2 changed files with 89 additions and 1 deletions
@ -0,0 +1,86 @@ |
|||||||
|
--- src/main.c.dist 2003-06-11 10:19:48.000000000 +0200
|
||||||
|
+++ src/main.c 2003-06-11 10:22:47.000000000 +0200
|
||||||
|
@@ -34,45 +34,45 @@
|
||||||
|
/* print usage information */
|
||||||
|
|
||||||
|
void usage(FILE *fout) {
|
||||||
|
- fprintf(fout, "\
|
||||||
|
-"NAME" "VERSION". Secure encryption and decryption of files and streams.
|
||||||
|
+ fprintf(fout,
|
||||||
|
+""NAME" "VERSION". Secure encryption and decryption of files and streams.\n"
|
||||||
|
|
||||||
|
-Usage: "NAME" [mode] [options] [file...]
|
||||||
|
- "NAMEENCRYPT" [options] [file...]
|
||||||
|
- "NAMEDECRYPT" [options] [file...]
|
||||||
|
- "NAMECAT" [options] file...
|
||||||
|
-
|
||||||
|
-Modes:
|
||||||
|
- -e, --encrypt encrypt
|
||||||
|
- -d, --decrypt decrypt
|
||||||
|
- -c, --cat cat; decrypt files to stdout
|
||||||
|
- -x, --keychange change key
|
||||||
|
- -u, --unixcrypt decrypt old unix crypt files
|
||||||
|
-
|
||||||
|
-Options:
|
||||||
|
- -h, --help print this help message and exit
|
||||||
|
- -V, --version print version info and exit
|
||||||
|
- -L, --license print license info and exit
|
||||||
|
- -v, --verbose print progress information to stderr
|
||||||
|
- -q, --quiet run quietly; suppress warnings
|
||||||
|
- -f, --force overwrite existing files without asking
|
||||||
|
- -m, --mismatch allow decryption with non-matching key
|
||||||
|
- -E, --envvar var read keyword from environment variable (unsafe)
|
||||||
|
- -K, --key key give keyword on command line (unsafe)
|
||||||
|
- -k, --keyfile file read keyword(s) as first line(s) from file
|
||||||
|
- -P, --prompt prompt use this prompt instead of default
|
||||||
|
- -S, --suffix .suf use suffix .suf instead of default "SUF"
|
||||||
|
- -s, --strictsuffix refuse to encrypt files which already have suffix
|
||||||
|
- -F, --envvar2 var as -E for second keyword (for keychange mode)
|
||||||
|
- -H, --key2 key as -H for second keyword (for keychange mode)
|
||||||
|
- -Q, --prompt2 prompt as -P for second keyword (for keychange mode)
|
||||||
|
- -t, --timid prompt twice for destructive encryption keys
|
||||||
|
- -r, --recursive recurse through directories
|
||||||
|
- -R, --rec-symlinks follow symbolic links as subdirectories
|
||||||
|
- -l, --symlinks dereference symbolic links
|
||||||
|
- -T, --tmpfiles use temporary files instead of overwriting (unsafe)
|
||||||
|
- -- end of options, filenames follow
|
||||||
|
-");
|
||||||
|
+"Usage: "NAME" [mode] [options] [file...]\n"
|
||||||
|
+" "NAMEENCRYPT" [options] [file...]\n"
|
||||||
|
+" "NAMEDECRYPT" [options] [file...]\n"
|
||||||
|
+" "NAMECAT" [options] file...\n"
|
||||||
|
+
|
||||||
|
+"Modes:\n"
|
||||||
|
+" -e, --encrypt encrypt\n"
|
||||||
|
+" -d, --decrypt decrypt\n"
|
||||||
|
+" -c, --cat cat; decrypt files to stdout\n"
|
||||||
|
+" -x, --keychange change key\n"
|
||||||
|
+" -u, --unixcrypt decrypt old unix crypt files\n"
|
||||||
|
+"\n"
|
||||||
|
+"Options:\n"
|
||||||
|
+" -h, --help print this help message and exit\n"
|
||||||
|
+" -V, --version print version info and exit\n"
|
||||||
|
+" -L, --license print license info and exit\n"
|
||||||
|
+" -v, --verbose print progress information to stderr\n"
|
||||||
|
+" -q, --quiet run quietly; suppress warnings\n"
|
||||||
|
+" -f, --force overwrite existing files without asking\n"
|
||||||
|
+" -m, --mismatch allow decryption with non-matching key\n"
|
||||||
|
+" -E, --envvar var read keyword from environment variable (unsafe)\n"
|
||||||
|
+" -K, --key key give keyword on command line (unsafe)\n"
|
||||||
|
+" -k, --keyfile file read keyword(s) as first line(s) from file\n"
|
||||||
|
+" -P, --prompt prompt use this prompt instead of default\n"
|
||||||
|
+" -S, --suffix .suf use suffix .suf instead of default "SUF"\n"
|
||||||
|
+" -s, --strictsuffix refuse to encrypt files which already have suffix\n"
|
||||||
|
+" -F, --envvar2 var as -E for second keyword (for keychange mode)\n"
|
||||||
|
+" -H, --key2 key as -H for second keyword (for keychange mode)\n"
|
||||||
|
+" -Q, --prompt2 prompt as -P for second keyword (for keychange mode)\n"
|
||||||
|
+" -t, --timid prompt twice for destructive encryption keys\n"
|
||||||
|
+" -r, --recursive recurse through directories\n"
|
||||||
|
+" -R, --rec-symlinks follow symbolic links as subdirectories\n"
|
||||||
|
+" -l, --symlinks dereference symbolic links\n"
|
||||||
|
+" -T, --tmpfiles use temporary files instead of overwriting (unsafe)\n"
|
||||||
|
+" -- end of options, filenames follow\n"
|
||||||
|
+);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* print version and copyright information */
|
||||||
Loading…
Reference in new issue