zsh-workers
 help / color / mirror / code / Atom feed
From: Oliver Kiddle <okiddle@yahoo.co.uk>
To: Zsh workers <zsh-workers@zsh.org>
Subject: PATCH: update gnutls completion to 3.6.1
Date: Sun, 29 Oct 2017 22:44:00 +0100	[thread overview]
Message-ID: <979.1509313440@thecus.kiddle.eu> (raw)

Just a bunch of option changes.

Oliver

diff --git a/Completion/Unix/Command/_gnutls b/Completion/Unix/Command/_gnutls
index 0b307d9b7..2cd559843 100644
--- a/Completion/Unix/Command/_gnutls
+++ b/Completion/Unix/Command/_gnutls
@@ -35,16 +35,21 @@ case "$service" in
       '--priority=[specify TLS algorithms and protocols to enable]:(NORMAL PFS SECURE128 SECURE192 SUITEB128 SUITEB192 LEGACY PERFORMANCE NONE)'
       '--x509cafile=[specify certificate file to use]:file:_files'
       '--x509crlfile=[specify CRL file to use]:file:_files'
-      '--pgpkeyfile=[specify PGP key file to use]:file:_files'
-      '--pgpkeyring=[specify PGP key ring file to use]:file:_files'
-      '--pgpcertfile=[specify PGP public key (certificate) file to use]:file:_files'
-      '--x509keyfile=[specify X.509 key file to use]:file:_files'
-      '--x509certfile=[specify X.509 certificate file to use]:file:_files'
-      '--pgpsubkey=[specify PGP subkey to use]:sub key'
+      '*--x509keyfile=[specify X.509 key file to use]:file:_files'
+      '*--x509certfile=[specify X.509 certificate file to use]:file:_files'
       '(-l --list -p --port)'{-l,--list}'[print list of the supported algorithms/modes]'
+    )
+  ;|
+  gnutls-cli|gnutls-serv|certtool)
+    args+=(
       '--provider=[specify PKCS #11 provider library]:provider:_files'
     )
   ;|
+  gnutls-cli|certtool)
+    args+=(
+      '--verify-allow-broken[allow broken algorithms, such as MD5 for certificate verification]'
+    )
+  ;|
 
   gnutls-cli)
     args+=(
@@ -59,10 +64,11 @@ case "$service" in
       '(-s --starttls)'{-s,--starttls}'[start TLS on EOF or SIGALRM]'
       '--crlf[send CR LF instead of LF]'
       '--fastopen[enable TCP Fast Open]'
-      '(-f --fingerprint)'{-f,--fingerprint}'[send the openpgp fingerprint instead of the key]'
       "--print-cert[print peer's certificate in PEM format]"
       "--save-cert=[save peer's certificate chain in the specified file in PEM format]:file:_files"
       "--save-ocsp=[save peer's OCSP status response in the provided file]:file:_files"
+      '--save-server-trace=[save the server-side TLS message trace in the provided file]:file:_files'
+      '--save-client-trace=[save the client-side TLS message trace in the provided file]:file:_files'
       '--dh-bits=[specify minimum number of bits allowed for DH]:bits'
       '--srpusername[specify SRP username to use]:username'
       '--srppasswd[specify SRP password to use]:password'
@@ -88,6 +94,8 @@ case "$service" in
   gnutls-serv)
     args+=(
       '--sni-hostname-fatal[send fatal alert on sni-hostname mismatch]'
+      '*--alpn=[specify ALPN protocol to be enabled by the server]:protocol'
+      '--alpn-fatal[send fatal alert on non-matching ALPN name]'
       '(-g --generate)'{-g,--generate}'[generate Diffie-Hellman parameters]'
       '(-q --quiet)'{-q,--quiet}'[suppress some messages]'
       "--nodb[don't use a resumption database]"
@@ -97,10 +105,6 @@ case "$service" in
       '(-r --require-client-cert)'{-r,--require-client-cert}'[require a client certificate]'
       '--verify-client-cert[if a client certificate is sent then verify it]'
       '--dhparams=[specify DH params file to use]:file:_files'
-      '--x509dsakeyfile=[specify alternative X.509 key file to use]:file:_files'
-      '--x509dsacertfile=[specify alternative X.509 certificate file to use]:file:_files'
-      '--x509ecckeyfile=[specify alternative X.509 key file to use]:file:_files'
-      '--x509ecccertfile=[specify alternative X.509 certificate file to use]:file:_files'
       '--srppasswd=[specify SRP password file to use]:file:_files'
       '--srppasswdconf=[specify SRP password configuration file to use]:file:_files'
       '--pskpasswd=[specify PSK password file to use]:file:_files'
@@ -111,18 +115,31 @@ case "$service" in
 
   certtool)
     args+=(
-      '--infile:input file:_files '
+      '(-q --generate-request)--infile:input file:_files '
       '--outfile:output file:_files '
       '(-s --generate-self-signed)'{-s,--generate-self-signed}'[generate a self-signed certificate]'
       '(-c --generate-certificate)'{-c,--generate-certificate}'[generate a signed certificate]'
       '--generate-proxy[generate a proxy certificate]'
       '--generate-crl[generate a CRL]'
       '(-u --update-certificate)'{-u,--update-certificate}'[update a signed certificate]'
+      '--fingerprint[print the fingerprint of the given certificate]'
+      '--key-id[print the key ID of the given certificate]'
+      '--v1[generate an X.509 version 1 certificate (with no extensions)]'
+      '--sign-params=[sign a certificate with a specific signature algorithm]:algorithm:(RSA-PSS)'
       '(-p --generate-privkey)'{-p,--generate-privkey}'[generate a private key]'
-      '(-q --generate-request)'{-q,--generate-request}'[generate a PKCS #10 certificate request]'
+      '(-q --generate-request --infile)'{-q,--generate-request}'[generate a PKCS #10 certificate request]'
       '(-e --verify-chain)'{-e,--verify-chain}'[verify a PEM encoded certificate chain]'
       '--verify[verify a PEM encoded certificate chain using a trusted list]'
       '--verify-crl[verify a CRL]'
+      '(--verify-email)--verify-hostname=[specify hostname to be used for certificate chain verification]:hostname:_hosts'
+      '(--verify-hostname)--verify-email=[specify email to be used for certificate chain verification]:email:_email_addresses'
+      '--verify-purpose=[specify a purpose OID to be used for certificate chain verification]'
+      '--p7-sign[sign using a PKCS #7 structure]'
+      '--p7-detached-sign[sign using a detached PKCS #7 structure]'
+      "--no-p7-include-cert[don't include signer's certificate will in the cert list]"
+      '--p7-time[include a timestamp in the PKCS #7 structure]'
+      '--p7-show-data[show embedded data in the PKCS #7 structure]'
+      '--p7-verify[verify the provided PKCS #7 structure]'
       '--generate-dh-params[generate PKCS #3 encoded Diffie Hellman parameters]'
       '--get-dh-params[get the included PKCS #3 encoded Diffie Hellman parameters]'
       '--dh-info[print information PKCS #3 encoded Diffie-Hellman parameters]'
@@ -132,36 +149,44 @@ case "$service" in
       '--load-certificate:certificate file:_files'
       '--load-ca-privkey:certificate authority private key file:_files'
       '--load-ca-certificate:certificate authority certificate file:_files'
-      '--password:password'
+      '--load-crl=[load the provided CRL]:CRL'
+      '--load-data=[load auxiliary data]:data'
+      '--password=[specify password to use]:password'
       '--hex-numbers[big number in an easier format to parse]'
       '--cprint[prints certain information is C-friendly format]'
       '--null-password[enforce a NULL password]'
       '--empty-password[enforce an empty password]'
+      '--key-type=[specify the key type to use on key generation]:key type'
       '(-i --certificate-info)'{-i,--certificate-info}'[print information on a certificate]'
       '--certificate-pubkey[print certificate public key]'
       '(-l --crl-info)'{-l,--crl-info}'[print information on a CRL]'
       '--crq-info[print information on a certificate request]'
       "--no-crq-extensions[don't use extensions in certificate requests]"
       '--p12-info[print information on a PKCS #12 structure]'
+      '--p12-name=[specify PKCS #12 friendly name to use]:name'
       '--p7-info[print information on a PKCS #7 structure]'
       '--smime-to-p7[convert S/MIME to PKCS #7 structure]'
       '(-k --key-info)'{-k,--key-info}'[print information on a private key]'
-      '--pgp-key-info[print information on a OpenPGP private key]'
+      '--p8-info[print information on a PKCS #8 structure]'
+      '--to-rsa[convert an RSA-PSS key to raw RSA format]'
+      '--bits=[specify number of bits for key generation]:bits'
+      '--curve=[specify the curve used for EC key generation]:curve'
+      '--sec-param=[specify the security level]:security level:(low legacy medium high ultra)'
+      '--to-p8[convert a given key to a PKCS #8 structure]'
+      '--provable[generate a private key or parameters from a seed using a provable method]'
+      '--verify-provable-privkey[verify a private key generated from a seed using a provable method]'
+      '--seed=[when generating a private key use the given seed]:seed (hex-encoded)'
       '--pubkey-info[print information on a public key]'
-      '--fix-key[regenerate the parameters in a private key]'
       '--to-p12[generate a PKCS #12 structure]'
       '(-8 --pkcs8)'{-8,--pkcs8}'[use PKCS #8 format for private keys]'
-      '--dsa[use DSA keys]'
-      '--hash:hash algorithm for signing:(MD5 SHA1 RMD160)'
-      '--export-ciphers[use weak encryption algorithms]'
-      '--inder[use DER format for input certificates and private keys]'
-      '--xml[use XML format for output certificates]'
-      '--outder[use DER format for output certificates and private keys]'
-      '--bits:number of bits for key generation'
-      '--sec-param[specify the security level]:security level:(low normal high ultra)'
-      '--disable-quick-random[use /dev/random for key generation, thus increasing the quality of randomness used]'
-      '--template:template file to use for non-interactive operation:_files'
-      '--pkcs-cipher[specify cipher to use for pkcs operations]:cipher:(3des 3des-pkcs12 aes-128 aes-192 aes-256 rc2-40 arcfour)'
+      '--hash=[specify hash algorithm for signing]:algorithm:(MD5 SHA1 RMD160)'
+      '--salt-size=[specify the RSA-PSS key default salt size]:size'
+      {--inder,--inraw}'[use DER format for input certificates and private keys]'
+      {--outder,--outraw}'[use DER format for output certificates and private keys]'
+      '--template=[specify template file to use for non-interactive operation]:file:_files'
+      '--stdout-info[print information to stdout instead of stderr]'
+      '--ask-pass[enable interaction for entering password when in batch mode]'
+      '--pkcs-cipher=[specify cipher to use for pkcs operations]:cipher:(3des 3des-pkcs12 aes-128 aes-192 aes-256 rc2-40 arcfour)'
     )
   ;;
 


                 reply	other threads:[~2017-10-30  1:39 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=979.1509313440@thecus.kiddle.eu \
    --to=okiddle@yahoo.co.uk \
    --cc=zsh-workers@zsh.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/zsh/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).