#define LA_RCFILE 13
#define LA_IDFILE 14
#define LA_POSTMASTER 15
-#define LA_PROTOCOL 16
-#define LA_UIDL 17
-#define LA_PORT 18
-#define LA_AUTHENTICATE 19
-#define LA_TIMEOUT 20
-#define LA_ENVELOPE 21
-#define LA_QVIRTUAL 22
-#define LA_USERNAME 23
-#define LA_ALL 24
-#define LA_NOKEEP 25
-#define LA_KEEP 26
-#define LA_FLUSH 27
-#define LA_NOREWRITE 28
-#define LA_LIMIT 29
-#define LA_WARNINGS 30
-#define LA_FOLDER 31
-#define LA_SMTPHOST 32
-#define LA_SMTPADDR 33
-#define LA_ANTISPAM 34
-#define LA_BATCHLIMIT 35
-#define LA_FETCHLIMIT 36
-#define LA_EXPUNGE 37
-#define LA_MDA 38
-#define LA_BSMTP 39
-#define LA_LMTP 40
-#define LA_PLUGIN 41
-#define LA_PLUGOUT 42
-#define LA_NETSEC 43
-#define LA_INTERFACE 44
-#define LA_MONITOR 45
-#define LA_CONFIGDUMP 46
-#define LA_YYDEBUG 47
+#define LA_NOBOUNCE 16
+#define LA_PROTOCOL 17
+#define LA_UIDL 18
+#define LA_PORT 19
+#define LA_AUTH 20
+#define LA_TIMEOUT 21
+#define LA_ENVELOPE 22
+#define LA_QVIRTUAL 23
+#define LA_USERNAME 24
+#define LA_ALL 25
+#define LA_NOKEEP 26
+#define LA_KEEP 27
+#define LA_FLUSH 28
+#define LA_NOREWRITE 29
+#define LA_LIMIT 30
+#define LA_WARNINGS 31
+#define LA_FOLDER 32
+#define LA_SMTPHOST 33
+#define LA_FETCHDOMAINS 34
+#define LA_SMTPADDR 35
+#define LA_ANTISPAM 36
+#define LA_BATCHLIMIT 37
+#define LA_FETCHLIMIT 38
+#define LA_EXPUNGE 39
+#define LA_MDA 40
+#define LA_BSMTP 41
+#define LA_LMTP 42
+#define LA_PLUGIN 43
+#define LA_PLUGOUT 44
+#define LA_NETSEC 45
+#define LA_INTERFACE 46
+#define LA_MONITOR 47
+#define LA_CONFIGDUMP 48
+#define LA_YYDEBUG 49
+#define LA_SMTPNAME 50
+#define LA_SHOWDOTS 51
+#define LA_PRINCIPAL 52
+#define LA_TRACEPOLLS 53
+
+#ifdef SSL_ENABLE
+#define LA_SSL 54
+#define LA_SSLKEY 55
+#define LA_SSLCERT 56
+#define LA_SSLPROTO 57
+#define LA_SSLCERTCK 58
+#define LA_SSLCERTPATH 59
+#define LA_SSLFINGERPRINT 60
+#endif
+
+#define LA_FETCHSIZELIMIT 61
+#define LA_FASTUIDL 62
/* options still left: CDgGhHjJoORwWxXYz */
static const char *shortoptions =
- "?Vcsvd:NqL:f:i:p:UP:A:t:E:Q:u:akKFnl:r:S:Z:b:B:e:m:T:I:M:yw:";
+ "?Vcsvd:NqL:f:i:p:UP:A:t:E:Q:u:akKFnl:r:S:Z:b:B:e:m:T:I:M:yw:D:";
static const struct option longoptions[] = {
/* this can be const because all flag fields are 0 and will never get set */
{"quit", no_argument, (int *) 0, LA_QUIT },
{"logfile", required_argument, (int *) 0, LA_LOGFILE },
{"invisible", no_argument, (int *) 0, LA_INVISIBLE },
+ {"showdots", no_argument, (int *) 0, LA_SHOWDOTS },
{"syslog", no_argument, (int *) 0, LA_SYSLOG },
{"nosyslog", no_argument, (int *) 0, LA_NOSYSLOG },
{"fetchmailrc",required_argument,(int *) 0, LA_RCFILE },
{"idfile", required_argument, (int *) 0, LA_IDFILE },
{"postmaster",required_argument, (int *) 0, LA_POSTMASTER },
+ {"nobounce", no_argument, (int *) 0, LA_NOBOUNCE },
{"protocol", required_argument, (int *) 0, LA_PROTOCOL },
{"proto", required_argument, (int *) 0, LA_PROTOCOL },
{"uidl", no_argument, (int *) 0, LA_UIDL },
{"port", required_argument, (int *) 0, LA_PORT },
- {"auth", required_argument, (int *) 0, LA_AUTHENTICATE},
+ {"auth", required_argument, (int *) 0, LA_AUTH},
{"timeout", required_argument, (int *) 0, LA_TIMEOUT },
{"envelope", required_argument, (int *) 0, LA_ENVELOPE },
{"qvirtual", required_argument, (int *) 0, LA_QVIRTUAL },
{"folder", required_argument, (int *) 0, LA_FOLDER },
{"smtphost", required_argument, (int *) 0, LA_SMTPHOST },
+ {"fetchdomains", required_argument, (int *) 0, LA_FETCHDOMAINS },
{"smtpaddress", required_argument, (int *) 0, LA_SMTPADDR },
+ {"smtpname", required_argument, (int *) 0, LA_SMTPNAME },
{"antispam", required_argument, (int *) 0, LA_ANTISPAM },
{"batchlimit",required_argument, (int *) 0, LA_BATCHLIMIT },
{"fetchlimit",required_argument, (int *) 0, LA_FETCHLIMIT },
+ {"fetchsizelimit",required_argument, (int *) 0, LA_FETCHSIZELIMIT },
+ {"fastuidl", required_argument, (int *) 0, LA_FASTUIDL },
{"expunge", required_argument, (int *) 0, LA_EXPUNGE },
{"mda", required_argument, (int *) 0, LA_MDA },
{"bsmtp", required_argument, (int *) 0, LA_BSMTP },
{"lmtp", no_argument, (int *) 0, LA_LMTP },
-#ifdef INET6
+#ifdef INET6_ENABLE
{"netsec", required_argument, (int *) 0, LA_NETSEC },
-#endif /* INET6 */
+#endif /* INET6_ENABLE */
+
+#ifdef SSL_ENABLE
+ {"ssl", no_argument, (int *) 0, LA_SSL },
+ {"sslkey", required_argument, (int *) 0, LA_SSLKEY },
+ {"sslcert", required_argument, (int *) 0, LA_SSLCERT },
+ {"sslproto", required_argument, (int *) 0, LA_SSLPROTO },
+ {"sslcertck", no_argument, (int *) 0, LA_SSLCERTCK },
+ {"sslcertpath", required_argument, (int *) 0, LA_SSLCERTPATH },
+ {"sslfingerprint", required_argument, (int *) 0, LA_SSLFINGERPRINT },
+#endif
-#if (defined(linux) && !INET6) || defined(__FreeBSD__)
+ {"principal", required_argument, (int *) 0, LA_PRINCIPAL },
+
+#if (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__)
{"interface", required_argument, (int *) 0, LA_INTERFACE },
{"monitor", required_argument, (int *) 0, LA_MONITOR },
-#endif /* (defined(linux) && !INET6) || defined(__FreeBSD__) */
+#endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */
{"plugin", required_argument, (int *) 0, LA_PLUGIN },
{"plugout", required_argument, (int *) 0, LA_PLUGOUT },
{"yydebug", no_argument, (int *) 0, LA_YYDEBUG },
+ {"tracepolls",no_argument, (int *) 0, LA_TRACEPOLLS },
+
{(char *) 0, no_argument, (int *) 0, 0 }
};
/* any invalid chars in string? */
if ( (endptr == s) || (*endptr != '\0') ) {
- (void) fprintf(stderr, _("String '%s' is not a valid number string.\n"), s);
+ (void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
(*errflagptr)++;
return 0;
}
if ( (((value == LONG_MAX) || (value == LONG_MIN)) && (errno == ERANGE)) ||
(value > INT_MAX) || (value < INT_MIN)) {
- (void) fprintf(stderr, _("Value of string '%s' is %s than %d.\n"), s,
- (value < 0) ? _("smaller"): _("larger"),
+ (void) fprintf(stderr, GT_("Value of string '%s' is %s than %d.\n"), s,
+ (value < 0) ? GT_("smaller"): GT_("larger"),
(value < 0) ? INT_MIN : INT_MAX);
(*errflagptr)++;
return 0;
/* check for trailing garbage */
if (i != len) {
- (void) fprintf(stderr, _("String '%s' is not a valid number string.\n"), s);
+ (void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
(*errflagptr)++;
return 0;
}
while (!errflag &&
(c = getopt_long(argc,argv,shortoptions,
- longoptions,&option_index)) != -1) {
-
+ longoptions, &option_index)) != -1)
+ {
switch (c) {
case 'V':
case LA_VERSION:
break;
case 'L':
case LA_LOGFILE:
- rctl->logfile = optarg;
+ rctl->logfile = prependdir (optarg, currentwd);
break;
case LA_INVISIBLE:
rctl->invisible = TRUE;
break;
+ case LA_SHOWDOTS:
+ rctl->showdots = FLAG_TRUE;
+ break;
case 'f':
case LA_RCFILE:
- rcfile = (char *) xmalloc(strlen(optarg)+1);
- strcpy(rcfile,optarg);
+ rcfile = prependdir (optarg, currentwd);
break;
case 'i':
case LA_IDFILE:
- rctl->idfile = (char *) xmalloc(strlen(optarg)+1);
- strcpy(rctl->idfile,optarg);
+ rctl->idfile = prependdir (optarg, currentwd);
break;
case LA_POSTMASTER:
- rctl->postmaster = (char *) xmalloc(strlen(optarg)+1);
- strcpy(rctl->postmaster,optarg);
+ rctl->postmaster = (char *) xstrdup(optarg);
+ break;
+ case LA_NOBOUNCE:
+ run.bouncemail = FALSE;
break;
case 'p':
case LA_PROTOCOL:
else if (strcasecmp(optarg,"kpop") == 0)
{
ctl->server.protocol = P_POP3;
-#if INET6
+#ifdef INET6_ENABLE
ctl->server.service = KPOP_PORT;
-#else /* INET6 */
+#else /* INET6_ENABLE */
ctl->server.port = KPOP_PORT;
-#endif /* INET6 */
+#endif /* INET6_ENABLE */
#ifdef KERBEROS_V5
- ctl->server.preauthenticate = A_KERBEROS_V5;
+ ctl->server.authenticate = A_KERBEROS_V5;
#else
- ctl->server.preauthenticate = A_KERBEROS_V4;
+ ctl->server.authenticate = A_KERBEROS_V4;
#endif /* KERBEROS_V5 */
}
else if (strcasecmp(optarg,"imap") == 0)
ctl->server.protocol = P_IMAP;
-#ifdef KERBEROS_V4
- else if (strcasecmp(optarg,"imap-k4") == 0)
- ctl->server.protocol = P_IMAP_K4;
-#endif /* KERBEROS_V4 */
-#ifdef GSSAPI
- else if (strcasecmp(optarg, "imap-gss") == 0)
- ctl->server.protocol = P_IMAP_GSS;
-#endif /* GSSAPI */
else if (strcasecmp(optarg,"etrn") == 0)
ctl->server.protocol = P_ETRN;
+ else if (strcasecmp(optarg,"odmr") == 0)
+ ctl->server.protocol = P_ODMR;
else {
- fprintf(stderr,_("Invalid protocol `%s' specified.\n"), optarg);
+ fprintf(stderr,GT_("Invalid protocol `%s' specified.\n"), optarg);
errflag++;
}
break;
break;
case 'P':
case LA_PORT:
-#if INET6
+#ifdef INET6_ENABLE
ctl->server.service = optarg;
-#else /* INET6 */
+#else /* INET6_ENABLE */
ctl->server.port = xatoi(optarg, &errflag);
-#endif /* INET6 */
+#endif /* INET6_ENABLE */
break;
- case 'A':
- case LA_AUTHENTICATE:
+ case LA_AUTH:
if (strcmp(optarg, "password") == 0)
- ctl->server.preauthenticate = A_PASSWORD;
+ ctl->server.authenticate = A_PASSWORD;
else if (strcmp(optarg, "kerberos") == 0)
#ifdef KERBEROS_V5
- ctl->server.preauthenticate = A_KERBEROS_V5;
+ ctl->server.authenticate = A_KERBEROS_V5;
#else
- ctl->server.preauthenticate = A_KERBEROS_V4;
+ ctl->server.authenticate = A_KERBEROS_V4;
#endif /* KERBEROS_V5 */
else if (strcmp(optarg, "kerberos_v5") == 0)
- ctl->server.preauthenticate = A_KERBEROS_V5;
+ ctl->server.authenticate = A_KERBEROS_V5;
else if (strcmp(optarg, "kerberos_v4") == 0)
- ctl->server.preauthenticate = A_KERBEROS_V4;
+ ctl->server.authenticate = A_KERBEROS_V4;
+ else if (strcmp(optarg, "ssh") == 0)
+ ctl->server.authenticate = A_SSH;
+ else if (strcmp(optarg, "otp") == 0)
+ ctl->server.authenticate = A_OTP;
+ else if (strcmp(optarg, "opie") == 0)
+ ctl->server.authenticate = A_OTP;
+ else if (strcmp(optarg, "ntlm") == 0)
+ ctl->server.authenticate = A_NTLM;
+ else if (strcmp(optarg, "cram") == 0)
+ ctl->server.authenticate = A_CRAM_MD5;
+ else if (strcmp(optarg, "cram-md5") == 0)
+ ctl->server.authenticate = A_CRAM_MD5;
+ else if (strcmp(optarg, "gssapi") == 0)
+ ctl->server.authenticate = A_GSSAPI;
+ else if (strcmp(optarg, "any") == 0)
+ ctl->server.authenticate = A_ANY;
else {
- fprintf(stderr,_("Invalid preauthentication `%s' specified.\n"), optarg);
+ fprintf(stderr,GT_("Invalid authentication `%s' specified.\n"), optarg);
errflag++;
}
break;
case 'l':
case LA_LIMIT:
c = xatoi(optarg, &errflag);
- ctl->limit = NUM_VALUE(c);
+ ctl->limit = NUM_VALUE_IN(c);
break;
case 'r':
case LA_FOLDER:
- xalloca(buf, char *, strlen(optarg));
+ xalloca(buf, char *, strlen(optarg) + 1);
strcpy(buf, optarg);
cp = strtok(buf, ",");
do {
break;
case 'S':
case LA_SMTPHOST:
- xalloca(buf, char *, strlen(optarg));
+ xalloca(buf, char *, strlen(optarg) + 1);
strcpy(buf, optarg);
cp = strtok(buf, ",");
do {
((cp = strtok((char *)NULL, ",")));
ocount++;
break;
+ case LA_FETCHDOMAINS:
+ xalloca(buf, char *, strlen(optarg) + 1);
+ strcpy(buf, optarg);
+ cp = strtok(buf, ",");
+ do {
+ save_str(&ctl->domainlist, cp, TRUE);
+ } while
+ ((cp = strtok((char *)NULL, ",")));
+ break;
case 'D':
case LA_SMTPADDR:
ctl->smtpaddress = xstrdup(optarg);
break;
+ case LA_SMTPNAME:
+ ctl->smtpname = xstrdup(optarg);
+ break;
case 'Z':
case LA_ANTISPAM:
- xalloca(buf, char *, strlen(optarg));
+ xalloca(buf, char *, strlen(optarg) + 1);
strcpy(buf, optarg);
cp = strtok(buf, ",");
do {
struct idlist *idp = save_str(&ctl->antispam, NULL, 0);;
- idp->val.status.num = atoi(cp);
+ idp->val.status.num = xatoi(cp, &errflag);
} while
((cp = strtok((char *)NULL, ",")));
break;
case 'b':
case LA_BATCHLIMIT:
c = xatoi(optarg, &errflag);
- ctl->batchlimit = NUM_VALUE(c);
+ ctl->batchlimit = NUM_VALUE_IN(c);
break;
case 'B':
case LA_FETCHLIMIT:
c = xatoi(optarg, &errflag);
- ctl->fetchlimit = NUM_VALUE(c);
+ ctl->fetchlimit = NUM_VALUE_IN(c);
+ break;
+ case LA_FETCHSIZELIMIT:
+ c = xatoi(optarg, &errflag);
+ ctl->fetchsizelimit = NUM_VALUE_IN(c);
+ break;
+ case LA_FASTUIDL:
+ c = xatoi(optarg, &errflag);
+ ctl->fastuidl = NUM_VALUE_IN(c);
break;
case 'e':
case LA_EXPUNGE:
c = xatoi(optarg, &errflag);
- ctl->expunge = NUM_VALUE(c);
+ ctl->expunge = NUM_VALUE_IN(c);
break;
case 'm':
case LA_MDA:
ocount++;
break;
case LA_BSMTP:
- ctl->bsmtp = xstrdup(optarg);
+ ctl->bsmtp = prependdir (optarg, currentwd);
ocount++;
break;
case LA_LMTP:
case 'T':
case LA_NETSEC:
-#if NET_SECURITY
+#ifdef NET_SECURITY
ctl->server.netsec = (void *)optarg;
#else
- fprintf(stderr, _("fetchmail: network security support is disabled\n"));
+ fprintf(stderr, GT_("fetchmail: network security support is disabled\n"));
errflag++;
#endif /* NET_SECURITY */
break;
-#if (defined(linux) && !INET6) || defined(__FreeBSD__)
+#if (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__)
case 'I':
case LA_INTERFACE:
interface_parse(optarg, &ctl->server);
case LA_MONITOR:
ctl->server.monitor = xstrdup(optarg);
break;
-#endif /* (defined(linux) && !INET6) || defined(__FreeBSD__) */
+#endif /* (defined(linux) && !INET6_ENABLE) || defined(__FreeBSD__) */
case LA_PLUGIN:
ctl->server.plugin = xstrdup(optarg);
break;
ctl->server.plugout = xstrdup(optarg);
break;
+#ifdef SSL_ENABLE
+ case LA_SSL:
+ ctl->use_ssl = FLAG_TRUE;
+ break;
+
+ case LA_SSLKEY:
+ ctl->sslkey = prependdir (optarg, currentwd);
+ break;
+
+ case LA_SSLCERT:
+ ctl->sslcert = prependdir (optarg, currentwd);
+ break;
+
+ case LA_SSLPROTO:
+ ctl->sslproto = xstrdup(optarg);
+ break;
+
+ case LA_SSLCERTCK:
+ ctl->sslcertck = FLAG_TRUE;
+ break;
+
+ case LA_SSLCERTPATH:
+ ctl->sslcertpath = prependdir(optarg, currentwd);
+ break;
+
+ case LA_SSLFINGERPRINT:
+ ctl->sslfingerprint = xstrdup(optarg);
+ break;
+#endif
+
+ case LA_PRINCIPAL:
+ ctl->server.principal = xstrdup(optarg);
+ break;
+
case 'y':
case LA_YYDEBUG:
yydebug = TRUE;
case 'w':
case LA_WARNINGS:
c = xatoi(optarg, &errflag);
- ctl->warnings = NUM_VALUE(c);
+ ctl->warnings = NUM_VALUE_IN(c);
break;
case LA_CONFIGDUMP:
rctl->use_syslog = FLAG_FALSE;
break;
+ case LA_TRACEPOLLS:
+ ctl->tracepolls = FLAG_TRUE;
+ break;
+
case '?':
case LA_HELP:
default:
if (errflag || ocount > 1 || helpflag) {
/* squawk if syntax errors were detected */
#define P(s) fputs(s, helpflag ? stdout : stderr)
- P(_("usage: fetchmail [options] [server ...]\n"));
- P(_(" Options are as follows:\n"));
- P(_(" -?, --help display this option help\n"));
- P(_(" -V, --version display version info\n"));
-
- P(_(" -c, --check check for messages without fetching\n"));
- P(_(" -s, --silent work silently\n"));
- P(_(" -v, --verbose work noisily (diagnostic output)\n"));
- P(_(" -d, --daemon run as a daemon once per n seconds\n"));
- P(_(" -N, --nodetach don't detach daemon process\n"));
- P(_(" -q, --quit kill daemon process\n"));
- P(_(" -L, --logfile specify logfile name\n"));
- P(_(" --syslog use syslog(3) for most messages when running as a daemon\n"));
- P(_(" --invisible don't write Received & enable host spoofing\n"));
- P(_(" -f, --fetchmailrc specify alternate run control file\n"));
- P(_(" -i, --idfile specify alternate UIDs file\n"));
- P(_(" --postmaster specify recipient of last resort\n"));
-#if (defined(linux) && !INET6) || defined(__FreeBSD__)
- P(_(" -I, --interface interface required specification\n"));
- P(_(" -M, --monitor monitor interface for activity\n"));
+ P(GT_("usage: fetchmail [options] [server ...]\n"));
+ P(GT_(" Options are as follows:\n"));
+ P(GT_(" -?, --help display this option help\n"));
+ P(GT_(" -V, --version display version info\n"));
+
+ P(GT_(" -c, --check check for messages without fetching\n"));
+ P(GT_(" -s, --silent work silently\n"));
+ P(GT_(" -v, --verbose work noisily (diagnostic output)\n"));
+ P(GT_(" -d, --daemon run as a daemon once per n seconds\n"));
+ P(GT_(" -N, --nodetach don't detach daemon process\n"));
+ P(GT_(" -q, --quit kill daemon process\n"));
+ P(GT_(" -L, --logfile specify logfile name\n"));
+ P(GT_(" --syslog use syslog(3) for most messages when running as a daemon\n"));
+ P(GT_(" --invisible don't write Received & enable host spoofing\n"));
+ P(GT_(" -f, --fetchmailrc specify alternate run control file\n"));
+ P(GT_(" -i, --idfile specify alternate UIDs file\n"));
+ P(GT_(" --postmaster specify recipient of last resort\n"));
+ P(GT_(" --nobounce redirect bounces from user to postmaster.\n"));
+#if (defined(linux) && !defined(INET6_ENABLE)) || defined(__FreeBSD__)
+ P(GT_(" -I, --interface interface required specification\n"));
+ P(GT_(" -M, --monitor monitor interface for activity\n"));
+#endif
+#if defined( SSL_ENABLE )
+ P(GT_(" --ssl enable ssl encrypted session\n"));
+ P(GT_(" --sslkey ssl private key file\n"));
+ P(GT_(" --sslcert ssl client certificate\n"));
+ P(GT_(" --sslcertpath path to ssl certificates\n"));
+ P(GT_(" --sslfingerprint fingerprint that must match that of the server's cert.\n"));
+ P(GT_(" --sslproto force ssl protocol (ssl2/ssl3/tls1)\n"));
#endif
- P(_(" --plugin specify external command to open connection\n"));
- P(_(" --plugout specify external command to open smtp connection\n"));
-
- P(_(" -p, --protocol specify retrieval protocol (see man page)\n"));
- P(_(" -U, --uidl force the use of UIDLs (pop3 only)\n"));
- P(_(" -P, --port TCP/IP service port to connect to\n"));
- P(_(" -A, --auth authentication type (password or kerberos)\n"));
- P(_(" -t, --timeout server nonresponse timeout\n"));
- P(_(" -E, --envelope envelope address header\n"));
- P(_(" -Q, --qvirtual prefix to remove from local user id\n"));
-
- P(_(" -u, --username specify users's login on server\n"));
- P(_(" -a, --all retrieve old and new messages\n"));
- P(_(" -K, --nokeep delete new messages after retrieval\n"));
- P(_(" -k, --keep save new messages after retrieval\n"));
- P(_(" -F, --flush delete old messages from server\n"));
- P(_(" -n, --norewrite don't rewrite header addresses\n"));
- P(_(" -l, --limit don't fetch messages over given size\n"));
- P(_(" -w, --warnings interval between warning mail notification\n"));
-
-#if NET_SECURITY
- P(_(" -T, --netsec set IP security request\n"));
+ P(GT_(" --plugin specify external command to open connection\n"));
+ P(GT_(" --plugout specify external command to open smtp connection\n"));
+
+ P(GT_(" -p, --protocol specify retrieval protocol (see man page)\n"));
+ P(GT_(" -U, --uidl force the use of UIDLs (pop3 only)\n"));
+ P(GT_(" -P, --port TCP/IP service port to connect to\n"));
+ P(GT_(" --auth authentication type (password/kerberos/ssh/otp)\n"));
+ P(GT_(" -t, --timeout server nonresponse timeout\n"));
+ P(GT_(" -E, --envelope envelope address header\n"));
+ P(GT_(" -Q, --qvirtual prefix to remove from local user id\n"));
+ P(GT_(" --principal mail service principal\n"));
+ P(GT_(" --tracepolls add poll-tracing information to Received header\n"));
+
+ P(GT_(" -u, --username specify users's login on server\n"));
+ P(GT_(" -a, --all retrieve old and new messages\n"));
+ P(GT_(" -K, --nokeep delete new messages after retrieval\n"));
+ P(GT_(" -k, --keep save new messages after retrieval\n"));
+ P(GT_(" -F, --flush delete old messages from server\n"));
+ P(GT_(" -n, --norewrite don't rewrite header addresses\n"));
+ P(GT_(" -l, --limit don't fetch messages over given size\n"));
+ P(GT_(" -w, --warnings interval between warning mail notification\n"));
+
+#ifdef NET_SECURITY
+ P(GT_(" -T, --netsec set IP security request\n"));
#endif /* NET_SECURITY */
- P(_(" -S, --smtphost set SMTP forwarding host\n"));
- P(_(" -D, --smtpaddress set SMTP delivery domain to use\n"));
- P(_(" -Z, --antispam, set antispam response values\n"));
- P(_(" -b, --batchlimit set batch limit for SMTP connections\n"));
- P(_(" -B, --fetchlimit set fetch limit for server connections\n"));
- P(_(" -e, --expunge set max deletions between expunges\n"));
- P(_(" --mda set MDA to use for forwarding\n"));
- P(_(" --bsmtp set output BSMTP file\n"));
- P(_(" --lmtp use LMTP (RFC2033) for delivery\n"));
- P(_(" -r, --folder specify remote folder name\n"));
+ P(GT_(" -S, --smtphost set SMTP forwarding host\n"));
+ P(GT_(" --fetchdomains fetch mail for specified domains\n"));
+ P(GT_(" -D, --smtpaddress set SMTP delivery domain to use\n"));
+ P(GT_(" --smtpname set SMTP full name username@domain\n"));
+ P(GT_(" -Z, --antispam, set antispam response values\n"));
+ P(GT_(" -b, --batchlimit set batch limit for SMTP connections\n"));
+ P(GT_(" -B, --fetchlimit set fetch limit for server connections\n"));
+ P(GT_(" --fetchsizelimit set fetch message size limit\n"));
+ P(GT_(" --fastuidl do a binary search for UIDLs\n"));
+ P(GT_(" -e, --expunge set max deletions between expunges\n"));
+ P(GT_(" -m, --mda set MDA to use for forwarding\n"));
+ P(GT_(" --bsmtp set output BSMTP file\n"));
+ P(GT_(" --lmtp use LMTP (RFC2033) for delivery\n"));
+ P(GT_(" -r, --folder specify remote folder name\n"));
+ P(GT_(" --showdots show progress dots even in logfiles\n"));
#undef P
if (helpflag)