Use "Fl Fl" for long options.
Signed-off-by: Love Hornquist Astrand <lha@h5l.org>
This commit is contained in:

committed by
Love Hornquist Astrand

parent
05a432aaed
commit
db8e287e41
@@ -40,27 +40,27 @@
|
||||
obtain AFS tokens
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl h | Fl -help
|
||||
.Op Fl -no-v4
|
||||
.Op Fl -no-v5
|
||||
.Op Fl u | Fl -unlog
|
||||
.Op Fl v | Fl -verbose
|
||||
.Op Fl -version
|
||||
.Op Fl h | Fl Fl help
|
||||
.Op Fl Fl no-v4
|
||||
.Op Fl Fl no-v5
|
||||
.Op Fl u | Fl Fl unlog
|
||||
.Op Fl v | Fl Fl verbose
|
||||
.Op Fl Fl version
|
||||
.Oo Fl c Ar cell \*(Ba Xo
|
||||
.Fl -cell= Ns Ar cell
|
||||
.Fl Fl cell= Ns Ar cell
|
||||
.Xc
|
||||
.Oc
|
||||
.Oo Fl k Ar realm \*(Ba Xo
|
||||
.Fl -realm= Ns Ar realm
|
||||
.Fl Fl realm= Ns Ar realm
|
||||
.Xc
|
||||
.Oc
|
||||
.Oo Fl P Ar principal \*(Ba Xo
|
||||
.Fl -principal= Ns Ar principal
|
||||
.Fl Fl principal= Ns Ar principal
|
||||
.Xc
|
||||
.Oc
|
||||
.Bk -words
|
||||
.Oo Fl p Ar path \*(Ba Xo
|
||||
.Fl -file= Ns Ar path
|
||||
.Fl Fl file= Ns Ar path
|
||||
.Xc
|
||||
.Oc
|
||||
.Ek
|
||||
@@ -77,51 +77,51 @@ decides upon.
|
||||
.Pp
|
||||
Supported options:
|
||||
.Bl -tag -width Ds
|
||||
.It Fl -no-v4
|
||||
.It Fl Fl no-v4
|
||||
This makes
|
||||
.Nm
|
||||
not try using Kerberos 4.
|
||||
.It Fl -no-v5
|
||||
.It Fl Fl no-v5
|
||||
This makes
|
||||
.Nm
|
||||
not try using Kerberos 5.
|
||||
.It Xo
|
||||
.Fl P Ar principal ,
|
||||
.Fl -principal Ar principal
|
||||
.Fl Fl principal Ar principal
|
||||
.Xc
|
||||
select what Kerberos 5 principal to use.
|
||||
.It Fl -cache Ar cache
|
||||
.It Fl Fl cache Ar cache
|
||||
select what Kerberos 5 credential cache to use.
|
||||
.Fl -principal
|
||||
.Fl Fl principal
|
||||
overrides this option.
|
||||
.It Xo
|
||||
.Fl u ,
|
||||
.Fl -unlog
|
||||
.Fl Fl unlog
|
||||
.Xc
|
||||
Destroy tokens instead of obtaining new. If this is specified, all
|
||||
other options are ignored (except for
|
||||
.Fl -help
|
||||
.Fl Fl help
|
||||
and
|
||||
.Fl -version ) .
|
||||
.Fl Fl version ) .
|
||||
.It Xo
|
||||
.Fl v ,
|
||||
.Fl -verbose
|
||||
.Fl Fl verbose
|
||||
.Xc
|
||||
Adds more verbosity for what is actually going on.
|
||||
.It Xo
|
||||
.Fl c Ar cell,
|
||||
.Fl -cell= Ns Ar cell
|
||||
.Fl Fl cell= Ns Ar cell
|
||||
.Xc
|
||||
This specified one or more cell names to get tokens for.
|
||||
.It Xo
|
||||
.Fl k Ar realm ,
|
||||
.Fl -realm= Ns Ar realm
|
||||
.Fl Fl realm= Ns Ar realm
|
||||
.Xc
|
||||
This is the Kerberos realm the AFS servers live in, this should
|
||||
normally not be specified.
|
||||
.It Xo
|
||||
.Fl p Ar path ,
|
||||
.Fl -file= Ns Ar path
|
||||
.Fl Fl file= Ns Ar path
|
||||
.Xc
|
||||
This specified one or more file paths for which tokens should be
|
||||
obtained.
|
||||
|
@@ -41,9 +41,9 @@ creates a new credential cache sandbox
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl c Ar command-string
|
||||
.Op Fl h | Fl -help
|
||||
.Op Fl -version
|
||||
.Op Fl -cache-type= Ns Ar string
|
||||
.Op Fl h | Fl Fl help
|
||||
.Op Fl Fl version
|
||||
.Op Fl Fl cache-type= Ns Ar string
|
||||
.Ar command [args...]
|
||||
.Sh DESCRIPTION
|
||||
Supported options:
|
||||
@@ -54,14 +54,14 @@ Executes command(s) contained in
|
||||
.Ar command-string .
|
||||
.Xc
|
||||
.It Xo
|
||||
.Fl -cache-type= Ns Ar string
|
||||
.Fl Fl cache-type= Ns Ar string
|
||||
.Xc
|
||||
.It Xo
|
||||
.Fl h ,
|
||||
.Fl -help
|
||||
.Fl Fl help
|
||||
.Xc
|
||||
.It Xo
|
||||
.Fl -version
|
||||
.Fl Fl version
|
||||
.Xc
|
||||
.El
|
||||
.Pp
|
||||
@@ -75,7 +75,7 @@ the credential cache type that was used at the time of
|
||||
.Nm
|
||||
invocation.
|
||||
The credential cache type can be controlled by the option
|
||||
.Fl -cache-type .
|
||||
.Fl Fl cache-type .
|
||||
.Sh EXAMPLES
|
||||
Create a new sandbox where new credentials can be used, while the old
|
||||
credentials can be used by other processes.
|
||||
|
@@ -53,8 +53,8 @@ file transfer program
|
||||
.Op Fl t
|
||||
.Op Fl v
|
||||
.Op Fl x
|
||||
.Op Fl -no-gss-bindings
|
||||
.Op Fl -no-gss-delegate
|
||||
.Op Fl Fl no-gss-bindings
|
||||
.Op Fl Fl no-gss-delegate
|
||||
.Op Ar host
|
||||
.Sh DESCRIPTION
|
||||
.Nm
|
||||
@@ -103,10 +103,10 @@ Turn on passive mode.
|
||||
Enables debugging.
|
||||
.It Fl g
|
||||
Disables file name globbing.
|
||||
.It Fl -no-gss-bindings
|
||||
.It Fl Fl no-gss-bindings
|
||||
Don't use GSS-API bindings when talking to peer. IP addresses will not
|
||||
be checked to ensure they match.
|
||||
.It Fl -no-gss-delegate
|
||||
.It Fl Fl no-gss-delegate
|
||||
Disable delegation of GSSAPI credentials.
|
||||
.It Fl l
|
||||
Disables command line editing.
|
||||
|
@@ -47,11 +47,11 @@
|
||||
.Op Fl p Ar port
|
||||
.Op Fl T Ar maxtimeout
|
||||
.Op Fl t Ar timeout
|
||||
.Op Fl -gss-bindings
|
||||
.Op Fl I | Fl -no-insecure-oob
|
||||
.Op Fl Fl gss-bindings
|
||||
.Op Fl I | Fl Fl no-insecure-oob
|
||||
.Op Fl u Ar default umask
|
||||
.Op Fl B | Fl -builtin-ls
|
||||
.Op Fl -good-chars= Ns Ar string
|
||||
.Op Fl B | Fl Fl builtin-ls
|
||||
.Op Fl Fl good-chars= Ns Ar string
|
||||
.Sh DESCRIPTION
|
||||
.Nm Ftpd
|
||||
is the
|
||||
@@ -101,7 +101,7 @@ Debugging information is written to the syslog using LOG_FTP.
|
||||
.It Fl g
|
||||
Anonymous users will get a umask of
|
||||
.Ar umask .
|
||||
.It Fl -gss-bindings
|
||||
.It Fl Fl gss-bindings
|
||||
require the peer to use GSS-API bindings (ie make sure IP addresses match).
|
||||
.It Fl i
|
||||
Open a socket and wait for a connection. This is mainly used for
|
||||
@@ -144,16 +144,16 @@ revert to the old behavior.
|
||||
Verbose mode.
|
||||
.It Xo
|
||||
.Fl B ,
|
||||
.Fl -builtin-ls
|
||||
.Fl Fl builtin-ls
|
||||
.Xc
|
||||
use built-in ls to list files
|
||||
.It Xo
|
||||
.Fl -good-chars= Ns Ar string
|
||||
.Fl Fl good-chars= Ns Ar string
|
||||
.Xc
|
||||
allowed anonymous upload filename chars
|
||||
.It Xo
|
||||
.Fl I
|
||||
.Fl -no-insecure-oob
|
||||
.Fl Fl no-insecure-oob
|
||||
.Xc
|
||||
don't allow insecure out of band.
|
||||
Heimdal ftp clients before 0.6.3 doesn't support secure oob, so turning
|
||||
|
18
appl/kf/kf.1
18
appl/kf/kf.1
@@ -41,20 +41,20 @@
|
||||
.Nm
|
||||
.Oo
|
||||
.Fl p Ar port |
|
||||
.Fl -port Ns = Ns Ar port
|
||||
.Fl Fl port Ns = Ns Ar port
|
||||
.Oc
|
||||
.Oo
|
||||
.Fl l Ar login |
|
||||
.Fl -login Ns = Ns Ar login
|
||||
.Fl Fl login Ns = Ns Ar login
|
||||
.Oc
|
||||
.Oo
|
||||
.Fl c Ar ccache |
|
||||
.Fl -ccache Ns = Ns Ar ccache
|
||||
.Fl Fl ccache Ns = Ns Ar ccache
|
||||
.Oc
|
||||
.Op Fl F | -forwardable
|
||||
.Op Fl G | -no-forwardable
|
||||
.Op Fl h | -help
|
||||
.Op Fl -version
|
||||
.Op Fl Fl version
|
||||
.Ar host ...
|
||||
.Sh DESCRIPTION
|
||||
The
|
||||
@@ -65,17 +65,17 @@ Options supported are:
|
||||
.Bl -tag -width indent
|
||||
.It Xo
|
||||
.Fl p Ar port ,
|
||||
.Fl -port Ns = Ns Ar port
|
||||
.Fl Fl port Ns = Ns Ar port
|
||||
.Xc
|
||||
port to connect to
|
||||
.It Xo
|
||||
.Fl l Ar login ,
|
||||
.Fl -login Ns = Ns Ar login
|
||||
.Fl Fl login Ns = Ns Ar login
|
||||
.Xc
|
||||
remote login name
|
||||
.It Xo
|
||||
.Fl c Ar ccache ,
|
||||
.Fl -ccache Ns = Ns Ar ccache
|
||||
.Fl Fl ccache Ns = Ns Ar ccache
|
||||
.Xc
|
||||
remote cred cache
|
||||
.It Fl F , -forwardable
|
||||
@@ -83,7 +83,7 @@ forward forwardable credentials
|
||||
.It Fl G , -no-forwardable
|
||||
do not forward forwardable credentials
|
||||
.It Fl h , -help
|
||||
.It Fl -version
|
||||
.It Fl Fl version
|
||||
.El
|
||||
.Pp
|
||||
.Nm
|
||||
@@ -94,7 +94,7 @@ In order for
|
||||
.Nm
|
||||
to work you will need to acquire your initial ticket with forwardable
|
||||
flag, i.e.
|
||||
.Nm kinit Fl -forwardable .
|
||||
.Nm kinit Fl Fl forwardable .
|
||||
.Pp
|
||||
.Nm telnet
|
||||
is able to forward tickets by itself.
|
||||
|
@@ -41,15 +41,15 @@
|
||||
.Nm
|
||||
.Oo
|
||||
.Fl p Ar port |
|
||||
.Fl -port Ns = Ns Ar port
|
||||
.Fl Fl port Ns = Ns Ar port
|
||||
.Oc
|
||||
.Op Fl i | -inetd
|
||||
.Oo
|
||||
.Fl R Ar regpag |
|
||||
.Fl -regpag Ns = Ns Ar regpag
|
||||
.Fl Fl regpag Ns = Ns Ar regpag
|
||||
.Oc
|
||||
.Op Fl h | -help
|
||||
.Op Fl -version
|
||||
.Op Fl Fl version
|
||||
.Sh DESCRIPTION
|
||||
This is the daemon for
|
||||
.Xr kf 1 .
|
||||
@@ -57,14 +57,14 @@ Supported options:
|
||||
.Bl -tag -width indent
|
||||
.It Xo
|
||||
.Fl p Ar port ,
|
||||
.Fl -port Ns = Ns Ar port
|
||||
.Fl Fl port Ns = Ns Ar port
|
||||
.Xc
|
||||
port to listen to
|
||||
.It Fl i , -inetd
|
||||
not started from inetd
|
||||
.It Xo
|
||||
.Fl R Ar regpag ,
|
||||
.Fl -regpag= Ns Ar regpag
|
||||
.Fl Fl regpag= Ns Ar regpag
|
||||
.Xc
|
||||
path to regpag binary
|
||||
.El
|
||||
|
@@ -47,7 +47,7 @@ POP3 server
|
||||
.Op Fl d
|
||||
.Op Fl i
|
||||
.Op Fl p Ar port
|
||||
.Op Fl -address-log= Ns Pa file
|
||||
.Op Fl Fl address-log= Ns Pa file
|
||||
.Sh DESCRIPTION
|
||||
.Nm
|
||||
serves mail via the Post Office Protocol. Supported options include:
|
||||
@@ -60,7 +60,7 @@ which authentication mode is acceptable,
|
||||
enables SASL (RFC2222), and
|
||||
.Ar otp
|
||||
enables OTP (RFC1938) authentication. Both disable plaintext passwords.
|
||||
.It Fl -address-log= Ns Pa file
|
||||
.It Fl Fl address-log= Ns Pa file
|
||||
Logs the addresses (along with a timestamp) of all clients to the
|
||||
specified file. This can be used to implement POP-before-SMTP
|
||||
authentication.
|
||||
|
@@ -39,13 +39,13 @@
|
||||
.Nd "fetch a list of the current mail via POP"
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl 4 | Fl -krb4
|
||||
.Op Fl 5 | Fl -krb5
|
||||
.Op Fl v | Fl -verbose
|
||||
.Op Fl 4 | Fl Fl krb4
|
||||
.Op Fl 5 | Fl Fl krb5
|
||||
.Op Fl v | Fl Fl verbose
|
||||
.Op Fl c | -count
|
||||
.Op Fl -header
|
||||
.Op Fl Fl header
|
||||
.Oo Fl p Ar port-spec \*(Ba Xo
|
||||
.Fl -port= Ns Ar port-spec
|
||||
.Fl Fl port= Ns Ar port-spec
|
||||
.Xc
|
||||
.Oc
|
||||
.Sh DESCRIPTION
|
||||
|
@@ -8,15 +8,15 @@
|
||||
.Nd fetch mail via POP
|
||||
.Sh SYNOPSIS
|
||||
.Nm
|
||||
.Op Fl 5 | Fl -krb5
|
||||
.Op Fl v | Fl -verbose
|
||||
.Op Fl f | Fl -fork
|
||||
.Op Fl 5 | Fl Fl krb5
|
||||
.Op Fl v | Fl Fl verbose
|
||||
.Op Fl f | Fl Fl fork
|
||||
.Op Fl l | -leave
|
||||
.Op Fl -from
|
||||
.Op Fl Fl from
|
||||
.Op Fl c | -count
|
||||
.Op Fl -headers Ns = Ns Ar headers
|
||||
.Op Fl Fl headers Ns = Ns Ar headers
|
||||
.Oo Fl p Ar port-spec \*(Ba Xo
|
||||
.Fl -port Ns = Ns Ar port-spec
|
||||
.Fl Fl port Ns = Ns Ar port-spec
|
||||
.Xc
|
||||
.Oc
|
||||
.Ar po-box
|
||||
@@ -51,35 +51,35 @@ Supported options:
|
||||
.Bl -tag -width Ds
|
||||
.It Xo
|
||||
.Fl 5 ,
|
||||
.Fl -krb5
|
||||
.Fl Fl krb5
|
||||
.Xc
|
||||
use Kerberos 5 (if compiled with support for Kerberos 5)
|
||||
.It Xo
|
||||
.Fl f ,
|
||||
.Fl -fork
|
||||
.Fl Fl fork
|
||||
.Xc
|
||||
fork before starting to delete messages
|
||||
.It Xo
|
||||
.Fl l ,
|
||||
.Fl -leave
|
||||
.Fl Fl leave
|
||||
.Xc
|
||||
don't delete fetched mail
|
||||
.It Xo
|
||||
.Fl -from
|
||||
.Fl Fl from
|
||||
.Xc
|
||||
behave like from.
|
||||
.It Xo
|
||||
.Fl c ,
|
||||
.Fl -count
|
||||
.Fl Fl count
|
||||
.Xc
|
||||
first print how many messages and bytes there are.
|
||||
.It Xo
|
||||
.Fl -headers Ns = Ns Ar headers
|
||||
.Fl Fl headers Ns = Ns Ar headers
|
||||
.Xc
|
||||
a list of comma-separated headers that should get printed.
|
||||
.It Xo
|
||||
.Fl p Ar port-spec ,
|
||||
.Fl -port Ns = Ns Ar port-spec
|
||||
.Fl Fl port Ns = Ns Ar port-spec
|
||||
.Xc
|
||||
use this port instead of the default
|
||||
.Ql kpop
|
||||
|
@@ -63,7 +63,7 @@ Valid options are:
|
||||
.Bl -tag -width Ds
|
||||
.It Xo
|
||||
.Fl 4 ,
|
||||
.Fl -krb4
|
||||
.Fl Fl krb4
|
||||
.Xc
|
||||
The
|
||||
.Fl 4
|
||||
@@ -72,7 +72,7 @@ authentication mechanisms will be tried, but in some cases more
|
||||
explicit control is desired.
|
||||
.It Xo
|
||||
.Fl 5 ,
|
||||
.Fl -krb5
|
||||
.Fl Fl krb5
|
||||
.Xc
|
||||
The
|
||||
.Fl 5
|
||||
@@ -81,7 +81,7 @@ option requests Kerberos 5 authentication. This is analogous to the
|
||||
option.
|
||||
.It Xo
|
||||
.Fl K ,
|
||||
.Fl -broken
|
||||
.Fl Fl broken
|
||||
.Xc
|
||||
The
|
||||
.Fl K
|
||||
@@ -90,7 +90,7 @@ mode relies on reserved ports. The long name is an indication of how
|
||||
good this is.
|
||||
.It Xo
|
||||
.Fl n ,
|
||||
.Fl -no-input
|
||||
.Fl Fl no-input
|
||||
.Xc
|
||||
The
|
||||
.Fl n
|
||||
@@ -105,13 +105,13 @@ Enable
|
||||
socket debugging.
|
||||
.It Xo
|
||||
.Fl e ,
|
||||
.Fl -no-stderr
|
||||
.Fl Fl no-stderr
|
||||
.Xc
|
||||
Don't use a separate socket for the stderr stream. This can be
|
||||
necessary if rsh-ing through a NAT bridge.
|
||||
.It Xo
|
||||
.Fl x ,
|
||||
.Fl -encrypt
|
||||
.Fl Fl encrypt
|
||||
.Xc
|
||||
The
|
||||
.Fl x
|
||||
@@ -132,7 +132,7 @@ section of
|
||||
when using Kerberos 5.
|
||||
.It Xo
|
||||
.Fl f ,
|
||||
.Fl -forward
|
||||
.Fl Fl forward
|
||||
.Xc
|
||||
Forward Kerberos 5 credentials to the remote host.
|
||||
Also settable via
|
||||
@@ -141,7 +141,7 @@ Also settable via
|
||||
.Xr krb5.conf ) .
|
||||
.It Xo
|
||||
.Fl F ,
|
||||
.Fl -forwardable
|
||||
.Fl Fl forwardable
|
||||
.Xc
|
||||
Make the forwarded credentials re-forwardable.
|
||||
Also settable via
|
||||
@@ -150,7 +150,7 @@ Also settable via
|
||||
.Xr krb5.conf ) .
|
||||
.It Xo
|
||||
.Fl l Ar string ,
|
||||
.Fl -user= Ns Ar string
|
||||
.Fl Fl user= Ns Ar string
|
||||
.Xc
|
||||
By default the remote username is the same as the local. The
|
||||
.Fl l
|
||||
@@ -159,7 +159,7 @@ option or the
|
||||
format allow the remote name to be specified.
|
||||
.It Xo
|
||||
.Fl n ,
|
||||
.Fl -no-input
|
||||
.Fl Fl no-input
|
||||
.Xc
|
||||
Direct input from
|
||||
.Pa /dev/null
|
||||
@@ -168,7 +168,7 @@ Direct input from
|
||||
section).
|
||||
.It Xo
|
||||
.Fl p Ar number-or-service ,
|
||||
.Fl -port= Ns Ar number-or-service
|
||||
.Fl Fl port= Ns Ar number-or-service
|
||||
.Xc
|
||||
Connect to this port instead of the default (which is 514 when using
|
||||
old port based authentication, 544 for Kerberos 5 and non-encrypted
|
||||
@@ -177,7 +177,7 @@ the contents of
|
||||
.Pa /etc/services ) .
|
||||
.It Xo
|
||||
.Fl P Ar N|O|1|2 ,
|
||||
.Fl -protocol= Ns Ar N|O|1|2
|
||||
.Fl Fl protocol= Ns Ar N|O|1|2
|
||||
.Xc
|
||||
Specifies the protocol version to use with Kerberos 5.
|
||||
.Ar N
|
||||
@@ -193,20 +193,20 @@ default. Unless asked for a specific version,
|
||||
will try both. This behaviour may change in the future.
|
||||
.It Xo
|
||||
.Fl u ,
|
||||
.Fl -unique
|
||||
.Fl Fl unique
|
||||
.Xc
|
||||
Make sure the remote credentials cache is unique, that is, don't reuse
|
||||
any existing cache. Mutually exclusive to
|
||||
.Fl U .
|
||||
.It Xo
|
||||
.Fl U Pa string ,
|
||||
.Fl -tkfile= Ns Pa string
|
||||
.Fl Fl tkfile= Ns Pa string
|
||||
.Xc
|
||||
Name of the remote credentials cache. Mutually exclusive to
|
||||
.Fl u .
|
||||
.It Xo
|
||||
.Fl x ,
|
||||
.Fl -encrypt
|
||||
.Fl Fl encrypt
|
||||
.Xc
|
||||
The
|
||||
.Fl x
|
||||
|
@@ -52,14 +52,14 @@ service. Supported options are:
|
||||
.Bl -tag -width Ds
|
||||
.It Xo
|
||||
.Fl n ,
|
||||
.Fl -no-keepalive
|
||||
.Fl Fl no-keepalive
|
||||
.Xc
|
||||
Disables keep-alive messages.
|
||||
Keep-alives are packets sent at certain intervals to make sure that the
|
||||
client is still there, even when it doesn't send any data.
|
||||
.It Xo
|
||||
.Fl k ,
|
||||
.Fl -kerberos
|
||||
.Fl Fl kerberos
|
||||
.Xc
|
||||
Assume that clients connecting to this server will use some form of
|
||||
Kerberos authentication. See the
|
||||
@@ -69,7 +69,7 @@ section for a sample
|
||||
configuration.
|
||||
.It Xo
|
||||
.Fl x ,
|
||||
.Fl -encrypt
|
||||
.Fl Fl encrypt
|
||||
.Xc
|
||||
For Kerberos 4 this means that the connections are encrypted. Kerberos
|
||||
5 can negotiate encryption even without this option, but if it's
|
||||
@@ -79,14 +79,14 @@ will deny unencrypted connections. This option implies
|
||||
.Fl k .
|
||||
.\".It Xo
|
||||
.\".Fl l ,
|
||||
.\".Fl -no-rhosts
|
||||
.\".Fl Fl no-rhosts
|
||||
.\".Xc
|
||||
.\"When using old port-based authentication, the user's
|
||||
.\".Pa .rhosts
|
||||
.\"files are normally checked. This option disables this.
|
||||
.It Xo
|
||||
.Fl v ,
|
||||
.Fl -vacuous
|
||||
.Fl Fl vacuous
|
||||
.Xc
|
||||
If the connecting client does not use any Kerberised authentication,
|
||||
print a message that complains about this fact, and exit. This is
|
||||
@@ -104,7 +104,7 @@ it possible to share tokens between sessions. This is only useful in
|
||||
peculiar environments, such as some batch systems.
|
||||
.It Xo
|
||||
.Fl i ,
|
||||
.Fl -no-inetd
|
||||
.Fl Fl no-inetd
|
||||
.Xc
|
||||
The
|
||||
.Fl i
|
||||
@@ -115,7 +115,7 @@ to create a socket, instead of assuming that its stdin came from
|
||||
This is mostly useful for debugging.
|
||||
.It Xo
|
||||
.Fl p Ar port ,
|
||||
.Fl -port= Ns Ar port
|
||||
.Fl Fl port= Ns Ar port
|
||||
.Xc
|
||||
Port to use with
|
||||
.Fl i .
|
||||
|
16
appl/su/su.1
16
appl/su/su.1
@@ -39,16 +39,16 @@
|
||||
.Nd substitute user identity
|
||||
.Sh SYNOPSIS
|
||||
.Nm su
|
||||
.Op Fl K | Fl -no-kerberos
|
||||
.Op Fl K | Fl Fl no-kerberos
|
||||
.Op Fl f
|
||||
.Op Fl l | Fl -full
|
||||
.Op Fl l | Fl Fl full
|
||||
.Op Fl m
|
||||
.Oo Fl i Ar instance \*(Ba Xo
|
||||
.Fl -instance= Ns Ar instance
|
||||
.Fl Fl instance= Ns Ar instance
|
||||
.Xc
|
||||
.Oc
|
||||
.Oo Fl c Ar command \*(Ba Xo
|
||||
.Fl -command= Ns Ar command
|
||||
.Fl Fl command= Ns Ar command
|
||||
.Xc
|
||||
.Oc
|
||||
.Op Ar login Op Ar "shell arguments"
|
||||
@@ -100,24 +100,24 @@ The options are as follows:
|
||||
.Bl -item -width Ds
|
||||
.It
|
||||
.Fl K ,
|
||||
.Fl -no-kerberos
|
||||
.Fl Fl no-kerberos
|
||||
don't use Kerberos.
|
||||
.It
|
||||
.Fl f
|
||||
don't read .cshrc.
|
||||
.It
|
||||
.Fl l ,
|
||||
.Fl -full
|
||||
.Fl Fl full
|
||||
simulate full login.
|
||||
.It
|
||||
.Fl m
|
||||
leave environment unmodified.
|
||||
.It
|
||||
.Fl i Ar instance ,
|
||||
.Fl -instance= Ns Ar instance
|
||||
.Fl Fl instance= Ns Ar instance
|
||||
root instance to use.
|
||||
.It
|
||||
.Fl c Ar command ,
|
||||
.Fl -command= Ns Ar command
|
||||
.Fl Fl command= Ns Ar command
|
||||
command to execute.
|
||||
.El
|
||||
|
Reference in New Issue
Block a user