Use "Fl Fl" for long options.

Signed-off-by: Love Hornquist Astrand <lha@h5l.org>
This commit is contained in:
Thomas Klausner
2011-05-21 18:42:36 +02:00
committed by Love Hornquist Astrand
parent 05a432aaed
commit db8e287e41
35 changed files with 588 additions and 588 deletions

View File

@@ -40,27 +40,27 @@
obtain AFS tokens
.Sh SYNOPSIS
.Nm
.Op Fl h | Fl -help
.Op Fl -no-v4
.Op Fl -no-v5
.Op Fl u | Fl -unlog
.Op Fl v | Fl -verbose
.Op Fl -version
.Op Fl h | Fl Fl help
.Op Fl Fl no-v4
.Op Fl Fl no-v5
.Op Fl u | Fl Fl unlog
.Op Fl v | Fl Fl verbose
.Op Fl Fl version
.Oo Fl c Ar cell \*(Ba Xo
.Fl -cell= Ns Ar cell
.Fl Fl cell= Ns Ar cell
.Xc
.Oc
.Oo Fl k Ar realm \*(Ba Xo
.Fl -realm= Ns Ar realm
.Fl Fl realm= Ns Ar realm
.Xc
.Oc
.Oo Fl P Ar principal \*(Ba Xo
.Fl -principal= Ns Ar principal
.Fl Fl principal= Ns Ar principal
.Xc
.Oc
.Bk -words
.Oo Fl p Ar path \*(Ba Xo
.Fl -file= Ns Ar path
.Fl Fl file= Ns Ar path
.Xc
.Oc
.Ek
@@ -77,51 +77,51 @@ decides upon.
.Pp
Supported options:
.Bl -tag -width Ds
.It Fl -no-v4
.It Fl Fl no-v4
This makes
.Nm
not try using Kerberos 4.
.It Fl -no-v5
.It Fl Fl no-v5
This makes
.Nm
not try using Kerberos 5.
.It Xo
.Fl P Ar principal ,
.Fl -principal Ar principal
.Fl Fl principal Ar principal
.Xc
select what Kerberos 5 principal to use.
.It Fl -cache Ar cache
.It Fl Fl cache Ar cache
select what Kerberos 5 credential cache to use.
.Fl -principal
.Fl Fl principal
overrides this option.
.It Xo
.Fl u ,
.Fl -unlog
.Fl Fl unlog
.Xc
Destroy tokens instead of obtaining new. If this is specified, all
other options are ignored (except for
.Fl -help
.Fl Fl help
and
.Fl -version ) .
.Fl Fl version ) .
.It Xo
.Fl v ,
.Fl -verbose
.Fl Fl verbose
.Xc
Adds more verbosity for what is actually going on.
.It Xo
.Fl c Ar cell,
.Fl -cell= Ns Ar cell
.Fl Fl cell= Ns Ar cell
.Xc
This specified one or more cell names to get tokens for.
.It Xo
.Fl k Ar realm ,
.Fl -realm= Ns Ar realm
.Fl Fl realm= Ns Ar realm
.Xc
This is the Kerberos realm the AFS servers live in, this should
normally not be specified.
.It Xo
.Fl p Ar path ,
.Fl -file= Ns Ar path
.Fl Fl file= Ns Ar path
.Xc
This specified one or more file paths for which tokens should be
obtained.

View File

@@ -41,9 +41,9 @@ creates a new credential cache sandbox
.Sh SYNOPSIS
.Nm
.Op Fl c Ar command-string
.Op Fl h | Fl -help
.Op Fl -version
.Op Fl -cache-type= Ns Ar string
.Op Fl h | Fl Fl help
.Op Fl Fl version
.Op Fl Fl cache-type= Ns Ar string
.Ar command [args...]
.Sh DESCRIPTION
Supported options:
@@ -54,14 +54,14 @@ Executes command(s) contained in
.Ar command-string .
.Xc
.It Xo
.Fl -cache-type= Ns Ar string
.Fl Fl cache-type= Ns Ar string
.Xc
.It Xo
.Fl h ,
.Fl -help
.Fl Fl help
.Xc
.It Xo
.Fl -version
.Fl Fl version
.Xc
.El
.Pp
@@ -75,7 +75,7 @@ the credential cache type that was used at the time of
.Nm
invocation.
The credential cache type can be controlled by the option
.Fl -cache-type .
.Fl Fl cache-type .
.Sh EXAMPLES
Create a new sandbox where new credentials can be used, while the old
credentials can be used by other processes.

View File

@@ -53,8 +53,8 @@ file transfer program
.Op Fl t
.Op Fl v
.Op Fl x
.Op Fl -no-gss-bindings
.Op Fl -no-gss-delegate
.Op Fl Fl no-gss-bindings
.Op Fl Fl no-gss-delegate
.Op Ar host
.Sh DESCRIPTION
.Nm
@@ -103,10 +103,10 @@ Turn on passive mode.
Enables debugging.
.It Fl g
Disables file name globbing.
.It Fl -no-gss-bindings
.It Fl Fl no-gss-bindings
Don't use GSS-API bindings when talking to peer. IP addresses will not
be checked to ensure they match.
.It Fl -no-gss-delegate
.It Fl Fl no-gss-delegate
Disable delegation of GSSAPI credentials.
.It Fl l
Disables command line editing.

View File

@@ -47,11 +47,11 @@
.Op Fl p Ar port
.Op Fl T Ar maxtimeout
.Op Fl t Ar timeout
.Op Fl -gss-bindings
.Op Fl I | Fl -no-insecure-oob
.Op Fl Fl gss-bindings
.Op Fl I | Fl Fl no-insecure-oob
.Op Fl u Ar default umask
.Op Fl B | Fl -builtin-ls
.Op Fl -good-chars= Ns Ar string
.Op Fl B | Fl Fl builtin-ls
.Op Fl Fl good-chars= Ns Ar string
.Sh DESCRIPTION
.Nm Ftpd
is the
@@ -101,7 +101,7 @@ Debugging information is written to the syslog using LOG_FTP.
.It Fl g
Anonymous users will get a umask of
.Ar umask .
.It Fl -gss-bindings
.It Fl Fl gss-bindings
require the peer to use GSS-API bindings (ie make sure IP addresses match).
.It Fl i
Open a socket and wait for a connection. This is mainly used for
@@ -144,16 +144,16 @@ revert to the old behavior.
Verbose mode.
.It Xo
.Fl B ,
.Fl -builtin-ls
.Fl Fl builtin-ls
.Xc
use built-in ls to list files
.It Xo
.Fl -good-chars= Ns Ar string
.Fl Fl good-chars= Ns Ar string
.Xc
allowed anonymous upload filename chars
.It Xo
.Fl I
.Fl -no-insecure-oob
.Fl Fl no-insecure-oob
.Xc
don't allow insecure out of band.
Heimdal ftp clients before 0.6.3 doesn't support secure oob, so turning

View File

@@ -41,20 +41,20 @@
.Nm
.Oo
.Fl p Ar port |
.Fl -port Ns = Ns Ar port
.Fl Fl port Ns = Ns Ar port
.Oc
.Oo
.Fl l Ar login |
.Fl -login Ns = Ns Ar login
.Fl Fl login Ns = Ns Ar login
.Oc
.Oo
.Fl c Ar ccache |
.Fl -ccache Ns = Ns Ar ccache
.Fl Fl ccache Ns = Ns Ar ccache
.Oc
.Op Fl F | -forwardable
.Op Fl G | -no-forwardable
.Op Fl h | -help
.Op Fl -version
.Op Fl Fl version
.Ar host ...
.Sh DESCRIPTION
The
@@ -65,17 +65,17 @@ Options supported are:
.Bl -tag -width indent
.It Xo
.Fl p Ar port ,
.Fl -port Ns = Ns Ar port
.Fl Fl port Ns = Ns Ar port
.Xc
port to connect to
.It Xo
.Fl l Ar login ,
.Fl -login Ns = Ns Ar login
.Fl Fl login Ns = Ns Ar login
.Xc
remote login name
.It Xo
.Fl c Ar ccache ,
.Fl -ccache Ns = Ns Ar ccache
.Fl Fl ccache Ns = Ns Ar ccache
.Xc
remote cred cache
.It Fl F , -forwardable
@@ -83,7 +83,7 @@ forward forwardable credentials
.It Fl G , -no-forwardable
do not forward forwardable credentials
.It Fl h , -help
.It Fl -version
.It Fl Fl version
.El
.Pp
.Nm
@@ -94,7 +94,7 @@ In order for
.Nm
to work you will need to acquire your initial ticket with forwardable
flag, i.e.
.Nm kinit Fl -forwardable .
.Nm kinit Fl Fl forwardable .
.Pp
.Nm telnet
is able to forward tickets by itself.

View File

@@ -41,15 +41,15 @@
.Nm
.Oo
.Fl p Ar port |
.Fl -port Ns = Ns Ar port
.Fl Fl port Ns = Ns Ar port
.Oc
.Op Fl i | -inetd
.Oo
.Fl R Ar regpag |
.Fl -regpag Ns = Ns Ar regpag
.Fl Fl regpag Ns = Ns Ar regpag
.Oc
.Op Fl h | -help
.Op Fl -version
.Op Fl Fl version
.Sh DESCRIPTION
This is the daemon for
.Xr kf 1 .
@@ -57,14 +57,14 @@ Supported options:
.Bl -tag -width indent
.It Xo
.Fl p Ar port ,
.Fl -port Ns = Ns Ar port
.Fl Fl port Ns = Ns Ar port
.Xc
port to listen to
.It Fl i , -inetd
not started from inetd
.It Xo
.Fl R Ar regpag ,
.Fl -regpag= Ns Ar regpag
.Fl Fl regpag= Ns Ar regpag
.Xc
path to regpag binary
.El

View File

@@ -47,7 +47,7 @@ POP3 server
.Op Fl d
.Op Fl i
.Op Fl p Ar port
.Op Fl -address-log= Ns Pa file
.Op Fl Fl address-log= Ns Pa file
.Sh DESCRIPTION
.Nm
serves mail via the Post Office Protocol. Supported options include:
@@ -60,7 +60,7 @@ which authentication mode is acceptable,
enables SASL (RFC2222), and
.Ar otp
enables OTP (RFC1938) authentication. Both disable plaintext passwords.
.It Fl -address-log= Ns Pa file
.It Fl Fl address-log= Ns Pa file
Logs the addresses (along with a timestamp) of all clients to the
specified file. This can be used to implement POP-before-SMTP
authentication.

View File

@@ -39,13 +39,13 @@
.Nd "fetch a list of the current mail via POP"
.Sh SYNOPSIS
.Nm
.Op Fl 4 | Fl -krb4
.Op Fl 5 | Fl -krb5
.Op Fl v | Fl -verbose
.Op Fl 4 | Fl Fl krb4
.Op Fl 5 | Fl Fl krb5
.Op Fl v | Fl Fl verbose
.Op Fl c | -count
.Op Fl -header
.Op Fl Fl header
.Oo Fl p Ar port-spec \*(Ba Xo
.Fl -port= Ns Ar port-spec
.Fl Fl port= Ns Ar port-spec
.Xc
.Oc
.Sh DESCRIPTION

View File

@@ -8,15 +8,15 @@
.Nd fetch mail via POP
.Sh SYNOPSIS
.Nm
.Op Fl 5 | Fl -krb5
.Op Fl v | Fl -verbose
.Op Fl f | Fl -fork
.Op Fl 5 | Fl Fl krb5
.Op Fl v | Fl Fl verbose
.Op Fl f | Fl Fl fork
.Op Fl l | -leave
.Op Fl -from
.Op Fl Fl from
.Op Fl c | -count
.Op Fl -headers Ns = Ns Ar headers
.Op Fl Fl headers Ns = Ns Ar headers
.Oo Fl p Ar port-spec \*(Ba Xo
.Fl -port Ns = Ns Ar port-spec
.Fl Fl port Ns = Ns Ar port-spec
.Xc
.Oc
.Ar po-box
@@ -51,35 +51,35 @@ Supported options:
.Bl -tag -width Ds
.It Xo
.Fl 5 ,
.Fl -krb5
.Fl Fl krb5
.Xc
use Kerberos 5 (if compiled with support for Kerberos 5)
.It Xo
.Fl f ,
.Fl -fork
.Fl Fl fork
.Xc
fork before starting to delete messages
.It Xo
.Fl l ,
.Fl -leave
.Fl Fl leave
.Xc
don't delete fetched mail
.It Xo
.Fl -from
.Fl Fl from
.Xc
behave like from.
.It Xo
.Fl c ,
.Fl -count
.Fl Fl count
.Xc
first print how many messages and bytes there are.
.It Xo
.Fl -headers Ns = Ns Ar headers
.Fl Fl headers Ns = Ns Ar headers
.Xc
a list of comma-separated headers that should get printed.
.It Xo
.Fl p Ar port-spec ,
.Fl -port Ns = Ns Ar port-spec
.Fl Fl port Ns = Ns Ar port-spec
.Xc
use this port instead of the default
.Ql kpop

View File

@@ -63,7 +63,7 @@ Valid options are:
.Bl -tag -width Ds
.It Xo
.Fl 4 ,
.Fl -krb4
.Fl Fl krb4
.Xc
The
.Fl 4
@@ -72,7 +72,7 @@ authentication mechanisms will be tried, but in some cases more
explicit control is desired.
.It Xo
.Fl 5 ,
.Fl -krb5
.Fl Fl krb5
.Xc
The
.Fl 5
@@ -81,7 +81,7 @@ option requests Kerberos 5 authentication. This is analogous to the
option.
.It Xo
.Fl K ,
.Fl -broken
.Fl Fl broken
.Xc
The
.Fl K
@@ -90,7 +90,7 @@ mode relies on reserved ports. The long name is an indication of how
good this is.
.It Xo
.Fl n ,
.Fl -no-input
.Fl Fl no-input
.Xc
The
.Fl n
@@ -105,13 +105,13 @@ Enable
socket debugging.
.It Xo
.Fl e ,
.Fl -no-stderr
.Fl Fl no-stderr
.Xc
Don't use a separate socket for the stderr stream. This can be
necessary if rsh-ing through a NAT bridge.
.It Xo
.Fl x ,
.Fl -encrypt
.Fl Fl encrypt
.Xc
The
.Fl x
@@ -132,7 +132,7 @@ section of
when using Kerberos 5.
.It Xo
.Fl f ,
.Fl -forward
.Fl Fl forward
.Xc
Forward Kerberos 5 credentials to the remote host.
Also settable via
@@ -141,7 +141,7 @@ Also settable via
.Xr krb5.conf ) .
.It Xo
.Fl F ,
.Fl -forwardable
.Fl Fl forwardable
.Xc
Make the forwarded credentials re-forwardable.
Also settable via
@@ -150,7 +150,7 @@ Also settable via
.Xr krb5.conf ) .
.It Xo
.Fl l Ar string ,
.Fl -user= Ns Ar string
.Fl Fl user= Ns Ar string
.Xc
By default the remote username is the same as the local. The
.Fl l
@@ -159,7 +159,7 @@ option or the
format allow the remote name to be specified.
.It Xo
.Fl n ,
.Fl -no-input
.Fl Fl no-input
.Xc
Direct input from
.Pa /dev/null
@@ -168,7 +168,7 @@ Direct input from
section).
.It Xo
.Fl p Ar number-or-service ,
.Fl -port= Ns Ar number-or-service
.Fl Fl port= Ns Ar number-or-service
.Xc
Connect to this port instead of the default (which is 514 when using
old port based authentication, 544 for Kerberos 5 and non-encrypted
@@ -177,7 +177,7 @@ the contents of
.Pa /etc/services ) .
.It Xo
.Fl P Ar N|O|1|2 ,
.Fl -protocol= Ns Ar N|O|1|2
.Fl Fl protocol= Ns Ar N|O|1|2
.Xc
Specifies the protocol version to use with Kerberos 5.
.Ar N
@@ -193,20 +193,20 @@ default. Unless asked for a specific version,
will try both. This behaviour may change in the future.
.It Xo
.Fl u ,
.Fl -unique
.Fl Fl unique
.Xc
Make sure the remote credentials cache is unique, that is, don't reuse
any existing cache. Mutually exclusive to
.Fl U .
.It Xo
.Fl U Pa string ,
.Fl -tkfile= Ns Pa string
.Fl Fl tkfile= Ns Pa string
.Xc
Name of the remote credentials cache. Mutually exclusive to
.Fl u .
.It Xo
.Fl x ,
.Fl -encrypt
.Fl Fl encrypt
.Xc
The
.Fl x

View File

@@ -52,14 +52,14 @@ service. Supported options are:
.Bl -tag -width Ds
.It Xo
.Fl n ,
.Fl -no-keepalive
.Fl Fl no-keepalive
.Xc
Disables keep-alive messages.
Keep-alives are packets sent at certain intervals to make sure that the
client is still there, even when it doesn't send any data.
.It Xo
.Fl k ,
.Fl -kerberos
.Fl Fl kerberos
.Xc
Assume that clients connecting to this server will use some form of
Kerberos authentication. See the
@@ -69,7 +69,7 @@ section for a sample
configuration.
.It Xo
.Fl x ,
.Fl -encrypt
.Fl Fl encrypt
.Xc
For Kerberos 4 this means that the connections are encrypted. Kerberos
5 can negotiate encryption even without this option, but if it's
@@ -79,14 +79,14 @@ will deny unencrypted connections. This option implies
.Fl k .
.\".It Xo
.\".Fl l ,
.\".Fl -no-rhosts
.\".Fl Fl no-rhosts
.\".Xc
.\"When using old port-based authentication, the user's
.\".Pa .rhosts
.\"files are normally checked. This option disables this.
.It Xo
.Fl v ,
.Fl -vacuous
.Fl Fl vacuous
.Xc
If the connecting client does not use any Kerberised authentication,
print a message that complains about this fact, and exit. This is
@@ -104,7 +104,7 @@ it possible to share tokens between sessions. This is only useful in
peculiar environments, such as some batch systems.
.It Xo
.Fl i ,
.Fl -no-inetd
.Fl Fl no-inetd
.Xc
The
.Fl i
@@ -115,7 +115,7 @@ to create a socket, instead of assuming that its stdin came from
This is mostly useful for debugging.
.It Xo
.Fl p Ar port ,
.Fl -port= Ns Ar port
.Fl Fl port= Ns Ar port
.Xc
Port to use with
.Fl i .

View File

@@ -39,16 +39,16 @@
.Nd substitute user identity
.Sh SYNOPSIS
.Nm su
.Op Fl K | Fl -no-kerberos
.Op Fl K | Fl Fl no-kerberos
.Op Fl f
.Op Fl l | Fl -full
.Op Fl l | Fl Fl full
.Op Fl m
.Oo Fl i Ar instance \*(Ba Xo
.Fl -instance= Ns Ar instance
.Fl Fl instance= Ns Ar instance
.Xc
.Oc
.Oo Fl c Ar command \*(Ba Xo
.Fl -command= Ns Ar command
.Fl Fl command= Ns Ar command
.Xc
.Oc
.Op Ar login Op Ar "shell arguments"
@@ -100,24 +100,24 @@ The options are as follows:
.Bl -item -width Ds
.It
.Fl K ,
.Fl -no-kerberos
.Fl Fl no-kerberos
don't use Kerberos.
.It
.Fl f
don't read .cshrc.
.It
.Fl l ,
.Fl -full
.Fl Fl full
simulate full login.
.It
.Fl m
leave environment unmodified.
.It
.Fl i Ar instance ,
.Fl -instance= Ns Ar instance
.Fl Fl instance= Ns Ar instance
root instance to use.
.It
.Fl c Ar command ,
.Fl -command= Ns Ar command
.Fl Fl command= Ns Ar command
command to execute.
.El