gnutls-commit
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[SCM] GNU gnutls branch, master, updated. gnutls-3_0_12-38-g7408ef9


From: Nikos Mavrogiannopoulos
Subject: [SCM] GNU gnutls branch, master, updated. gnutls-3_0_12-38-g7408ef9
Date: Sun, 22 Jan 2012 08:53:49 +0000

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "GNU gnutls".

http://git.savannah.gnu.org/cgit/gnutls.git/commit/?id=7408ef9793c38bbef2f4118e8312b991432db612

The branch, master has been updated
       via  7408ef9793c38bbef2f4118e8312b991432db612 (commit)
       via  ad7bc574c119ba5ebf14524af2a4dc184a0112c5 (commit)
      from  3b70b556a12a89949827f70a9bc9f825755f0325 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 7408ef9793c38bbef2f4118e8312b991432db612
Author: Nikos Mavrogiannopoulos <address@hidden>
Date:   Sun Jan 22 09:50:59 2012 +0100

    corrected command line parsing issues.

commit ad7bc574c119ba5ebf14524af2a4dc184a0112c5
Author: Nikos Mavrogiannopoulos <address@hidden>
Date:   Sun Jan 22 09:25:40 2012 +0100

    Added Since

-----------------------------------------------------------------------

Summary of changes:
 lib/x509/crl.c            |    2 +
 lib/x509/x509.c           |    2 +
 src/Makefile.am           |   12 +++---
 src/cli-args.def.in       |    4 +-
 src/cli-debug-args.def.in |    1 +
 src/cli.c                 |   60 +++++++++++++++++++++--------------
 src/p11tool-args.def.in   |    3 ++
 src/p11tool.c             |   54 +++++++++++++++---------------
 src/psk-args.def.in       |    1 +
 src/serv-args.def.in      |    2 +-
 src/serv.c                |   78 ++++++++++++++++++++++++---------------------
 src/srptool-args.def.in   |    1 +
 12 files changed, 124 insertions(+), 96 deletions(-)

diff --git a/lib/x509/crl.c b/lib/x509/crl.c
index 9045c45..9b81ac6 100644
--- a/lib/x509/crl.c
+++ b/lib/x509/crl.c
@@ -772,6 +772,8 @@ _get_authority_key_id (gnutls_x509_crl_t cert, ASN1_TYPE 
*c2,
  * %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE is returned.
  *
  * Returns: Returns 0 on success, or an error code.
+ *
+ * Since: 3.0.0
  **/
 int
 gnutls_x509_crl_get_authority_key_gn_serial (gnutls_x509_crl_t crl, unsigned 
int seq, void *alt,
diff --git a/lib/x509/x509.c b/lib/x509/x509.c
index 7c9da66..d3fbe59 100644
--- a/lib/x509/x509.c
+++ b/lib/x509/x509.c
@@ -816,6 +816,8 @@ _get_authority_key_id (gnutls_x509_crt_t cert, ASN1_TYPE 
*c2,
  * %GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE is returned.
  *
  * Returns: Returns 0 on success, or an error code.
+ *
+ * Since: 3.0.0
  **/
 int
 gnutls_x509_crt_get_authority_key_gn_serial (gnutls_x509_crt_t cert, unsigned 
int seq, void *alt,
diff --git a/src/Makefile.am b/src/Makefile.am
index 7586d11..748468c 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -163,15 +163,15 @@ p11tool-gaa.c: $(srcdir)/p11tool.gaa
 endif
 certtool-gaa.c: $(srcdir)/certtool.gaa
        -$(GAA) $< -o certtool-gaa.c -i certtool-gaa.h
-psk-args.c: $(srcdir)/psk-args.def
+psk-args.c psk-args.h: $(srcdir)/psk-args.def
        -autogen $<
-cli-debug-args.c: $(srcdir)/cli-debug-args.def
+cli-debug-args.c cli-debug-args.h: $(srcdir)/cli-debug-args.def
        -autogen $<
-cli-args.c: $(srcdir)/cli-args.def
+cli-args.c cli-args.h: $(srcdir)/cli-args.def
        -autogen $<
-serv-args.c: $(srcdir)/serv-args.def
+serv-args.c serv-args.h: $(srcdir)/serv-args.def
        -autogen $<
-srptool-args.c: $(srcdir)/srptool-args.def
+srptool-args.c srptool-args.h: $(srcdir)/srptool-args.def
        -autogen $<
-p11tool-args.c: $(srcdir)/p11tool-args.def
+p11tool-args.c p11tool-args.h: $(srcdir)/p11tool-args.def
        -autogen $<
diff --git a/src/cli-args.def.in b/src/cli-args.def.in
index d8cd0ac..8f73cd3 100644
--- a/src/cli-args.def.in
+++ b/src/cli-args.def.in
@@ -10,7 +10,8 @@ gnu-usage;
 no-misuse-usage;
 disable-save;
 reorder-args;
-argument;
+no-xlate = opt;
+argument = "[hostname]";
 long-opts;
 config-header = 'config.h';
 export = '#include <gettext.h>';
@@ -257,7 +258,6 @@ flag = {
 flag = {
     name      = list;
     value     = l;
-    arg-type  = string;
     descrip   = "Print a list of the supported algorithms and modes";
     doc      = "Print a list of the supported algorithms and modes. If a 
priority string is given then only the enabled ciphersuites are shown.";
 };
diff --git a/src/cli-debug-args.def.in b/src/cli-debug-args.def.in
index 745044f..d058c69 100644
--- a/src/cli-debug-args.def.in
+++ b/src/cli-debug-args.def.in
@@ -8,6 +8,7 @@ detail        = "TLS debug client. It sets up multiple TLS 
connections to
 a server and queries its capabilities. Can be used to check for servers with
 special needs or bugs.";
 gnu-usage;
+no-xlate = opt;
 no-misuse-usage;
 disable-save;
 reorder-args;
diff --git a/src/cli.c b/src/cli.c
index 7ed6dcc..b533d9a 100644
--- a/src/cli.c
+++ b/src/cli.c
@@ -79,6 +79,7 @@ const char *x509_cafile = NULL;
 const char *x509_crlfile = NULL;
 static int x509ctype;
 static int disable_extensions;
+static const char * priorities = NULL;
 
 const char *psk_username = NULL;
 gnutls_datum_t psk_key = { NULL, 0 };
@@ -547,15 +548,11 @@ init_tls_session (const char *hostname)
 {
   const char *err;
   int ret;
-  const char * priorities;
   gnutls_session_t session;
-  
-  if (HAVE_OPT(PRIORITY)) {
-    priorities = OPT_ARG(PRIORITY);
-  } else {
-    priorities = "NORMAL";
-  }
 
+  if (priorities == NULL)
+    priorities = "NORMAL";
+  
   if (udp)
     {
       gnutls_init (&session, GNUTLS_CLIENT|GNUTLS_DATAGRAM);
@@ -615,7 +612,7 @@ init_tls_session (const char *hostname)
     }
 
 #ifdef ENABLE_SESSION_TICKET
-  if (disable_extensions == 0 && !ENABLED_OPT(NOTICKET)t)
+  if (disable_extensions == 0 && !HAVE_OPT(NOTICKET)t)
     gnutls_session_ticket_enable_client (session);
 #endif
 
@@ -832,7 +829,7 @@ main (int argc, char **argv)
           gnutls_session_get_id (hd.session, session_id, &session_id_size);
 
           /* print some information */
-          print_info (hd.session, hostname, ENABLED_OPT(INSECURE));
+          print_info (hd.session, hostname, HAVE_OPT(INSECURE));
 
           printf ("- Disconnecting\n");
           socket_bye (&hd);
@@ -1025,15 +1022,26 @@ const char* rest = NULL;
   
   if (rest == NULL && argc > 0)
     rest = argv[0];
+
+  if (HAVE_OPT(PRIORITY)) 
+    {
+      priorities = OPT_ARG(PRIORITY);
+    } 
+  verbose = HAVE_OPT( VERBOSE);
   
-  verbose = ENABLED_OPT( VERBOSE);
-  disable_extensions = ENABLED_OPT( DISABLE_EXTENSIONS);
-  print_cert = ENABLED_OPT( PRINT_CERT);
-  starttls = ENABLED_OPT(STARTTLS);
-  resume = ENABLED_OPT(RESUME);
-  rehandshake = ENABLED_OPT(REHANDSHAKE);
-  insecure = ENABLED_OPT(INSECURE);
-  udp = ENABLED_OPT(UDP);
+  if (HAVE_OPT(LIST))
+    {
+      print_list(priorities, verbose);
+      exit(0);
+    }
+
+  disable_extensions = HAVE_OPT( DISABLE_EXTENSIONS);
+  print_cert = HAVE_OPT( PRINT_CERT);
+  starttls = HAVE_OPT(STARTTLS);
+  resume = HAVE_OPT(RESUME);
+  rehandshake = HAVE_OPT(REHANDSHAKE);
+  insecure = HAVE_OPT(INSECURE);
+  udp = HAVE_OPT(UDP);
   mtu = OPT_VALUE_MTU;
   
   if (HAVE_OPT(PORT)) 
@@ -1046,9 +1054,9 @@ const char* rest = NULL;
     }
 
   record_max_size = OPT_VALUE_RECORDSIZE;
-  fingerprint = ENABLED_OPT(FINGERPRINT);
+  fingerprint = HAVE_OPT(FINGERPRINT);
 
-  if (ENABLED_OPT(X509FMTDER))
+  if (HAVE_OPT(X509FMTDER))
     x509ctype = GNUTLS_X509_FMT_DER;
   else
     x509ctype = GNUTLS_X509_FMT_PEM;
@@ -1091,12 +1099,16 @@ const char* rest = NULL;
   if (HAVE_OPT(PGPKEYRING))
     pgp_keyring = OPT_ARG(PGPKEYRING);
 
-  crlf = ENABLED_OPT(CRLF);
+  crlf = HAVE_OPT(CRLF);
 
-  if (rest == NULL)
-    hostname = "localhost";
-  else
+  if (rest != NULL)
     hostname = rest;
+    
+  if (hostname == NULL)
+    {
+      fprintf(stderr, "No hostname specified\n");
+      exit(1);
+    }
 }
 
 void cli_version (void);
@@ -1161,7 +1173,7 @@ do_handshake (socket_st * socket)
   if (ret == 0)
     {
       /* print some information */
-      print_info (socket->session, socket->hostname, ENABLED_OPT(INSECURE));
+      print_info (socket->session, socket->hostname, HAVE_OPT(INSECURE));
 
 
       socket->secure = 1;
diff --git a/src/p11tool-args.def.in b/src/p11tool-args.def.in
index 66ceffd..9cb7202 100644
--- a/src/p11tool-args.def.in
+++ b/src/p11tool-args.def.in
@@ -12,6 +12,7 @@ To use PKCS #11 tokens with gnutls the configuration file
 short-usage   = "p11tool [options]\np11tool --help for usage instructions.\n";
 prog-group    = "GnuTLS";
 gnu-usage;
+no-xlate = opt;
 no-misuse-usage;
 disable-save;
 long-opts;
@@ -165,6 +166,8 @@ flag = {
 flag = {
     name      = login;
     descrip   = "Force login to token";
+    disabled;
+    disable   = "no";
     doc       = "";
 };
 
diff --git a/src/p11tool.c b/src/p11tool.c
index d9f1af9..864db3e 100644
--- a/src/p11tool.c
+++ b/src/p11tool.c
@@ -84,7 +84,7 @@ cmd_parser (int argc, char **argv)
   
   optionProcess( &p11toolOptions, argc, argv);
   
-  if (ENABLED_OPT(DEBUG))
+  if (HAVE_OPT(DEBUG))
     debug = OPT_VALUE_DEBUG;
 
   gnutls_global_set_log_function (tls_log_func);
@@ -95,7 +95,7 @@ cmd_parser (int argc, char **argv)
   if ((ret = gnutls_global_init ()) < 0)
     error (EXIT_FAILURE, 0, "global_init: %s", gnutls_strerror (ret));
 
-  if (ENABLED_OPT(PROVIDER))
+  if (HAVE_OPT(PROVIDER))
     {
       ret = gnutls_pkcs11_init (GNUTLS_PKCS11_FLAG_MANUAL, NULL);
       if (ret < 0)
@@ -115,7 +115,7 @@ cmd_parser (int argc, char **argv)
         fprintf (stderr, "pkcs11_init: %s", gnutls_strerror (ret));
     }
 
-  if (ENABLED_OPT(OUTFILE))
+  if (HAVE_OPT(OUTFILE))
     {
       outfile = safe_open_rw (OPT_ARG(OUTFILE), 0);
       if (outfile == NULL)
@@ -126,74 +126,74 @@ cmd_parser (int argc, char **argv)
 
   memset (&cinfo, 0, sizeof (cinfo));
   
-  if (ENABLED_OPT(SECRET_KEY))
+  if (HAVE_OPT(SECRET_KEY))
     cinfo.secret_key = OPT_ARG(SECRET_KEY);
 
-  if (ENABLED_OPT(LOAD_PRIVKEY))
+  if (HAVE_OPT(LOAD_PRIVKEY))
     cinfo.privkey = OPT_ARG(LOAD_PRIVKEY);
 
-  if (ENABLED_OPT(PKCS8))
+  if (HAVE_OPT(PKCS8))
     cinfo.pkcs8 = 1;
 
-  if (ENABLED_OPT(INDER) || ENABLED_OPT(INRAW))
+  if (HAVE_OPT(INDER) || HAVE_OPT(INRAW))
     cinfo.incert_format = GNUTLS_X509_FMT_DER;
 
-  if (ENABLED_OPT(LOAD_CERTIFICATE))
+  if (HAVE_OPT(LOAD_CERTIFICATE))
     cinfo.cert = OPT_ARG(LOAD_CERTIFICATE);
 
-  if (ENABLED_OPT(LOAD_PUBKEY))
+  if (HAVE_OPT(LOAD_PUBKEY))
     cinfo.pubkey = OPT_ARG(LOAD_PUBKEY);
     
-  if (ENABLED_OPT(LIST_TOKENS))
+  if (HAVE_OPT(LIST_TOKENS))
     action = ACTION_PKCS11_TOKENS;
-  else if (ENABLED_OPT(LIST_MECHANISMS))
+  else if (HAVE_OPT(LIST_MECHANISMS))
     action = ACTION_PKCS11_MECHANISMS;
-  else if (ENABLED_OPT(LIST_ALL))
+  else if (HAVE_OPT(LIST_ALL))
     {
       pkcs11_type = PKCS11_TYPE_ALL;
       action = ACTION_PKCS11_LIST;
     }
-  else if (ENABLED_OPT(LIST_ALL_CERTS))
+  else if (HAVE_OPT(LIST_ALL_CERTS))
     {
       pkcs11_type = PKCS11_TYPE_CRT_ALL;
       action = ACTION_PKCS11_LIST;
     }
-  else if (ENABLED_OPT(LIST_CERTS))
+  else if (HAVE_OPT(LIST_CERTS))
     {
       pkcs11_type = PKCS11_TYPE_PK;
       action = ACTION_PKCS11_LIST;
     }
-  else if (ENABLED_OPT(LIST_ALL_PRIVKEYS))
+  else if (HAVE_OPT(LIST_ALL_PRIVKEYS))
     {
       pkcs11_type = PKCS11_TYPE_PRIVKEY;
       action = ACTION_PKCS11_LIST;
     }
-  else if (ENABLED_OPT(LIST_ALL_TRUSTED))
+  else if (HAVE_OPT(LIST_ALL_TRUSTED))
     {
       pkcs11_type = PKCS11_TYPE_TRUSTED;
       action = ACTION_PKCS11_LIST;
     }
-  else if (ENABLED_OPT(EXPORT))
+  else if (HAVE_OPT(EXPORT))
     {
       action = ACTION_PKCS11_EXPORT_URL;
     }
-  else if (ENABLED_OPT(WRITE))
+  else if (HAVE_OPT(WRITE))
     action = ACTION_PKCS11_WRITE_URL;
-  else if (ENABLED_OPT(INITIALIZE))
+  else if (HAVE_OPT(INITIALIZE))
     action = ACTION_PKCS11_TOKEN_INIT;
-  else if (ENABLED_OPT(DELETE))
+  else if (HAVE_OPT(DELETE))
     action = ACTION_PKCS11_DELETE_URL;
-  else if (ENABLED_OPT(GENERATE_ECC))
+  else if (HAVE_OPT(GENERATE_ECC))
     {
       key_type = GNUTLS_PK_EC;
       action = ACTION_PKCS11_GENERATE;
     }
-  else if (ENABLED_OPT(GENERATE_RSA))
+  else if (HAVE_OPT(GENERATE_RSA))
     {
       key_type = GNUTLS_PK_RSA;
       action = ACTION_PKCS11_GENERATE;
     }
-  else if (ENABLED_OPT(GENERATE_DSA))
+  else if (HAVE_OPT(GENERATE_DSA))
     {
       key_type = GNUTLS_PK_DSA;
       action = ACTION_PKCS11_GENERATE;
@@ -209,22 +209,22 @@ cmd_parser (int argc, char **argv)
   if (ENABLED_OPT(LOGIN))
     login = 1;
 
-  if (ENABLED_OPT(URL))
+  if (HAVE_OPT(URL))
     {
       url = OPT_ARG(URL);
     }
 
-  if (ENABLED_OPT(LABEL))
+  if (HAVE_OPT(LABEL))
     {
       label = OPT_ARG(LABEL);
     }
 
-  if (ENABLED_OPT(BITS))
+  if (HAVE_OPT(BITS))
     {
       bits = OPT_VALUE_BITS;
     }
 
-  if (ENABLED_OPT(SEC_PARAM))
+  if (HAVE_OPT(SEC_PARAM))
     {
       sec_param = OPT_ARG(SEC_PARAM);
     }
diff --git a/src/psk-args.def.in b/src/psk-args.def.in
index a3921d2..96fb92b 100644
--- a/src/psk-args.def.in
+++ b/src/psk-args.def.in
@@ -7,6 +7,7 @@ keys are stored in hexadecimal format in a key file.";
 short-usage   = "psktool [options]\npsktool --help for usage instructions.\n";
 prog-group    = "GnuTLS";
 gnu-usage;
+no-xlate = opt;
 no-misuse-usage;
 disable-save;
 long-opts;
diff --git a/src/serv-args.def.in b/src/serv-args.def.in
index 711614f..1a5d471 100644
--- a/src/serv-args.def.in
+++ b/src/serv-args.def.in
@@ -6,6 +6,7 @@ short-usage   = "Usage: gnutls-serv [options]\ngnutls-serv 
--help for usage inst
 prog-group    = "GnuTLS";
 detail        = "Server program that listens to incoming TLS connections.";
 gnu-usage;
+no-xlate = opt;
 no-misuse-usage;
 disable-save;
 long-opts;
@@ -253,7 +254,6 @@ flag = {
 flag = {
     name      = list;
     value     = l;
-    arg-type  = string;
     descrip   = "Print a list of the supported algorithms and modes";
     doc      = "Print a list of the supported algorithms and modes. If a 
priority string is given then only the enabled ciphersuites are shown.";
 };
diff --git a/src/serv.c b/src/serv.c
index 7d87ce2..92fafe5 100644
--- a/src/serv.c
+++ b/src/serv.c
@@ -79,6 +79,7 @@ const char *x509_ecccertfile = NULL;
 const char *x509_cafile = NULL;
 const char *dh_params_file = NULL;
 const char *x509_crlfile = NULL;
+const char * priorities = NULL;
 
 gnutls_datum_t session_ticket_key;
 static void tcp_server(const char* name, int port);
@@ -331,13 +332,9 @@ gnutls_session_t initialize_session (int dtls)
 {
   gnutls_session_t session;
   const char *err;
-  const char * priorities;
 
-  if (HAVE_OPT(PRIORITY)) {
-    priorities = OPT_ARG(PRIORITY);
-  } else {
+  if (priorities == NULL)
     priorities = "NORMAL";
-  }
 
   if (dtls)
     gnutls_init (&session, GNUTLS_SERVER|GNUTLS_DATAGRAM);
@@ -926,7 +923,7 @@ main (int argc, char **argv)
   if (nodb == 0)
     wrap_db_init ();
 
-  if (ENABLED_OPT(UDP))
+  if (HAVE_OPT(UDP))
     strcpy(name, "UDP ");
   else name[0] = 0;
 
@@ -1021,9 +1018,9 @@ main (int argc, char **argv)
         }
     }
 
-  if (ENABLED_OPT(PGPCERTFILE))
+  if (HAVE_OPT(PGPCERTFILE))
     {
-      if (ENABLED_OPT(PGPSUBKEY))
+      if (HAVE_OPT(PGPSUBKEY))
         ret = gnutls_certificate_set_openpgp_key_file2
           (cert_cred, pgp_certfile, pgp_keyfile, OPT_ARG(PGPSUBKEY),
            GNUTLS_OPENPGP_FMT_BASE64);
@@ -1112,7 +1109,7 @@ main (int argc, char **argv)
           GERR (ret);
         }
 
-      if (ENABLED_OPT(PSKHINT))
+      if (HAVE_OPT(PSKHINT))
         {
           ret = gnutls_psk_set_server_credentials_hint (psk_cred,
                                                         OPT_ARG(PSKHINT));
@@ -1139,16 +1136,16 @@ main (int argc, char **argv)
     gnutls_session_ticket_key_generate (&session_ticket_key);
 #endif
 
-  if (ENABLED_OPT(MTU))
+  if (HAVE_OPT(MTU))
     mtu = OPT_VALUE_MTU;
   else mtu = 1300;
 
-  if (ENABLED_OPT(PORT))
+  if (HAVE_OPT(PORT))
     port = OPT_VALUE_PORT;
   else
     port = 5556;
 
-  if (ENABLED_OPT(UDP))
+  if (HAVE_OPT(UDP))
     udp_server(name, port, mtu);
   else
     tcp_server(name, port);
@@ -1546,66 +1543,75 @@ static void cmd_parser (int argc, char **argv)
 {
   optionProcess( &gnutls_servOptions, argc, argv);
 
-  disable_client_cert = ENABLED_OPT(DISABLE_CLIENT_CERT);
-  require_cert = ENABLED_OPT(REQUIRE_CLIENT_CERT);
-  if (ENABLED_OPT(DEBUG))
+  disable_client_cert = HAVE_OPT(DISABLE_CLIENT_CERT);
+  require_cert = HAVE_OPT(REQUIRE_CLIENT_CERT);
+  if (HAVE_OPT(DEBUG))
     debug = OPT_VALUE_DEBUG;
 
-  if (ENABLED_OPT(QUIET))
+  if (HAVE_OPT(QUIET))
     verbose = 0;
 
-  nodb = ENABLED_OPT(NODB);
-  noticket = ENABLED_OPT(NOTICKET);
+  if (HAVE_OPT(PRIORITY)) 
+    priorities = OPT_ARG(PRIORITY);
+  
+  if (HAVE_OPT(LIST))
+    {
+      print_list(priorities, verbose);
+      exit(0);
+    }
+
+  nodb = HAVE_OPT(NODB);
+  noticket = HAVE_OPT(NOTICKET);
 
-  if (ENABLED_OPT(ECHO))
+  if (HAVE_OPT(ECHO))
     http = 0;
   else http = 1;
 
-  if (ENABLED_OPT(X509FMTDER))
+  if (HAVE_OPT(X509FMTDER))
     x509ctype = GNUTLS_X509_FMT_DER;
   else
     x509ctype = GNUTLS_X509_FMT_PEM;
 
-  generate = ENABLED_OPT(GENERATE);
+  generate = HAVE_OPT(GENERATE);
 
-  if (ENABLED_OPT(DHPARAMS))
+  if (HAVE_OPT(DHPARAMS))
     dh_params_file = OPT_ARG(DHPARAMS);
 
-  if (ENABLED_OPT(X509KEYFILE))
+  if (HAVE_OPT(X509KEYFILE))
     x509_keyfile = OPT_ARG(X509KEYFILE);
-  if (ENABLED_OPT(X509CERTFILE))
+  if (HAVE_OPT(X509CERTFILE))
     x509_certfile = OPT_ARG(X509CERTFILE);
 
-  if (ENABLED_OPT(X509DSAKEYFILE))
+  if (HAVE_OPT(X509DSAKEYFILE))
     x509_dsakeyfile = OPT_ARG(X509DSAKEYFILE);
-  if (ENABLED_OPT(X509DSACERTFILE))
+  if (HAVE_OPT(X509DSACERTFILE))
     x509_dsacertfile = OPT_ARG(X509DSACERTFILE);
 
 
-  if (ENABLED_OPT(X509ECCKEYFILE))
+  if (HAVE_OPT(X509ECCKEYFILE))
     x509_ecckeyfile = OPT_ARG(X509ECCKEYFILE);
-  if (ENABLED_OPT(X509CERTFILE))
+  if (HAVE_OPT(X509CERTFILE))
     x509_ecccertfile = OPT_ARG(X509ECCCERTFILE);
   
-  if (ENABLED_OPT(X509CAFILE))
+  if (HAVE_OPT(X509CAFILE))
     x509_cafile = OPT_ARG(X509CAFILE);
-  if (ENABLED_OPT(X509CRLFILE))
+  if (HAVE_OPT(X509CRLFILE))
     x509_crlfile = OPT_ARG(X509CRLFILE);
 
-  if (ENABLED_OPT(PGPKEYFILE))
+  if (HAVE_OPT(PGPKEYFILE))
     pgp_keyfile = OPT_ARG(PGPKEYFILE);
-  if (ENABLED_OPT(PGPCERTFILE))
+  if (HAVE_OPT(PGPCERTFILE))
     pgp_certfile = OPT_ARG(PGPCERTFILE);
 
-  if (ENABLED_OPT(PGPKEYRING))
+  if (HAVE_OPT(PGPKEYRING))
     pgp_keyring = OPT_ARG(PGPKEYRING);
 
-  if (ENABLED_OPT(SRPPASSWD))
+  if (HAVE_OPT(SRPPASSWD))
     srp_passwd = OPT_ARG(SRPPASSWD);
-  if (ENABLED_OPT(SRPPASSWDCONF))
+  if (HAVE_OPT(SRPPASSWDCONF))
     srp_passwd_conf = OPT_ARG(SRPPASSWDCONF);
 
-  if (ENABLED_OPT(PSKPASSWD))
+  if (HAVE_OPT(PSKPASSWD))
     psk_passwd = OPT_ARG(PSKPASSWD);
 
 }
diff --git a/src/srptool-args.def.in b/src/srptool-args.def.in
index f355e37..7d7fc6c 100644
--- a/src/srptool-args.def.in
+++ b/src/srptool-args.def.in
@@ -12,6 +12,7 @@ configuration file to hold the group parameters (called 
tpasswd.conf).";
 
 short-usage   = "srptool [options]\nsrptool --help for usage instructions.\n";
 prog-group    = "GnuTLS";
+no-xlate = opt;
 gnu-usage;
 no-misuse-usage;
 disable-save;


hooks/post-receive
-- 
GNU gnutls



reply via email to

[Prev in Thread] Current Thread [Next in Thread]