Commit a12da4ee authored by Eric S. Raymond's avatar Eric S. Raymond

_( -> GT_(

svn path=/trunk/; revision=3478
parent f5ece930
......@@ -15,6 +15,8 @@
* Mike Warfield's fix for using a combined SSL cert and key in a single file.
* DNS lookups moved to just before te mailserver socket open, so fetchmail
now works OK even if started up without Internet access.
* Switched from _( to GT_( as a gettext macro, in order to avoid a
conflict with the SSL library.
fetchmail-5.9.0 (Sun Aug 12 23:52:16 EDT 2001), 21062 lines:
......@@ -56,7 +58,7 @@ fetchmail-5.8.15 (Tue Jul 31 02:07:03 EDT 2001), 21075 lines:
* Man page bugs pointed out by Andrew Benham.
* POP3 end of session RSET on keep removed.
* In IMAP, handle BAD and NO responses to FETCH gracefully.
* Parse "no {syslog|invisible|showdots} properly.
* Parse "no {syslog|invisible|showdots}" properly.
* Change AC_DEFINE to AC_DEFINE_UNQUOTED appropriately in configure.in
(Debian bug #104484).
* Fixed bug in fetchmailconf plugin/plugout code (Debian bug #105987).
......
This diff is collapsed.
......@@ -52,7 +52,7 @@ void envquery(int argc, char **argv)
if (!(pwp = getpwuid(getuid())))
{
fprintf(stderr,
_("%s: You don't exist. Go away.\n"),
GT_("%s: You don't exist. Go away.\n"),
program_name);
exit(PS_UNDEFINED);
}
......@@ -118,7 +118,7 @@ char *host_fqdn(void)
if (gethostname(tmpbuf, sizeof(tmpbuf)))
{
fprintf(stderr, _("%s: can't determine your host!"),
fprintf(stderr, GT_("%s: can't determine your host!"),
program_name);
exit(PS_DNS);
}
......@@ -134,7 +134,7 @@ char *host_fqdn(void)
{
/* exit with error message */
fprintf(stderr,
_("gethostbyname failed for %s\n"), tmpbuf);
GT_("gethostbyname failed for %s\n"), tmpbuf);
exit(PS_DNS);
}
return(xstrdup(hp->h_name));
......
......@@ -42,13 +42,13 @@ static int etrn_getrange(int sock, struct query *ctl, const char *id,
if ((ok = SMTP_ehlo(sock, fetchmailhost, &opts)))
{
report(stderr, _("%s's SMTP listener does not support ESMTP\n"),
report(stderr, GT_("%s's SMTP listener does not support ESMTP\n"),
ctl->server.pollname);
return(ok);
}
else if (!(opts & ESMTP_ETRN))
{
report(stderr, _("%s's SMTP listener does not support ETRN\n"),
report(stderr, GT_("%s's SMTP listener does not support ETRN\n"),
ctl->server.pollname);
return(PS_PROTOCOL);
}
......@@ -72,38 +72,38 @@ static int etrn_getrange(int sock, struct query *ctl, const char *id,
{
case 250: /* OK, queuing for node <x> started */
if (outlevel >= O_SILENT)
report(stdout, _("Queuing for %s started\n"), qnp->id);
report(stdout, GT_("Queuing for %s started\n"), qnp->id);
break;
case 251: /* OK, no messages waiting for node <x> */
if (outlevel >= O_SILENT)
report(stdout, _("No messages waiting for %s\n"), qnp->id);
report(stdout, GT_("No messages waiting for %s\n"), qnp->id);
return(PS_NOMAIL);
case 252: /* OK, pending messages for node <x> started */
case 253: /* OK, <n> pending messages for node <x> started */
if (outlevel >= O_SILENT)
report(stdout, _("Pending messages for %s started\n"), qnp->id);
report(stdout, GT_("Pending messages for %s started\n"), qnp->id);
break;
case 458: /* Unable to queue messages for node <x> */
report(stderr, _("Unable to queue messages for node %s\n"),qnp->id);
report(stderr, GT_("Unable to queue messages for node %s\n"),qnp->id);
return(PS_PROTOCOL);
case 459: /* Node <x> not allowed: <reason> */
report(stderr, _("Node %s not allowed: %s\n"), qnp->id, buf);
report(stderr, GT_("Node %s not allowed: %s\n"), qnp->id, buf);
return(PS_AUTHFAIL);
case 500: /* Syntax Error */
report(stderr, _("ETRN syntax error\n"));
report(stderr, GT_("ETRN syntax error\n"));
return(PS_PROTOCOL);
case 501: /* Syntax Error in Parameters */
report(stderr, _("ETRN syntax error in parameters\n"));
report(stderr, GT_("ETRN syntax error in parameters\n"));
return(PS_PROTOCOL);
default:
report(stderr, _("Unknown ETRN error %d\n"), atoi(buf));
report(stderr, GT_("Unknown ETRN error %d\n"), atoi(buf));
return(PS_PROTOCOL);
}
}
......@@ -148,19 +148,19 @@ int doETRN (struct query *ctl)
int status;
if (ctl->keep) {
fprintf(stderr, _("Option --keep is not supported with ETRN\n"));
fprintf(stderr, GT_("Option --keep is not supported with ETRN\n"));
return(PS_SYNTAX);
}
if (ctl->flush) {
fprintf(stderr, _("Option --flush is not supported with ETRN\n"));
fprintf(stderr, GT_("Option --flush is not supported with ETRN\n"));
return(PS_SYNTAX);
}
if (ctl->mailboxes->id) {
fprintf(stderr, _("Option --remote is not supported with ETRN\n"));
fprintf(stderr, GT_("Option --remote is not supported with ETRN\n"));
return(PS_SYNTAX);
}
if (check_only) {
fprintf(stderr, _("Option --check is not supported with ETRN\n"));
fprintf(stderr, GT_("Option --check is not supported with ETRN\n"));
return(PS_SYNTAX);
}
peek_capable = FALSE;
......
This diff is collapsed.
......@@ -539,7 +539,7 @@ char *xstrdup(const char *);
#endif
#endif
#define xalloca(ptr, t, n) if (!(ptr = (t) alloca(n)))\
{report(stderr, _("alloca failed")); exit(PS_UNDEFINED);}
{report(stderr, GT_("alloca failed")); exit(PS_UNDEFINED);}
#if FALSE
/*
* This is a hack to help xgettext which cannot find strings in
......
......@@ -69,7 +69,7 @@ char *prompt;
char *getpass();
return getpass(prompt);
#else
fputs(_("ERROR: no support for getpassword() routine\n"),stderr);
fputs(GT_("ERROR: no support for getpassword() routine\n"),stderr);
exit(1);
#endif
#else
......@@ -191,7 +191,7 @@ static void restore_tty_state(void)
static RETSIGTYPE sigint_handler(int signum)
{
restore_tty_state();
report(stderr, _("\nCaught SIGINT... bailing out.\n"));
report(stderr, GT_("\nCaught SIGINT... bailing out.\n"));
exit(1);
}
......
......@@ -4,9 +4,9 @@
#ifdef ENABLE_NLS
#undef __OPTIMIZE__
#include <libintl.h>
#define _(String) gettext((String))
#define N_(String) (String)
#define GT_(String) gettext((String))
#define NGT_(String) (String)
#else
#define _(String) (String)
#define N_(String) (String)
#define GT_(String) (String)
#define NGT_(String) (String)
#endif
......@@ -248,20 +248,20 @@ static int imap_getauth(int sock, struct query *ctl, char *greeting)
{
imap_version = IMAP4rev1;
if (outlevel >= O_DEBUG)
report(stdout, _("Protocol identified as IMAP4 rev 1\n"));
report(stdout, GT_("Protocol identified as IMAP4 rev 1\n"));
}
else
{
imap_version = IMAP4;
if (outlevel >= O_DEBUG)
report(stdout, _("Protocol identified as IMAP4 rev 0\n"));
report(stdout, GT_("Protocol identified as IMAP4 rev 0\n"));
}
}
else if (ok == PS_ERROR)
{
imap_version = IMAP2;
if (outlevel >= O_DEBUG)
report(stdout, _("Protocol identified as IMAP2 or IMAP2BIS\n"));
report(stdout, GT_("Protocol identified as IMAP2 or IMAP2BIS\n"));
}
else
return(ok);
......@@ -285,7 +285,7 @@ static int imap_getauth(int sock, struct query *ctl, char *greeting)
{
do_idle = TRUE;
if (outlevel >= O_VERBOSE)
report(stdout, _("will idle after poll\n"));
report(stdout, GT_("will idle after poll\n"));
}
/*
......@@ -374,7 +374,7 @@ static int imap_getauth(int sock, struct query *ctl, char *greeting)
if (ctl->server.authenticate == A_OTP)
{
report(stderr,
_("Required OTP capability not compiled into fetchmail\n"));
GT_("Required OTP capability not compiled into fetchmail\n"));
}
#endif /* OPIE_ENABLE */
......@@ -396,7 +396,7 @@ static int imap_getauth(int sock, struct query *ctl, char *greeting)
if (ctl->server.authenticate == A_NTLM)
{
report(stderr,
_("Required NTLM capability not compiled into fetchmail\n"));
GT_("Required NTLM capability not compiled into fetchmail\n"));
}
#endif /* NTLM_ENABLE */
......@@ -405,7 +405,7 @@ static int imap_getauth(int sock, struct query *ctl, char *greeting)
if ((imap_version >= IMAP4rev1) && (!strstr(capabilities, "LOGIN")))
{
report(stderr,
_("Required LOGIN capability not supported by server\n"));
GT_("Required LOGIN capability not supported by server\n"));
}
#endif /* __UNUSED__ */
......@@ -493,7 +493,7 @@ static int imap_getrange(int sock,
ok = imap_idle(sock);
if (ok || gen_transact(sock, "NOOP"))
{
report(stderr, _("re-poll failed\n"));
report(stderr, GT_("re-poll failed\n"));
return(ok);
}
else if (count == -1) /* no EXISTS response to NOOP/IDLE */
......@@ -501,7 +501,7 @@ static int imap_getrange(int sock,
count = 0;
}
if (outlevel >= O_DEBUG)
report(stdout, _("%d messages waiting after re-poll\n"), count);
report(stdout, GT_("%d messages waiting after re-poll\n"), count);
}
else
{
......@@ -510,11 +510,11 @@ static int imap_getrange(int sock,
folder ? folder : "INBOX");
if (ok != 0)
{
report(stderr, _("mailbox selection failed\n"));
report(stderr, GT_("mailbox selection failed\n"));
return(ok);
}
else if (outlevel >= O_DEBUG)
report(stdout, _("%d messages waiting after first poll\n"), count);
report(stdout, GT_("%d messages waiting after first poll\n"), count);
/* no messages? then we may need to idle until we get some */
if (count == 0 && do_idle)
......@@ -537,7 +537,7 @@ static int imap_getrange(int sock,
ok = gen_recv(sock, buf, sizeof(buf));
if (ok != 0)
{
report(stderr, _("search for unseen messages failed\n"));
report(stderr, GT_("search for unseen messages failed\n"));
return(PS_PROTOCOL);
}
else if ((cp = strstr(buf, "* SEARCH")))
......@@ -561,7 +561,7 @@ static int imap_getrange(int sock,
if (outlevel >= O_DEBUG)
report(stdout,
_("%u is unseen\n"),
GT_("%u is unseen\n"),
unseen_messages[unseen]);
unseen++;
......
......@@ -96,7 +96,7 @@ void interface_init(void)
}
}
static int _get_ifinfo_(int socket_fd, FILE *stats_file, const char *ifname,
static int _get_ifinfoGT_(int socket_fd, FILE *stats_file, const char *ifname,
ifinfo_t *ifinfo)
/* get active network interface information - return non-zero upon success */
{
......@@ -176,7 +176,7 @@ static int get_ifinfo(const char *ifname, ifinfo_t *ifinfo)
if (sp)
*sp = '\0';
result = _get_ifinfo_(socket_fd, stats_file, ifname, ifinfo);
result = _get_ifinfoGT_(socket_fd, stats_file, ifname, ifinfo);
if (sp)
*sp = '/';
}
......@@ -252,7 +252,7 @@ get_ifinfo(const char *ifname, ifinfo_t *ifinfo)
{
if (!openkvm())
{
report(stderr, 0, _("Unable to open kvm interface. Make sure fetchmail is SGID kmem."));
report(stderr, 0, GT_("Unable to open kvm interface. Make sure fetchmail is SGID kmem."));
if (if_egid)
setegid(if_rgid);
exit(1);
......@@ -397,7 +397,7 @@ get_ifinfo(const char *ifname, ifinfo_t *ifinfo)
if (i == 0 || i == sizeof(iname))
{
report(stderr, _("Unable to parse interface name from %s"), ifname);
report(stderr, GT_("Unable to parse interface name from %s"), ifname);
return 0;
}
......@@ -419,19 +419,19 @@ get_ifinfo(const char *ifname, ifinfo_t *ifinfo)
if (sysctl(mib, 6, NULL, &needed, NULL, 0) == -1)
{
report(stderr,
_("get_ifinfo: sysctl (iflist estimate) failed"));
GT_("get_ifinfo: sysctl (iflist estimate) failed"));
exit(1);
}
if ((buf = malloc(needed)) == NULL)
{
report(stderr,
_("get_ifinfo: malloc failed"));
GT_("get_ifinfo: malloc failed"));
exit(1);
}
if (sysctl(mib, 6, buf, &needed, NULL, 0) == -1)
{
report(stderr,
_("get_ifinfo: sysctl (iflist) failed"));
GT_("get_ifinfo: sysctl (iflist) failed"));
exit(1);
}
......@@ -449,7 +449,7 @@ get_ifinfo(const char *ifname, ifinfo_t *ifinfo)
if (ifm->ifm_version != RTM_VERSION)
{
report(stderr,
_("Routing message version %d not understood."),
GT_("Routing message version %d not understood."),
ifm->ifm_version);
exit(1);
}
......@@ -481,7 +481,7 @@ get_ifinfo(const char *ifname, ifinfo_t *ifinfo)
if (ifindex < 0)
{
/* we did not find an interface with a matching name */
report(stderr, _("No interface found with name %s"), iname);
report(stderr, GT_("No interface found with name %s"), iname);
goto get_ifinfo_end;
}
......@@ -539,7 +539,7 @@ get_ifinfo(const char *ifname, ifinfo_t *ifinfo)
if (rc == 0)
{
report(stderr, _("No IP address found for %s"), iname);
report(stderr, GT_("No IP address found for %s"), iname);
}
get_ifinfo_end:
......@@ -591,7 +591,7 @@ void interface_parse(char *buf, struct hostdata *hp)
if (!(cp1 = strchr(buf, '/')))
{
(void) report(stderr,
_("missing IP interface address\n"));
GT_("missing IP interface address\n"));
exit(PS_SYNTAX);
}
*cp1++ = '\000';
......@@ -607,13 +607,13 @@ void interface_parse(char *buf, struct hostdata *hp)
if (!inet_aton(cp1, &hp->interface_pair->interface_address))
{
(void) report(stderr,
_("invalid IP interface address\n"));
GT_("invalid IP interface address\n"));
exit(PS_SYNTAX);
}
if (!inet_aton(cp2, &hp->interface_pair->interface_mask))
{
(void) report(stderr,
_("invalid IP interface mask\n"));
GT_("invalid IP interface mask\n"));
exit(PS_SYNTAX);
}
/* apply the mask now to the IP address (range) required */
......@@ -652,7 +652,7 @@ void interface_note_activity(struct hostdata *hp)
#ifdef ACTIVITY_DEBUG
(void) report(stdout,
_("activity on %s -noted- as %d\n"),
GT_("activity on %s -noted- as %d\n"),
hp->monitor, hp->monitor_io);
#endif
}
......@@ -667,7 +667,7 @@ int interface_approve(struct hostdata *hp, flag domonitor)
/* get interface info */
if (!get_ifinfo(hp->interface, &ifinfo)) {
(void) report(stdout,
_("skipping poll of %s, %s down\n"),
GT_("skipping poll of %s, %s down\n"),
hp->pollname, hp->interface);
return(FALSE);
}
......@@ -686,7 +686,7 @@ int interface_approve(struct hostdata *hp, flag domonitor)
) )
{
(void) report(stdout,
_("skipping poll of %s, %s IP address excluded\n"),
GT_("skipping poll of %s, %s IP address excluded\n"),
hp->pollname, hp->interface);
return(FALSE);
}
......@@ -698,7 +698,7 @@ int interface_approve(struct hostdata *hp, flag domonitor)
#ifdef ACTIVITY_DEBUG
(void) report(stdout,
_("activity on %s checked as %d\n"),
GT_("activity on %s checked as %d\n"),
hp->monitor, hp->monitor_io);
#endif
/* if monitoring, check link for activity if it is up */
......@@ -724,14 +724,14 @@ int interface_approve(struct hostdata *hp, flag domonitor)
if (diff >= 0 && diff <= MONITOR_SLOP)
{
(void) report(stdout,
_("skipping poll of %s, %s inactive\n"),
GT_("skipping poll of %s, %s inactive\n"),
hp->pollname, hp->monitor);
return(FALSE);
}
}
#ifdef ACTIVITY_DEBUG
report(stdout, _("activity on %s was %d, is %d\n"),
report(stdout, GT_("activity on %s was %d, is %d\n"),
hp->monitor, hp->monitor_io,
ifinfo.rx_packets + ifinfo.tx_packets);
#endif
......
......@@ -78,7 +78,7 @@ int lock_state(void)
bkgd = (fscanf(lockfp, "%d %d", &pid, &st) == 2);
if (kill(pid, 0) == -1) {
fprintf(stderr,_("fetchmail: removing stale lockfile\n"));
fprintf(stderr,GT_("fetchmail: removing stale lockfile\n"));
pid = 0;
unlink(lockfile);
}
......@@ -119,7 +119,7 @@ void lock_or_die(void)
}
else
{
fprintf(stderr, _("fetchmail: lock creation failed.\n"));
fprintf(stderr, GT_("fetchmail: lock creation failed.\n"));
exit(PS_EXCLUDE);
}
}
......
......@@ -214,11 +214,11 @@ parse_netrc (file)
{
#ifdef HAVE_ERROR
error_at_line (0, file, ln,
_("warning: found \"%s\" before any host names"),
GT_("warning: found \"%s\" before any host names"),
premature_token);
#else
fprintf (stderr,
_("%s:%d: warning: found \"%s\" before any host names\n"),
GT_("%s:%d: warning: found \"%s\" before any host names\n"),
file, ln, premature_token);
#endif
premature_token = NULL;
......@@ -257,7 +257,7 @@ parse_netrc (file)
else
{
fprintf (stderr, _("%s:%d: warning: unknown token \"%s\"\n"),
fprintf (stderr, GT_("%s:%d: warning: unknown token \"%s\"\n"),
file, ln, tok);
}
}
......
......@@ -50,13 +50,13 @@ static int odmr_getrange(int sock, struct query *ctl, const char *id,
if ((ok = SMTP_ehlo(sock, fetchmailhost, &opts)))
{
report(stderr, _("%s's SMTP listener does not support ESMTP\n"),
report(stderr, GT_("%s's SMTP listener does not support ESMTP\n"),
ctl->server.pollname);
return(ok);
}
else if (!(opts & ESMTP_ATRN))
{
report(stderr, _("%s's SMTP listener does not support ATRN\n"),
report(stderr, GT_("%s's SMTP listener does not support ATRN\n"),
ctl->server.pollname);
return(PS_PROTOCOL);
}
......@@ -94,32 +94,32 @@ static int odmr_getrange(int sock, struct query *ctl, const char *id,
{
case 250: /* OK, turnaround is about to happe */
if (outlevel >= O_SILENT)
report(stdout, _("Turnaround now...\n"));
report(stdout, GT_("Turnaround now...\n"));
break;
case 450: /* ATRN request refused */
if (outlevel >= O_SILENT)
report(stdout, _("ATRN request refused.\n"));
report(stdout, GT_("ATRN request refused.\n"));
return(PS_PROTOCOL);
case 451: /* Unable to process ATRN request now */
report(stderr, _("Unable to process ATRN request now\n"));
report(stderr, GT_("Unable to process ATRN request now\n"));
return(PS_EXCLUDE);
case 453: /* You have no mail */
report(stderr, _("You have no mail.\n"));
report(stderr, GT_("You have no mail.\n"));
return(PS_NOMAIL);
case 502: /* Command not implemented */
report(stderr, _("Command not implemented\n"));
report(stderr, GT_("Command not implemented\n"));
return(PS_PROTOCOL);
case 530: /* Authentication required */
report(stderr, _("Authentication required.\n"));
report(stderr, GT_("Authentication required.\n"));
return(PS_AUTHFAIL);
default:
report(stderr, _("Unknown ODMR error %d\n"), atoi(buf));
report(stderr, GT_("Unknown ODMR error %d\n"), atoi(buf));
return(PS_PROTOCOL);
}
......@@ -222,19 +222,19 @@ int doODMR (struct query *ctl)
int status;
if (ctl->keep) {
fprintf(stderr, _("Option --keep is not supported with ODMR\n"));
fprintf(stderr, GT_("Option --keep is not supported with ODMR\n"));
return(PS_SYNTAX);
}
if (ctl->flush) {
fprintf(stderr, _("Option --flush is not supported with ODMR\n"));
fprintf(stderr, GT_("Option --flush is not supported with ODMR\n"));
return(PS_SYNTAX);
}
if (ctl->mailboxes->id) {
fprintf(stderr, _("Option --remote is not supported with ODMR\n"));
fprintf(stderr, GT_("Option --remote is not supported with ODMR\n"));
return(PS_SYNTAX);
}
if (check_only) {
fprintf(stderr, _("Option --check is not supported with ODMR\n"));
fprintf(stderr, GT_("Option --check is not supported with ODMR\n"));
return(PS_SYNTAX);
}
peek_capable = FALSE;
......
......@@ -194,7 +194,7 @@ static int xatoi(char *s, int *errflagptr)
/* any invalid chars in string? */
if ( (endptr == s) || (*endptr != '\0') ) {
(void) fprintf(stderr, _("String '%s' is not a valid number string.\n"), s);
(void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
(*errflagptr)++;
return 0;
}
......@@ -203,8 +203,8 @@ static int xatoi(char *s, int *errflagptr)
if ( (((value == LONG_MAX) || (value == LONG_MIN)) && (errno == ERANGE)) ||
(value > INT_MAX) || (value < INT_MIN)) {
(void) fprintf(stderr, _("Value of string '%s' is %s than %d.\n"), s,
(value < 0) ? _("smaller"): _("larger"),
(void) fprintf(stderr, GT_("Value of string '%s' is %s than %d.\n"), s,
(value < 0) ? GT_("smaller"): GT_("larger"),
(value < 0) ? INT_MIN : INT_MAX);
(*errflagptr)++;
return 0;
......@@ -238,7 +238,7 @@ static int xatoi(char *s, int *errflagptr)
/* check for trailing garbage */
if (i != len) {
(void) fprintf(stderr, _("String '%s' is not a valid number string.\n"), s);
(void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
(*errflagptr)++;
return 0;
}
......@@ -376,7 +376,7 @@ struct query *ctl; /* option record to be initialized */
else if (strcasecmp(optarg,"odmr") == 0)
ctl->server.protocol = P_ODMR;
else {
fprintf(stderr,_("Invalid protocol `%s' specified.\n"), optarg);
fprintf(stderr,GT_("Invalid protocol `%s' specified.\n"), optarg);
errflag++;
}
break;
......@@ -420,7 +420,7 @@ struct query *ctl; /* option record to be initialized */
else if (strcmp(optarg, "any") == 0)
ctl->server.authenticate = A_ANY;
else {
fprintf(stderr,_("Invalid authentication `%s' specified.\n"), optarg);
fprintf(stderr,GT_("Invalid authentication `%s' specified.\n"), optarg);
errflag++;
}
break;
......@@ -550,7 +550,7 @@ struct query *ctl; /* option record to be initialized */
#if NET_SECURITY
ctl->server.netsec = (void *)optarg;
#else
fprintf(stderr, _("fetchmail: network security support is disabled\n"));
fprintf(stderr, GT_("fetchmail: network security support is disabled\n"));
errflag++;
#endif /* NET_SECURITY */
break;
......@@ -643,72 +643,72 @@ struct query *ctl; /* option record to be initialized */
if (errflag || ocount > 1 || helpflag) {
/* squawk if syntax errors were detected */
#define P(s) fputs(s, helpflag ? stdout : stderr)
P(_("usage: fetchmail [options] [server ...]\n"));
P(_(" Options are as follows:\n"));
P(_(" -?, --help display this option help\n"));
P(_(" -V, --version display version info\n"));
P(_(" -c, --check check for messages without fetching\n"));
P(_(" -s, --silent work silently\n"));
P(_(" -v, --verbose work noisily (diagnostic output)\n"));
P(_(" -d, --daemon run as a daemon once per n seconds\n"));
P(_(" -N, --nodetach don't detach daemon process\n"));
P(_(" -q, --quit kill daemon process\n"));
P(_(" -L, --logfile specify logfile name\n"));
P(_(" --syslog use syslog(3) for most messages when running as a daemon\n"));
P(_(" --invisible don't write Received & enable host spoofing\n"));
P(_(" -f, --fetchmailrc specify alternate run control file\n"));
P(_(" -i, --idfile specify alternate UIDs file\n"));
P(_(" --postmaster specify recipient of last resort\n"));
P(_(" --nobounce redirect bounces from user to postmaster.\n"));
P(GT_("usage: fetchmail [options] [server ...]\n"));
P(GT_(" Options are as follows:\n"));
P(GT_(" -?, --help display this option help\n"));
P(GT_(" -V, --version display version info\n"));
P(GT_(" -c, --check check for messages without fetching\n"));
P(GT_(" -s, --silent work silently\n"));
P(GT_(" -v, --verbose work noisily (diagnostic output)\n"));
P(GT_(" -d, --daemon run as a daemon once per n seconds\n"));
P(GT_(" -N, --nodetach don't detach daemon process\n"));
P(GT_(" -q, --quit kill daemon process\n"));
P(GT_(" -L, --logfile specify logfile name\n"));
P(GT_(" --syslog use syslog(3) for most messages when running as a daemon\n"));
P(GT_(" --invisible don't write Received & enable host spoofing\n"));
P(GT_(" -f, --fetchmailrc specify alternate run control file\n"));
P(GT_(" -i, --idfile specify alternate UIDs file\n"));
P(GT_(" --postmaster specify recipient of last resort\n"));
P(GT_(" --nobounce redirect bounces from user to postmaster.\n"));
#if (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__)
P(_(" -I, --interface interface required specification\n"));
P(_(" -M, --monitor monitor interface for activity\n"));
P(GT_(" -I, --interface interface required specification\n"));
P(GT_(" -M, --monitor monitor interface for activity\n"));
#endif
#if defined( SSL_ENABLE )
P(_(" --ssl enable ssl encrypted session\n"));
P(_(" --sslkey ssl private key file\n"));
P(_(" --sslcert ssl client certificate\n"));
P(_(" --sslproto force ssl protocol (ssl2/ssl3/tls1)\n"));
P(GT_(" --ssl enable ssl encrypted session\n"));
P(GT_(" --sslkey ssl private key file\n"));
P(GT_(" --sslcert ssl client certificate\n"));
P(GT_(" --sslproto force ssl protocol (ssl2/ssl3/tls1)\n"));
#endif
P(_(" --plugin specify external command to open connection\n"));
P(_(" --plugout specify external command to open smtp connection\n"));
P(_(" -p, --protocol specify retrieval protocol (see man page)\n"));
P(_(" -U, --uidl force the use of UIDLs (pop3 only)\n"));
P(_(" -P, --port TCP/IP service port to connect to\n"));
P(_(" --auth authentication type (password/kerberos/ssh)\n"));
P(_(" -t, --timeout server nonresponse timeout\n"));
P(_(" -E, --envelope envelope address header\n"));
P(_(" -Q, --qvirtual prefix to remove from local user id\n"));
P(_(" --principal mail service principal\n"));
P(_(" --tracepolls add poll-tracing information to Received header\n"));
P(_(" -u, --username specify users's login on server\n"));
P(_(" -a, --all retrieve old and new messages\n"));
P(_(" -K, --nokeep delete new messages after retrieval\n"));
P(_(" -k, --keep save new messages after retrieval\n"));
P(_(" -F, --flush delete old messages from server\n"));
P(_(" -n, --norewrite don't rewrite header addresses\n"));
P(_(" -l, --limit don't fetch messages over given size\n"));
P(_(" -w, --warnings interval between warning mail notification\n"));
P(GT_(" --plugin specify external command to open connection\n"));
P(GT_(" --plugout specify external command to open smtp connection\n"));
P(GT_(" -p, --protocol specify retrieval protocol (see man page)\n"));
P(GT_(" -U, --uidl force the use of UIDLs (pop3 only)\n"));
P(GT_(" -P, --port TCP/IP service port to connect to\n"));
P(GT_(" --auth authentication type (password/kerberos/ssh)\n"));
P(GT_(" -t, --timeout server nonresponse timeout\n"));
P(GT_(" -E, --envelope envelope address header\n"));
P(GT_(" -Q, --qvirtual prefix to remove from local user id\n"));
P(GT_(" --principal mail service principal\n"));
P(GT_(" --tracepolls add poll-tracing information to Received header\n"));
P(GT_(" -u, --username specify users's login on server\n"));
P(GT_(" -a, --all retrieve old and new messages\n"));
P(GT_(" -K, --nokeep delete new messages after retrieval\n"));
P(GT_(" -k, --keep save new messages after retrieval\n"));
P(GT_(" -F, --flush delete old messages from server\n"));
P(GT_(" -n, --norewrite don't rewrite header addresses\n"));
P(GT_(" -l, --limit don't fetch messages over given size\n"));
P(GT_(" -w, --warnings interval between warning mail notification\n"));
#if NET_SECURITY
P(_(" -T, --netsec set IP security request\n"));
P(GT_(" -T, --netsec set IP security request\n"));
#endif /* NET_SECURITY */
P(_(" -S, --smtphost set SMTP forwarding host\n"));
P(_(" --fetchdomains fetch mail for specified domains\n"));
P(_(" -D, --smtpaddress set SMTP delivery domain to use\n"));
P(_(" --smtpname set SMTP full name [email protected]\n"));
P(_(" -Z, --antispam, set antispam response values\n"));
P(_(" -b, --batchlimit set batch limit for SMTP connections\n"));
P(_(" -B, --fetchlimit set fetch limit for server connections\n"));