oct 9 20:04:42 2012 +0200

    inlude DANE in manual

commit 592e020965fd865058f2457c60af0b9936e0da51
Author: Nikos Mavrogiannopoulos <address@hidden>
Date:   Tue Oct 9 19:55:35 2012 +0200

    define Loaded_CertEnumCRLsInStore to CertEnumCRLsInStore when it exists.

-----------------------------------------------------------------------

Summary of changes:
 configure.ac             |    2 +-
 doc/cha-cert-auth.texi   |    2 +-
 doc/cha-cert-auth2.texi  |   16 ++++++---
 doc/cha-gtls-app.texi    |   66 ++++++++++++++++++++++++--------------
 doc/cha-intro-tls.texi   |   18 ++++++-----
 doc/cha-library.texi     |    1 +
 doc/invoke-certtool.texi |   28 ++++++++++++----
 doc/latex/Makefile.am    |   16 ++++++++-
 doc/scripts/mytexi2latex |    2 +
 lib/system.c             |    3 +-
 m4/hooks.m4              |    4 +-
 src/certtool-args.c      |   79 ++++++++++++++++++++++-----------------------
 src/certtool-args.def    |    6 ++--
 src/certtool-args.h      |    2 +-
 14 files changed, 149 insertions(+), 96 deletions(-)

diff --git a/configure.ac b/configure.ac
index 4d1b22f..8d337ee 100644
--- a/configure.ac
+++ b/configure.ac
@@ -21,7 +21,7 @@ dnl Process this file with autoconf to produce a configure 
script.
 # USA
 
 AC_PREREQ(2.61)
-AC_INIT([GnuTLS], [3.1.2], address@hidden)
+AC_INIT([GnuTLS], [3.1.3], address@hidden)
 AC_CONFIG_AUX_DIR([build-aux])
 AC_CONFIG_MACRO_DIR([m4])
 
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi
index bea6225..e6c7c96 100644
--- a/doc/cha-cert-auth.texi
+++ b/doc/cha-cert-auth.texi
@@ -299,7 +299,7 @@ Although the verification of a certificate path indicates 
that the
 certificate is signed by trusted authority, does not reveal anything
 about the peer's identity. It is required to verify if the
 certificate's owner is the one you expect. For more information
-consult @ref{gnutls_x509_crt_check_hostname}, section @ref{ex:verify} for an 
example, and @xcite{RFC2818}.
+consult @funcref{gnutls_x509_crt_check_hostname}, section @ref{ex:verify} for 
an example, and @xcite{RFC2818}.
 
 
 @node OpenPGP certificates
diff --git a/doc/cha-cert-auth2.texi b/doc/cha-cert-auth2.texi
index 6ce6d7a..a89b2ed 100644
--- a/doc/cha-cert-auth2.texi
+++ b/doc/cha-cert-auth2.texi
@@ -116,7 +116,8 @@ functions that return other fields of the CRL structure are 
also provided.
 
 The following functions can be used to generate a CRL.
 
address@hidden,gnutls_x509_crl_set_crt_serial,gnutls_x509_crl_set_crt,gnutls_x509_crl_set_next_update,gnutls_x509_crl_set_this_update}
address@hidden,gnutls_x509_crl_set_crt_serial}
address@hidden,gnutls_x509_crl_set_next_update,gnutls_x509_crl_set_this_update}
 
 The @funcref{gnutls_x509_crl_sign2} and @funcref{gnutls_x509_crl_privkey_sign} 
 functions sign the revocation list with a private key. The latter function
@@ -255,16 +256,18 @@ The issuing time of the revocation information.
 @item nextUpdate @tab
 The issuing time of the revocation information that will update that one.
 
address@hidden @tab Revoked certificates
+
 @item certificate status @tab
 The status of the certificate.
 
 @item certificate serial @tab
 The certificate's serial number.
 
address@hidden Revocation time @tab
address@hidden revocationTime @tab
 The time the certificate was revoked.
 
address@hidden Revocation reason @tab
address@hidden revocationReason @tab
 The reason the certificate was revoked.
 
 @end multitable
@@ -345,11 +348,12 @@ helper function @funcref{gnutls_pkcs12_simple_parse} is 
provided. For more
 advanced uses, manual parsing of the structure is required using the
 functions below.
 
address@hidden
address@hidden,gnutls_pkcs12_verify_mac,gnutls_pkcs12_bag_decrypt,gnutls_pkcs12_bag_get_count}
 
address@hidden,gnutls_pkcs12_verify_mac,gnutls_pkcs12_bag_decrypt}
address@hidden
address@hidden,gnutls_pkcs12_bag_get_key_id,gnutls_pkcs12_bag_get_friendly_name}
 
address@hidden,gnutls_pkcs12_bag_get_data,gnutls_pkcs12_bag_get_key_id,gnutls_pkcs12_bag_get_friendly_name}
address@hidden
 
 The functions below are used to generate a PKCS #12 structure. An example
 of their usage is also shown.
diff --git a/doc/cha-gtls-app.texi b/doc/cha-gtls-app.texi
index 7b24915..8bd5d92 100644
--- a/doc/cha-gtls-app.texi
+++ b/doc/cha-gtls-app.texi
@@ -961,9 +961,10 @@ for the acceptable security levels.} than their elliptic 
curves counterpart
 requires parameters to be generated and associated with a credentials
 structure by the server (see @ref{Parameter generation}). 
 
-The available special keywords are shown in @ref{tab:prio-special}. 
+The available special keywords are shown in @ref{tab:prio-special1}
+and @ref{tab:prio-special2}. 
 
address@hidden Table,tab:prio-special
address@hidden Table,tab:prio-special1
 @multitable @columnfractions .45 .45
 @headitem Keyword @tab Description
 
@@ -979,6 +980,25 @@ will prevent the sending of any TLS extensions in client 
side. Note
 that TLS 1.2 requires extensions to be used, as well as safe
 renegotiation thus this option must be used with care.
 
address@hidden %SERVER_PRECEDENCE @tab
+The ciphersuite will be selected according to server priorities
+and not the client's.
+
address@hidden %SSL3_RECORD_VERSION @tab
+will use SSL3.0 record version in client hello.
+This is the default.
+
address@hidden %LATEST_RECORD_VERSION @tab
+will use the latest TLS version record version in client hello.
+
address@hidden multitable
address@hidden priority string keywords.}
address@hidden float
+
address@hidden Table,tab:prio-special2
address@hidden @columnfractions .45 .45
address@hidden Keyword @tab Description
+
 @item %STATELESS_COMPRESSION @tab
 will disable keeping state across records when compressing. This may
 help to mitigate attacks when compression is used but an attacker
@@ -986,14 +1006,9 @@ is in control of input data. This has to be used only 
when the
 data that are possibly controlled by an attacker are placed in
 separate records.
 
address@hidden %SERVER_PRECEDENCE @tab
-The ciphersuite will be selected according to server priorities
-and not the client's.
-
 @item %DISABLE_SAFE_RENEGOTIATION @tab
-will disable safe renegotiation
+will completely disable safe renegotiation
 completely.  Do not use unless you know what you are doing.
-Testing purposes only.
 
 @item %UNSAFE_RENEGOTIATION @tab
 will allow handshakes and re-handshakes
@@ -1015,13 +1030,6 @@ will enforce safe renegotiation.  Clients and
 servers will refuse to talk to an insecure peer.  Currently this
 causes interoperability problems, but is required for full protection.
 
address@hidden %SSL3_RECORD_VERSION @tab
-will use SSL3.0 record version in client hello.
-This is the default.
-
address@hidden %LATEST_RECORD_VERSION @tab
-will use the latest TLS version record version in client hello.
-
 @item %VERIFY_ALLOW_SIGN_RSA_MD5 @tab
 will allow RSA-MD5 signatures in certificate chains.
 
@@ -1029,13 +1037,14 @@ will allow RSA-MD5 signatures in certificate chains.
 will allow V1 CAs in chains.
 
 @end multitable
address@hidden priority string keywords.}
address@hidden priority string keywords.}
 @end float
 
 Finally the ciphersuites enabled by any priority string can be
 listed using the @code{gnutls-cli} application (see @ref{gnutls-cli 
Invocation}), 
 or by using the priority functions as in @ref{Listing the ciphersuites in a 
priority string}.
 
address@hidden
 Example priority strings are:
 @example
 The default priority without the HMAC-MD5:
@@ -1047,9 +1056,12 @@ Specifying RSA with AES-128-CBC:
 Specifying the defaults except ARCFOUR-128:
     "NORMAL:-ARCFOUR-128"
 
-Enabling the 128-bit secure ciphers, while disabling SSL 3.0 and 
-enabling compression:
+Enabling the 128-bit secure ciphers, while disabling SSL 3.0 and enabling 
compression:
     "SECURE128:-VERS-SSL3.0:+COMP-DEFLATE"
+
+Enabling the 128-bit and 192-bit secure ciphers, while disabling all TLS 
versions 
+except TLS 1.2:
+    "SECURE128:+SECURE192:-VERS-TLS-ALL:+VERS-TLS1.2"
 @end example
 
 @node Advanced and other topics
@@ -1086,12 +1098,6 @@ even when requested to.  The expiration is to prevent 
temporal session keys
 from becoming long-term keys. Also note that as a client you must enable, 
 using the priority functions, at least the algorithms used in the last session.
 
-It is highly recommended for clients to enable the session ticket extension 
using
address@hidden in order to allow resumption with 
-servers that do not store any state.
-
address@hidden
-
 @showfuncdesc{gnutls_session_is_resumed}
 
 @subsubheading Server side
@@ -1367,6 +1373,18 @@ authentication.
 
 @headitem Security bits @tab RSA, DH and SRP parameter size @tab ECC key size 
@tab Security parameter @tab Description
 
address@hidden <72
address@hidden <1008
address@hidden <160
address@hidden @code{INSECURE}
address@hidden Considered to be insecure
+
address@hidden 72
address@hidden 1008
address@hidden 160
address@hidden @code{WEAK}
address@hidden Short term protection against small organizations
+
 @item 80
 @tab 1248
 @tab 160
diff --git a/doc/cha-intro-tls.texi b/doc/cha-intro-tls.texi
index aa5eaa2..bf9f174 100644
--- a/doc/cha-intro-tls.texi
+++ b/doc/cha-intro-tls.texi
@@ -443,19 +443,20 @@ To resume a TLS session the server normally store session 
parameters.  This
 complicates deployment, and could be avoiding by delegating the storage
 to the client. Because session parameters are sensitive they are encrypted
 and authenticated with a key only known to the server and then sent to the
-client. The Session Tickets in RFC 5077 @xcite{TLSTKT}, describe this 
-idea, which is implemented in GnuTLS.
+client. The Session Tickets extension is described in RFC 5077 @xcite{TLSTKT}.
+
+Since version 3.1.3 GnuTLS clients transparently support session tickets.
 
 @node HeartBeat
 @subsection HeartBeat
 @cindex TLS extensions
 @cindex heartbeat
 
-The TLS extension which allows to ping and receive replies from the peer,
-described in @xcite{RFC6520}. This extension is disabled by default and
+This TLS extension allows to ping and receive confirmation from the peer,
+is described in @xcite{RFC6520}. The extension is disabled by default and
 @funcref{gnutls_heartbeat_enable} can be used to enable it. A policy
 may be negotiated to only allow sending heartbeat messages or sending and 
receiving.
-The session policy can be checked with @funcref{gnutls_heartbeat_allowed}. 
+The current session policy can be checked with 
@funcref{gnutls_heartbeat_allowed}. 
 The requests coming from the peer result to 
@address@hidden@address@hidden@-RECEIVED}
 being returned from the receive function. Ping requests to peer can be send via
 @funcref{gnutls_heartbeat_ping}. 
@@ -571,7 +572,7 @@ can be used both by clients and servers.
 The Online Certificate Status Protocol (OCSP) is a protocol that allows the
 client to verify the server certificate for revocation without messing with
 certificate revocation lists. Its drawback is that it requires the client
-to connect to the server's CA OCSP server and ask for the status of the
+to connect to the server's CA OCSP server and request the status of the
 certificate. This extension however, enables a TLS server to include
 its CA OCSP server response in the handshake. That is an HTTPS server
 may periodically run @code{ocsptool} (see @ref{ocsptool Invocation}) to obtain
@@ -579,12 +580,13 @@ its certificate revocation status and serve it to the 
clients. This
 reduces the number of connections a client needs to perform to access a
 secure server.
 
-Server functions:
 
@showfuncB{gnutls_certificate_set_ocsp_status_request_function,gnutls_certificate_set_ocsp_status_request_file}
 
-Client functions:
 @showfuncA{gnutls_ocsp_status_request_enable_client}
 
+Since version 3.1.3 GnuTLS clients transparently support the certificate status
+request.
+
 @include sec-tls-app.texi
 
 @node On SSL 2 and older protocols
diff --git a/doc/cha-library.texi b/doc/cha-library.texi
index 0278eaa..338658a 100644
--- a/doc/cha-library.texi
+++ b/doc/cha-library.texi
@@ -95,6 +95,7 @@ options are given.
 --disable-extra-pki
 --disable-openpgp-authentication
 --disable-openssl-compatibility
+--disable-libdane
 --without-p11-kit
 --without-tpm
 @end verbatim
diff --git a/doc/invoke-certtool.texi b/doc/invoke-certtool.texi
index 4891908..21f3bcb 100644
--- a/doc/invoke-certtool.texi
+++ b/doc/invoke-certtool.texi
@@ -7,7 +7,7 @@
 # 
 # DO NOT EDIT THIS FILE   (invoke-certtool.texi)
 # 
-# It has been AutoGen-ed  October  8, 2012 at 04:55:06 PM by AutoGen 5.16
+# It has been AutoGen-ed  October  9, 2012 at 08:27:51 PM by AutoGen 5.16
 # From the definitions    ../src/certtool-args.def
 # and the template file   agtexi-cmd.tpl
 @end ignore
@@ -42,6 +42,8 @@ USAGE:  certtool [ -<flag> [<val>] | --<name>address@hidden| 
@}<val>] ]...
    -d, --debug=num            Enable debugging.
                                 - It must be in the range:
                                   0 to 9999
+   -V, --verbose              More verbose output
+                                - may appear multiple times
        --infile=file          Input file
                                 - file must pre-exist
        --outfile=str          Output file
@@ -114,8 +116,8 @@ USAGE:  certtool [ -<flag> [<val>] | 
--<name>address@hidden| @}<val>] ]...
        --dane-port=num        Specify the port number for the DANE data.
        --dane-ca              Whether the provided certificate or public key 
is a Certificate
 authority.
-       --dane-local           Whether the provided certificate or public key 
is an unsigned local
-entity.
+       --dane-full-x509       Use the hash of the X.509 certificate, rather 
than the public key.
+       --dane-local           The provided certificate or public key is a 
local entity.
    -v, --version[=arg]        Output version information and exit
    -h, --help                 Display extended usage information and exit
    -!, --more-help            Extended usage information passed thru pager
@@ -323,12 +325,18 @@ This command specifies the protocol for the service set 
in the DANE data.
 
 This is the ``whether the provided certificate or public key is a certificate 
authority.'' option.
 Marks the DANE RR as a CA certificate if specified.
address@hidden dane-full-x509}
address@hidden dane-full-x509 option
address@hidden certtool-dane-full-x509
+
+This is the ``use the hash of the x.509 certificate, rather than the public 
key.'' option.
+This option forces the generated record to contain the hash of the full X.509 
certificate. By default only the hash of the public key is used.
 @anchor{certtool dane-local}
 @subheading dane-local option
 @cindex certtool-dane-local
 
-This is the ``whether the provided certificate or public key is an unsigned 
local entity.'' option.
-DANE distinguishes certificates and public keys offered via the DNSSEC to 
trusted and local entities. Use this flag if this is a local entity.
+This is the ``the provided certificate or public key is a local entity.'' 
option.
+DANE distinguishes certificates and public keys offered via the DNSSEC to 
trusted and local entities. Use this flag if this is a local (and possibly 
unsigned) entity.
 @anchor{certtool exit status}
 @subheading certtool exit status
 
@@ -462,8 +470,10 @@ To verify a Certificate Revocation List (CRL) do:
 $ certtool --verify-crl --load-ca-certificate x509-ca.pem < crl.pem
 @end example
 
address@hidden DANE RR generation
-To create a DANE resource record for a CA signed certificate use the following 
commands.
address@hidden DANE TLSA RR generation
+
+
+To create a DANE TLSA resource record for a CA signed certificate use the 
following commands.
 
 @example
 $ certtool --dane-rr --dane-host www.example.com --load-certificate cert.pem
@@ -475,6 +485,10 @@ $ certtool --dane-rr --dane-host www.example.com 
--load-certificate cert.pem \
   --dane-local
 @end example
 
+The latter is useful to add in your DNS entry even if your certificate is 
signed 
+by a CA. That way even users who do not trust your CA will be able to verify 
your
+certificate using DANE.
+
 In order to create a record for the signer of your certificate use:
 @example
 $ certtool --dane-rr --dane-host www.example.com --load-certificate cert.pem \
diff --git a/doc/latex/Makefile.am b/doc/latex/Makefile.am
index f22138b..5f7b8d6 100644
--- a/doc/latex/Makefile.am
+++ b/doc/latex/Makefile.am
@@ -114,7 +114,7 @@ gnutls-api.tex: $(srcdir)/../../lib/*.c 
$(srcdir)/../../lib/ext/*.c $(srcdir)/..
        rm -f address@hidden
        mv -f address@hidden $@
 
-gnutls-enums.tex: $(srcdir)/../../lib/includes/gnutls/*.h
+gnutls-enums.tex: $(srcdir)/../../lib/includes/gnutls/*.h 
$(srcdir)/../../libdane/includes/gnutls/*.h 
        echo "" > address@hidden
        for i in $^; do \
                echo -n "Creating documentation for file $$i... " && \
@@ -136,6 +136,18 @@ x509-api.tex: $(srcdir)/../../lib/x509/*.c
        rm -f address@hidden
        mv -f address@hidden $@
 
+dane-api.tex: $(srcdir)/../../libdane/*.c
+       echo "" > address@hidden
+       for i in $^; do \
+               echo -n "Creating documentation for file $$i... " && \
+               $(srcdir)/../scripts/gdoc -tex $$i >> address@hidden && \
+               echo "ok"; \
+       done
+       $(srcdir)/../scripts/sort1.pl < address@hidden > address@hidden 
2>/dev/null
+       $(srcdir)/../scripts/split.pl functions < address@hidden 2>/dev/null
+       rm -f address@hidden
+       mv -f address@hidden $@
+
 pgp-api.tex: $(srcdir)/../../lib/openpgp/*.c
        echo "" > address@hidden
        for i in $^; do \
@@ -148,7 +160,7 @@ pgp-api.tex: $(srcdir)/../../lib/openpgp/*.c
        rm -f address@hidden
        mv -f address@hidden $@
 
-SOURCE_GEN_FILES =  pgp-api.tex x509-api.tex gnutls-api.tex gnutls-enums.tex
+SOURCE_GEN_FILES =  pgp-api.tex x509-api.tex gnutls-api.tex gnutls-enums.tex 
dane-api.tex
 
 PDF_FILES = gnutls-client-server-use-case.pdf gnutls-crypto-layers.pdf \
        gnutls-handshake-sequence.pdf gnutls-handshake-state.pdf \
diff --git a/doc/scripts/mytexi2latex b/doc/scripts/mytexi2latex
index a4b35b2..fe9176c 100755
--- a/doc/scripts/mytexi2latex
+++ b/doc/scripts/mytexi2latex
@@ -341,6 +341,8 @@ multitable:
         }
 
        if ($verbatim == 0) {
+               $line =~ s/\</\$<\$/g;
+               $line =~ s/\>/\$>\$/g;
                $line =~ s/\_/\\_/g;
                $line =~ s/\~/\\~/g;
                $line =~ s/\%(?!c)/\\%/g;
diff --git a/lib/system.c b/lib/system.c
index b22e07d..39a65a3 100644
--- a/lib/system.c
+++ b/lib/system.c
@@ -35,8 +35,9 @@
 typedef PCCRL_CONTEXT WINAPI (*Type_CertEnumCRLsInStore) (HCERTSTORE 
hCertStore, PCCRL_CONTEXT pPrevCrlContext);
 static Type_CertEnumCRLsInStore Loaded_CertEnumCRLsInStore;
 static HMODULE Crypt32_dll;
+#  else
+#   define Loaded_CertEnumCRLsInStore CertEnumCRLsInStore
 #  endif
-
 #else
 # ifdef HAVE_PTHREAD_LOCKS
 #  include <pthread.h>
diff --git a/m4/hooks.m4 b/m4/hooks.m4
index d3c8c79..2c56b00 100644
--- a/m4/hooks.m4
+++ b/m4/hooks.m4
@@ -39,9 +39,9 @@ AC_DEFUN([LIBGNUTLS_HOOKS],
   # Interfaces changed/added/removed:   CURRENT++       REVISION=0
   # Interfaces added:                             AGE++
   # Interfaces removed:                           AGE=0
-  AC_SUBST(LT_CURRENT, 40)
+  AC_SUBST(LT_CURRENT, 41)
   AC_SUBST(LT_REVISION, 0)
-  AC_SUBST(LT_AGE, 12)
+  AC_SUBST(LT_AGE, 13)
 
   AC_SUBST(LT_SSL_CURRENT, 27)
   AC_SUBST(LT_SSL_REVISION, 2)
diff --git a/src/certtool-args.c b/src/certtool-args.c
index 3dd21ad..d416fe6 100644
--- a/src/certtool-args.c
+++ b/src/certtool-args.c
@@ -2,7 +2,7 @@
  *  
  *  DO NOT EDIT THIS FILE   (certtool-args.c)
  *  
- *  It has been AutoGen-ed  October  9, 2012 at 07:10:23 PM by AutoGen 5.16
+ *  It has been AutoGen-ed  October  9, 2012 at 08:27:12 PM by AutoGen 5.16
  *  From the definitions    certtool-args.def
  *  and the template file   options
  *
@@ -67,7 +67,7 @@ extern FILE * option_usage_fp;
 /*
  *  certtool option static const strings
  */
-static char const certtool_opt_strs[5254] =
+static char const certtool_opt_strs[5231] =
 /*     0 */ "certtool @address@hidden"
             "Copyright (C) 2000-2012 Free Software Foundation, all rights 
reserved.\n"
             "This is free software. It is licensed for use, modification and\n"
@@ -264,30 +264,29 @@ static char const certtool_opt_strs[5254] =
             "authority.\0"
 /*  4493 */ "DANE_CA\0"
 /*  4501 */ "dane-ca\0"
-/*  4509 */ "Use the hash of the full X.509 certificate, rather than the 
public key.\0"
-/*  4581 */ "DANE_FULL_X509\0"
-/*  4596 */ "dane-full-x509\0"
-/*  4611 */ "Whether the provided certificate or public key is an unsigned 
local\n"
-            "entity.\0"
-/*  4687 */ "DANE_LOCAL\0"
-/*  4698 */ "dane-local\0"
-/*  4709 */ "Display extended usage information and exit\0"
-/*  4753 */ "help\0"
-/*  4758 */ "Extended usage information passed thru pager\0"
-/*  4803 */ "more-help\0"
-/*  4813 */ "Output version information and exit\0"
-/*  4849 */ "version\0"
-/*  4857 */ "CERTTOOL\0"
-/*  4866 */ "certtool - GnuTLS PKCS #11 tool - Ver. @address@hidden"
+/*  4509 */ "Use the hash of the X.509 certificate, rather than the public 
key.\0"
+/*  4576 */ "DANE_FULL_X509\0"
+/*  4591 */ "dane-full-x509\0"
+/*  4606 */ "The provided certificate or public key is a local entity.\0"
+/*  4664 */ "DANE_LOCAL\0"
+/*  4675 */ "dane-local\0"
+/*  4686 */ "Display extended usage information and exit\0"
+/*  4730 */ "help\0"
+/*  4735 */ "Extended usage information passed thru pager\0"
+/*  4780 */ "more-help\0"
+/*  4790 */ "Output version information and exit\0"
+/*  4826 */ "version\0"
+/*  4834 */ "CERTTOOL\0"
+/*  4843 */ "certtool - GnuTLS PKCS #11 tool - Ver. @address@hidden"
             "USAGE:  %s [ -<flag> [<val>] | --<name>[{=| }<val>] ]...\n\0"
-/*  4973 */ "address@hidden"
-/*  4992 */ "\n\n\0"
-/*  4995 */ "\n"
+/*  4950 */ "address@hidden"
+/*  4969 */ "\n\n\0"
+/*  4972 */ "\n"
             "Tool to parse and generate X.509 certificates, requests and 
private keys.\n"
             "It can be used interactively or non interactively by specifying 
the\n"
             "template command line option.\n\0"
-/*  5169 */ "certtool @address@hidden"
-/*  5188 */ "certtool [options] [url]\n"
+/*  5146 */ "certtool @address@hidden"
+/*  5165 */ "certtool [options] [url]\n"
             "certtool --help for usage instructions.\n";
 
 /*
@@ -808,26 +807,26 @@ static int const aDane_RrMustList[] = {
  *  dane-full-x509 option description:
  */
 #define DANE_FULL_X509_DESC      (certtool_opt_strs+4509)
-#define DANE_FULL_X509_NAME      (certtool_opt_strs+4581)
-#define DANE_FULL_X509_name      (certtool_opt_strs+4596)
+#define DANE_FULL_X509_NAME      (certtool_opt_strs+4576)
+#define DANE_FULL_X509_name      (certtool_opt_strs+4591)
 #define DANE_FULL_X509_FLAGS     (OPTST_DISABLED)
 
 /*
  *  dane-local option description:
  */
-#define DANE_LOCAL_DESC      (certtool_opt_strs+4611)
-#define DANE_LOCAL_NAME      (certtool_opt_strs+4687)
-#define DANE_LOCAL_name      (certtool_opt_strs+4698)
+#define DANE_LOCAL_DESC      (certtool_opt_strs+4606)
+#define DANE_LOCAL_NAME      (certtool_opt_strs+4664)
+#define DANE_LOCAL_name      (certtool_opt_strs+4675)
 #define DANE_LOCAL_FLAGS     (OPTST_DISABLED)
 
 /*
  *  Help/More_Help/Version option descriptions:
  */
-#define HELP_DESC       (certtool_opt_strs+4709)
-#define HELP_name       (certtool_opt_strs+4753)
+#define HELP_DESC       (certtool_opt_strs+4686)
+#define HELP_name       (certtool_opt_strs+4730)
 #ifdef HAVE_WORKING_FORK
-#define MORE_HELP_DESC  (certtool_opt_strs+4758)
-#define MORE_HELP_name  (certtool_opt_strs+4803)
+#define MORE_HELP_DESC  (certtool_opt_strs+4735)
+#define MORE_HELP_name  (certtool_opt_strs+4780)
 #define MORE_HELP_FLAGS (OPTST_IMM | OPTST_NO_INIT)
 #else
 #define MORE_HELP_DESC  NULL
@@ -840,8 +839,8 @@ static int const aDane_RrMustList[] = {
 #  define VER_FLAGS     (OPTST_SET_ARGTYPE(OPARG_TYPE_STRING) | \
                          OPTST_ARG_OPTIONAL | OPTST_IMM | OPTST_NO_INIT)
 #endif
-#define VER_DESC        (certtool_opt_strs+4813)
-#define VER_name        (certtool_opt_strs+4849)
+#define VER_DESC        (certtool_opt_strs+4790)
+#define VER_name        (certtool_opt_strs+4826)
 /*
  *  Declare option callback procedures
  */
@@ -1651,14 +1650,14 @@ static tOptDesc optDesc[OPTION_CT] = {
  *
  *  Define the certtool Option Environment
  */
-#define zPROGNAME       (certtool_opt_strs+4857)
-#define zUsageTitle     (certtool_opt_strs+4866)
+#define zPROGNAME       (certtool_opt_strs+4834)
+#define zUsageTitle     (certtool_opt_strs+4843)
 #define zRcName         NULL
 #define apzHomeList     NULL
-#define zBugsAddr       (certtool_opt_strs+4973)
-#define zExplain        (certtool_opt_strs+4992)
-#define zDetail         (certtool_opt_strs+4995)
-#define zFullVersion    (certtool_opt_strs+5169)
+#define zBugsAddr       (certtool_opt_strs+4950)
+#define zExplain        (certtool_opt_strs+4969)
+#define zDetail         (certtool_opt_strs+4972)
+#define zFullVersion    (certtool_opt_strs+5146)
 /* extracted from optcode.tlib near line 350 */
 
 #if defined(ENABLE_NLS)
@@ -1672,7 +1671,7 @@ static tOptDesc optDesc[OPTION_CT] = {
 
 #define certtool_full_usage (NULL)
 
-#define certtool_short_usage (certtool_opt_strs+5188)
+#define certtool_short_usage (certtool_opt_strs+5165)
 
 #endif /* not defined __doxygen__ */
 
diff --git a/src/certtool-args.def b/src/certtool-args.def
index cfc9ffc..5fce872 100644
--- a/src/certtool-args.def
+++ b/src/certtool-args.def
@@ -393,14 +393,14 @@ flag = {
 
 flag = {
     name      = dane-full-x509;
-    descrip   = "Use the hash of the full X.509 certificate, rather than the 
public key.";
+    descrip   = "Use the hash of the X.509 certificate, rather than the public 
key.";
     doc      = "This option forces the generated record to contain the hash of 
the full X.509 certificate. By default only the hash of the public key is 
used.";
 };
 
 flag = {
     name      = dane-local;
-    descrip   = "Whether the provided certificate or public key is an unsigned 
local entity.";
-    doc      = "DANE distinguishes certificates and public keys offered via 
the DNSSEC to trusted and local entities. Use this flag if this is a local 
entity.";
+    descrip   = "The provided certificate or public key is a local entity.";
+    doc      = "DANE distinguishes certificates and public keys offered via 
the DNSSEC to trusted and local entities. Use this flag if this is a local (and 
possibly unsigned) entity.";
 };
 
 doc-section = {
diff --git a/src/certtool-args.h b/src/certtool-args.h
index 8360fc2..1a4273c 100644
--- a/src/certtool-args.h
+++ b/src/certtool-args.h
@@ -2,7 +2,7 @@
  *  
  *  DO NOT EDIT THIS FILE   (certtool-args.h)
  *  
- *  It has been AutoGen-ed  October  9, 2012 at 07:10:23 PM by AutoGen 5.16
+ *  It has been AutoGen-ed  October  9, 2012 at 08:27:12 PM by AutoGen 5.16
  *  From the definitions    certtool-args.def
  *  and the template file   options
  *


hooks/post-receive
-- 
GNU gnutls



reply via email to

[Prev in Thread] Current Thread [Next in Thread]