1 /*
2  * options.c -- command-line option processing
3  *
4  * Copyright 1998 by Eric S. Raymond.
5  * For license terms, see the file COPYING in this directory.
6  */
7 
8 #include "config.h"
9 #include "fetchmail.h"
10 
11 #include <stdio.h>
12 #include <pwd.h>
13 #include <string.h>
14 #include <errno.h>
15 #if defined(STDC_HEADERS)
16 #include  <stdlib.h>
17 #include  <limits.h>
18 #else
19 #include  <ctype.h>
20 #endif
21 
22 #include "getopt.h"
23 #include "fetchmail.h"
24 #include "i18n.h"
25 
26 enum {
27     LA_INVISIBLE = 256,
28     LA_PIDFILE,
29     LA_SYSLOG,
30     LA_NOSYSLOG,
31     LA_POSTMASTER,
32     LA_NOBOUNCE,
33     LA_AUTH,
34     LA_FETCHDOMAINS,
35     LA_BSMTP,
36     LA_LMTP,
37     LA_PLUGIN,
38     LA_PLUGOUT,
39     LA_CONFIGDUMP,
40     LA_SMTPNAME,
41     LA_SHOWDOTS,
42     LA_PRINCIPAL,
43     LA_TRACEPOLLS,
44     LA_SSL,
45     LA_SSLKEY,
46     LA_SSLCERT,
47     LA_SSLPROTO,
48     LA_SSLCERTCK,
49     LA_NOSSLCERTCK,
50     LA_SSLCERTFILE,
51     LA_SSLCERTPATH,
52     LA_SSLCOMMONNAME,
53     LA_SSLFINGERPRINT,
54     LA_FETCHSIZELIMIT,
55     LA_FASTUIDL,
56     LA_LIMITFLUSH,
57     LA_IDLE,
58     LA_NOSOFTBOUNCE,
59     LA_SOFTBOUNCE,
60     LA_BADHEADER
61 };
62 
63 /* options still left: ACgGhHjJoORTWxXYz */
64 static const char *shortoptions =
65 	"?Vcsvd:NqL:f:i:p:UP:t:E:Q:u:akKFnl:r:S:Z:b:B:e:m:I:M:yw:D:";
66 
67 static const struct option longoptions[] = {
68 /* this can be const because all flag fields are 0 and will never get set */
69   {"help",	no_argument,	   (int *) 0, '?' },
70   {"version",	no_argument,	   (int *) 0, 'V' },
71   {"check",	no_argument,	   (int *) 0, 'c' },
72   {"silent",	no_argument,	   (int *) 0, 's' },
73   {"verbose",	no_argument,	   (int *) 0, 'v' },
74   {"daemon",	required_argument, (int *) 0, 'd' },
75   {"nodetach",	no_argument,	   (int *) 0, 'N' },
76   {"quit",	no_argument,	   (int *) 0, 'q' },
77   {"logfile",	required_argument, (int *) 0, 'L' },
78   {"invisible",	no_argument,	   (int *) 0, LA_INVISIBLE },
79   {"showdots",	no_argument,	   (int *) 0, LA_SHOWDOTS },
80   {"syslog",	no_argument,	   (int *) 0, LA_SYSLOG },
81   {"nosyslog",	no_argument,	   (int *) 0, LA_NOSYSLOG },
82   {"fetchmailrc",required_argument,(int *) 0, 'f' },
83   {"idfile",	required_argument, (int *) 0, 'i' },
84   {"pidfile",	required_argument, (int *) 0, LA_PIDFILE },
85   {"postmaster",required_argument, (int *) 0, LA_POSTMASTER },
86   {"nobounce",	no_argument,	   (int *) 0, LA_NOBOUNCE },
87   {"nosoftbounce", no_argument,	   (int *) 0, LA_NOSOFTBOUNCE },
88   {"softbounce", no_argument,	   (int *) 0, LA_SOFTBOUNCE },
89 
90   {"protocol",	required_argument, (int *) 0, 'p' },
91   {"proto",	required_argument, (int *) 0, 'p' },
92   {"uidl",	no_argument,	   (int *) 0, 'U' },
93   {"idle",	no_argument,	   (int *) 0, LA_IDLE},
94   {"port",	required_argument, (int *) 0, 'P' },
95   {"service",	required_argument, (int *) 0, 'P' },
96   {"auth",	required_argument, (int *) 0, LA_AUTH},
97   {"timeout",	required_argument, (int *) 0, 't' },
98   {"envelope",	required_argument, (int *) 0, 'E' },
99   {"qvirtual",	required_argument, (int *) 0, 'Q' },
100   {"bad-header",required_argument, (int *) 0, LA_BADHEADER},
101 
102   {"user",	required_argument, (int *) 0, 'u' },
103   {"username",	required_argument, (int *) 0, 'u' },
104 
105   {"all",	no_argument,	   (int *) 0, 'a' },
106   {"fetchall",	no_argument,	   (int *) 0, 'a' },
107   {"nokeep",	no_argument,	   (int *) 0, 'K' },
108   {"keep",	no_argument,	   (int *) 0, 'k' },
109   {"flush",	no_argument,	   (int *) 0, 'F' },
110   {"limitflush",	no_argument, (int *) 0, LA_LIMITFLUSH },
111   {"norewrite",	no_argument,	   (int *) 0, 'n' },
112   {"limit",	required_argument, (int *) 0, 'l' },
113   {"warnings",	required_argument, (int *) 0, 'w' },
114 
115   {"folder",	required_argument, (int *) 0, 'r' },
116   {"smtphost",	required_argument, (int *) 0, 'S' },
117   {"fetchdomains",	required_argument, (int *) 0, LA_FETCHDOMAINS },
118   {"smtpaddress", required_argument, (int *) 0, 'D' },
119   {"smtpname",	required_argument, (int *) 0, LA_SMTPNAME },
120   {"antispam",	required_argument, (int *) 0, 'Z' },
121 
122   {"batchlimit",required_argument, (int *) 0, 'b' },
123   {"fetchlimit",required_argument, (int *) 0, 'B' },
124   {"fetchsizelimit",required_argument, (int *) 0, LA_FETCHSIZELIMIT },
125   {"fastuidl",	required_argument, (int *) 0, LA_FASTUIDL },
126   {"expunge",	required_argument, (int *) 0, 'e' },
127   {"mda",	required_argument, (int *) 0, 'm' },
128   {"bsmtp",	required_argument, (int *) 0, LA_BSMTP },
129   {"lmtp",	no_argument,	   (int *) 0, LA_LMTP },
130 
131 #ifdef SSL_ENABLE
132   {"ssl",	no_argument,	   (int *) 0, LA_SSL },
133   {"sslkey",	required_argument, (int *) 0, LA_SSLKEY },
134   {"sslcert",	required_argument, (int *) 0, LA_SSLCERT },
135   {"sslproto",	 required_argument, (int *) 0, LA_SSLPROTO },
136   {"sslcertck", no_argument,	   (int *) 0, LA_SSLCERTCK },
137   {"nosslcertck", no_argument,	   (int *) 0, LA_NOSSLCERTCK },
138   {"sslcertfile",   required_argument, (int *) 0, LA_SSLCERTFILE },
139   {"sslcertpath",   required_argument, (int *) 0, LA_SSLCERTPATH },
140   {"sslcommonname",    required_argument, (int *) 0, LA_SSLCOMMONNAME },
141   {"sslfingerprint",   required_argument, (int *) 0, LA_SSLFINGERPRINT },
142 #endif
143 
144   {"principal", required_argument, (int *) 0, LA_PRINCIPAL },
145 
146 #ifdef CAN_MONITOR
147   {"interface",	required_argument, (int *) 0, 'I' },
148   {"monitor",	required_argument, (int *) 0, 'M' },
149 #endif /* CAN_MONITOR */
150   {"plugin",	required_argument, (int *) 0, LA_PLUGIN },
151   {"plugout",	required_argument, (int *) 0, LA_PLUGOUT },
152 
153   {"configdump",no_argument,	   (int *) 0, LA_CONFIGDUMP },
154 
155   {"yydebug",	no_argument,	   (int *) 0, 'y' },
156 
157   {"tracepolls",no_argument,	   (int *) 0, LA_TRACEPOLLS },
158 
159   {(char *) 0,	no_argument,	   (int *) 0, 0 }
160 };
161 
xatoi(char * s,int * errflagptr)162 static int xatoi(char *s, int *errflagptr)
163 /* do safe conversion from string to number */
164 {
165 #if defined (STDC_HEADERS) && defined (LONG_MAX) && defined (INT_MAX)
166     /* parse and convert numbers, but also check for invalid characters in
167      * numbers
168      */
169 
170     char *endptr;
171     long value;
172 
173     errno = 0;
174 
175     value = strtol(s, &endptr, 0);
176 
177     /* any invalid chars in string? */
178     if ( (endptr == s) || (*endptr != '\0') ) {
179     	(void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
180 	(*errflagptr)++;
181 	return 0;
182     }
183 
184     /* is the range valid? */
185     if ( (((value == LONG_MAX) || (value == LONG_MIN)) && (errno == ERANGE)) ||
186 				(value > INT_MAX) || (value < INT_MIN)) {
187 
188     	(void) fprintf(stderr, GT_("Value of string '%s' is %s than %d.\n"), s,
189 					(value < 0) ? GT_("smaller"): GT_("larger"),
190 					(value < 0) ? INT_MIN : INT_MAX);
191 	(*errflagptr)++;
192 	return 0;
193     }
194 
195     return (int) value;  /* shut up, I know what I'm doing */
196 #else
197     int	i;
198     char *dp;
199 # if defined (STDC_HEADERS)
200     size_t	len;
201 # else
202     int		len;
203 # endif
204 
205     /* We do only base 10 conversions here (atoi)! */
206 
207     len = strlen(s);
208     /* check for leading white spaces */
209     for (i = 0; (i < len) && isspace((unsigned char)s[i]); i++)
210     	;
211 
212     dp = &s[i];
213 
214     /* check for +/- */
215     if (i < len && (s[i] == '+' || s[i] == '-'))	i++;
216 
217     /* skip over digits */
218     for ( /* no init */ ; (i < len) && isdigit((unsigned char)s[i]); i++)
219     	;
220 
221     /* check for trailing garbage */
222     if (i != len) {
223     	(void) fprintf(stderr, GT_("String '%s' is not a valid number string.\n"), s);
224     	(*errflagptr)++;
225 	return 0;
226     }
227 
228     /* atoi should be safe by now, except for number range over/underflow */
229     return atoi(dp);
230 #endif
231 }
232 
233 /** parse and validate the command line options */
parsecmdline(int argc,char ** argv,struct runctl * rctl,struct query * ctl,flag * safewithbg)234 int parsecmdline (int argc /** argument count */,
235 		  char **argv /** argument strings */,
236 		  struct runctl *rctl /** global run controls to modify */,
237 		  struct query *ctl /** option record to initialize */,
238 		  flag *safewithbg /** set to whether options are
239 				     compatible with another copy
240 				     running in the background */)
241 {
242     /*
243      * return value: if positive, argv index of last parsed option + 1
244      * (presumes one or more server names follows).  if zero, the
245      * command line switches are such that no server names are
246      * required (e.g. --version).  if negative, the command line is
247      * has one or more syntax errors.
248      */
249 
250     int c;
251     int ocount = 0;	/* count of destinations specified */
252     int errflag = 0;	/* TRUE when a syntax error is detected */
253     int helpflag = 0;	/* TRUE when option help was explicitly requested */
254     int option_index;
255     int option_safe;	/* to track if option currently parsed is safe
256 			   with a background copy */
257     char *buf, *cp;
258 
259     rctl->poll_interval = -1;
260     *safewithbg = TRUE;
261 
262     memset(ctl, '\0', sizeof(struct query));    /* start clean */
263     ctl->smtp_socket = -1;
264 
265     while (!errflag &&
266 	   (c = getopt_long(argc,argv,shortoptions,
267 			    longoptions, &option_index)) != -1)
268     {
269 	option_safe = FALSE;
270 
271 	switch (c) {
272 	case 'V':
273 	    versioninfo = TRUE;
274 	    option_safe = TRUE;
275 	    break;
276 	case 'c':
277 	    check_only = TRUE;
278 	    break;
279 	case 's':
280 	    outlevel = O_SILENT;
281 	    option_safe = 1;
282 	    break;
283 	case 'v':
284 	    if (outlevel >= O_VERBOSE)
285 		outlevel = O_DEBUG;
286 	    else
287 		outlevel = O_VERBOSE;
288 	    option_safe = TRUE;
289 	    break;
290 	case 'd':
291 	    rctl->poll_interval = xatoi(optarg, &errflag);
292 	    break;
293 	case 'N':
294 	    nodetach = TRUE;
295 	    break;
296 	case 'q':
297 	    quitmode = TRUE;
298 	    quitind = optind;
299 	    break;
300 	case 'L':
301 	    rctl->logfile = prependdir (optarg, currentwd);
302 	    break;
303 	case LA_INVISIBLE:
304 	    rctl->invisible = FLAG_TRUE;
305 	    break;
306 	case LA_SHOWDOTS:
307 	    rctl->showdots = FLAG_TRUE;
308 	    break;
309 	case 'f':
310 	    xfree(rcfile);
311 	    rcfile = prependdir (optarg, currentwd);
312 	    break;
313 	case 'i':
314 	    rctl->idfile = prependdir (optarg, currentwd);
315 	    break;
316 	case LA_PIDFILE:
317 	    rctl->pidfile = prependdir (optarg, currentwd);
318 	    break;
319 	case LA_POSTMASTER:
320 	    rctl->postmaster = (char *) xstrdup(optarg);
321 	    break;
322 	case LA_NOBOUNCE:
323 	    rctl->bouncemail = FLAG_FALSE;
324 	    break;
325 	case LA_NOSOFTBOUNCE:
326 	    rctl->softbounce = FLAG_FALSE;
327 	    break;
328 	case LA_SOFTBOUNCE:
329 	    rctl->softbounce = FLAG_TRUE;
330 	    break;
331 	case LA_BADHEADER:
332 	    if (strcasecmp(optarg,"accept") == 0) {
333 		ctl->server.badheader = BHACCEPT;
334 	    } else if (strcasecmp(optarg,"reject") == 0) {
335 		ctl->server.badheader = BHREJECT;
336 	    } else {
337 		fprintf(stderr,GT_("Invalid bad-header policy `%s' specified.\n"), optarg);
338 		errflag++;
339 	    }
340 	    break;
341 
342 	case 'p':
343 	    /* XXX -- should probably use a table lookup here */
344 	    if (strcasecmp(optarg,"auto") == 0)
345 		ctl->server.protocol = P_AUTO;
346 	    else if (strcasecmp(optarg,"pop2") == 0)
347 		ctl->server.protocol = P_POP2;
348 #ifdef SDPS_ENABLE
349 	    else if (strcasecmp(optarg,"sdps") == 0)
350 	    {
351 		ctl->server.protocol = P_POP3;
352 		ctl->server.sdps = TRUE;
353 	    }
354 #endif /* SDPS_ENABLE */
355 	    else if (strcasecmp(optarg,"pop3") == 0)
356 		ctl->server.protocol = P_POP3;
357 	    else if (strcasecmp(optarg,"apop") == 0)
358 		ctl->server.protocol = P_APOP;
359 	    else if (strcasecmp(optarg,"rpop") == 0)
360 		ctl->server.protocol = P_RPOP;
361 	    else if (strcasecmp(optarg,"kpop") == 0)
362 	    {
363 		ctl->server.protocol = P_POP3;
364 		ctl->server.service = xstrdup(KPOP_PORT);
365 #ifdef KERBEROS_V5
366 		ctl->server.authenticate =  A_KERBEROS_V5;
367 #else
368 		ctl->server.authenticate =  A_KERBEROS_V4;
369 #endif /* KERBEROS_V5 */
370 	    }
371 	    else if (strcasecmp(optarg,"imap") == 0)
372 		ctl->server.protocol = P_IMAP;
373 	    else if (strcasecmp(optarg,"etrn") == 0)
374 		ctl->server.protocol = P_ETRN;
375 	    else if (strcasecmp(optarg,"odmr") == 0)
376 		ctl->server.protocol = P_ODMR;
377 	    else {
378 		fprintf(stderr,GT_("Invalid protocol `%s' specified.\n"), optarg);
379 		errflag++;
380 	    }
381 	    break;
382 	case 'U':
383 	    ctl->server.uidl = FLAG_TRUE;
384 	    break;
385 	case LA_IDLE:
386 	    ctl->idle = FLAG_TRUE;
387 	    break;
388 	case 'P':
389 	    ctl->server.service = optarg;
390 	    break;
391 	case LA_AUTH:
392 	    if (strcmp(optarg, "password") == 0)
393 		ctl->server.authenticate = A_PASSWORD;
394 	    else if (strcmp(optarg, "kerberos") == 0)
395 #ifdef KERBEROS_V5
396 		ctl->server.authenticate = A_KERBEROS_V5;
397 #else
398 		ctl->server.authenticate = A_KERBEROS_V4;
399 #endif /* KERBEROS_V5 */
400 	    else if (strcmp(optarg, "kerberos_v5") == 0)
401 		ctl->server.authenticate = A_KERBEROS_V5;
402 	    else if (strcmp(optarg, "kerberos_v4") == 0)
403 		ctl->server.authenticate = A_KERBEROS_V4;
404 	    else if (strcmp(optarg, "ssh") == 0)
405 		ctl->server.authenticate = A_SSH;
406 	    else if (strcasecmp(optarg, "external") == 0)
407 		ctl->server.authenticate = A_EXTERNAL;
408 	    else if (strcmp(optarg, "otp") == 0)
409 		ctl->server.authenticate = A_OTP;
410 	    else if (strcmp(optarg, "opie") == 0)
411 		ctl->server.authenticate = A_OTP;
412 	    else if (strcmp(optarg, "ntlm") == 0)
413 		ctl->server.authenticate = A_NTLM;
414 	    else if (strcmp(optarg, "cram") == 0)
415 		ctl->server.authenticate = A_CRAM_MD5;
416 	    else if (strcmp(optarg, "cram-md5") == 0)
417 		ctl->server.authenticate = A_CRAM_MD5;
418 	    else if (strcmp(optarg, "gssapi") == 0)
419 		ctl->server.authenticate = A_GSSAPI;
420 	    else if (strcmp(optarg, "any") == 0)
421 		ctl->server.authenticate = A_ANY;
422 	    else if (strcmp(optarg, "msn") == 0)
423 		ctl->server.authenticate = A_MSN;
424 	    else {
425 		fprintf(stderr,GT_("Invalid authentication `%s' specified.\n"), optarg);
426 		errflag++;
427 	    }
428 	    break;
429 	case 't':
430 	    ctl->server.timeout = xatoi(optarg, &errflag);
431 	    if (ctl->server.timeout == 0)
432 		ctl->server.timeout = -1;
433 	    break;
434 	case 'E':
435 	    ctl->server.envelope = xstrdup(optarg);
436 	    break;
437 	case 'Q':
438 	    ctl->server.qvirtual = xstrdup(optarg);
439 	    break;
440 
441 	case 'u':
442 	    ctl->remotename = xstrdup(optarg);
443 	    break;
444 	case 'a':
445 	    ctl->fetchall = FLAG_TRUE;
446 	    break;
447 	case 'K':
448 	    ctl->keep = FLAG_FALSE;
449 	    break;
450 	case 'k':
451 	    ctl->keep = FLAG_TRUE;
452 	    break;
453 	case 'F':
454 	    ctl->flush = FLAG_TRUE;
455 	    break;
456 	case LA_LIMITFLUSH:
457 	    ctl->limitflush = FLAG_TRUE;
458 	    break;
459 	case 'n':
460 	    ctl->rewrite = FLAG_FALSE;
461 	    break;
462 	case 'l':
463 	    c = xatoi(optarg, &errflag);
464 	    ctl->limit = NUM_VALUE_IN(c);
465 	    break;
466 	case 'r':
467 	    buf = xstrdup(optarg);
468 	    cp = strtok(buf, ",");
469 	    do {
470 		save_str(&ctl->mailboxes, cp, 0);
471 	    } while
472 		((cp = strtok((char *)NULL, ",")));
473 	    free(buf);
474 	    break;
475 	case 'S':
476 	    buf = xstrdup(optarg);
477 	    cp = strtok(buf, ",");
478 	    do {
479 		save_str(&ctl->smtphunt, cp, TRUE);
480 	    } while
481 		((cp = strtok((char *)NULL, ",")));
482 	    free(buf);
483 	    ocount++;
484 	    break;
485 	case LA_FETCHDOMAINS:
486 	    buf = xstrdup(optarg);
487 	    cp = strtok(buf, ",");
488 	    do {
489 		save_str(&ctl->domainlist, cp, TRUE);
490 	    } while
491 		((cp = strtok((char *)NULL, ",")));
492 	    free(buf);
493 	    break;
494 	case 'D':
495 	    ctl->smtpaddress = xstrdup(optarg);
496 	    break;
497 	case LA_SMTPNAME:
498 	  ctl->smtpname = xstrdup(optarg);
499 	  break;
500 	case 'Z':
501 	    buf = xstrdup(optarg);
502 	    cp = strtok(buf, ",");
503 	    do {
504 		struct idlist	*idp = save_str(&ctl->antispam, STRING_DUMMY, 0);
505 
506 		idp->val.status.num = xatoi(cp, &errflag);
507 	    } while
508 		((cp = strtok((char *)NULL, ",")));
509 	    free(buf);
510 	    break;
511 	case 'b':
512 	    c = xatoi(optarg, &errflag);
513 	    ctl->batchlimit = NUM_VALUE_IN(c);
514 	    break;
515 	case 'B':
516 	    c = xatoi(optarg, &errflag);
517 	    ctl->fetchlimit = NUM_VALUE_IN(c);
518 	    break;
519 	case LA_FETCHSIZELIMIT:
520 	    c = xatoi(optarg, &errflag);
521 	    ctl->fetchsizelimit = NUM_VALUE_IN(c);
522 	    break;
523 	case LA_FASTUIDL:
524 	    c = xatoi(optarg, &errflag);
525 	    ctl->fastuidl = NUM_VALUE_IN(c);
526 	    break;
527 	case 'e':
528 	    c = xatoi(optarg, &errflag);
529 	    ctl->expunge = NUM_VALUE_IN(c);
530 	    break;
531 	case 'm':
532 	    ctl->mda = xstrdup(optarg);
533 	    ocount++;
534 	    break;
535 	case LA_BSMTP:
536 	    ctl->bsmtp = prependdir (optarg, currentwd);
537 	    ocount++;
538 	    break;
539 	case LA_LMTP:
540 	    ctl->listener = LMTP_MODE;
541 	    break;
542 
543 #ifdef CAN_MONITOR
544 	case 'I':
545 	    interface_parse(optarg, &ctl->server);
546 	    break;
547 	case 'M':
548 	    ctl->server.monitor = xstrdup(optarg);
549 	    break;
550 #endif /* CAN_MONITOR */
551 	case LA_PLUGIN:
552 	    ctl->server.plugin = xstrdup(optarg);
553 	    break;
554 	case LA_PLUGOUT:
555 	    ctl->server.plugout = xstrdup(optarg);
556 	    break;
557 
558 #ifdef SSL_ENABLE
559 	case LA_SSL:
560 	    ctl->use_ssl = FLAG_TRUE;
561 	    break;
562 
563 	case LA_SSLKEY:
564 	    ctl->sslkey = prependdir (optarg, currentwd);
565 	    break;
566 
567 	case LA_SSLCERT:
568 	    ctl->sslcert = prependdir (optarg, currentwd);
569 	    break;
570 
571 	case LA_SSLPROTO:
572 	    ctl->sslproto = xstrdup(optarg);
573 	    break;
574 
575 	case LA_SSLCERTCK:
576 	    ctl->sslcertck = FLAG_TRUE;
577 	    break;
578 
579 	case LA_NOSSLCERTCK:
580 	    ctl->sslcertck = FLAG_FALSE;
581 	    break;
582 
583 	case LA_SSLCERTFILE:
584 	    ctl->sslcertfile = prependdir(optarg, currentwd);
585 	    break;
586 
587 	case LA_SSLCERTPATH:
588 	    ctl->sslcertpath = prependdir(optarg, currentwd);
589 	    break;
590 
591 	case LA_SSLCOMMONNAME:
592 	    ctl->sslcommonname = xstrdup(optarg);
593 	    break;
594 
595 	case LA_SSLFINGERPRINT:
596 	    ctl->sslfingerprint = xstrdup(optarg);
597 	    break;
598 #endif
599 
600 	case LA_PRINCIPAL:
601 	    ctl->server.principal = xstrdup(optarg);
602 	    break;
603 
604 	case 'y':
605 	    yydebug = TRUE;
606 	    break;
607 
608 	case 'w':
609 	    c = xatoi(optarg, &errflag);
610 	    ctl->warnings = NUM_VALUE_IN(c);
611 	    break;
612 
613 	case LA_CONFIGDUMP:
614 	    configdump = TRUE;
615 	    option_safe = TRUE;
616 	    break;
617 
618 	case LA_SYSLOG:
619 	    rctl->use_syslog = FLAG_TRUE;
620 	    break;
621 
622 	case LA_NOSYSLOG:
623 	    rctl->use_syslog = FLAG_FALSE;
624 	    break;
625 
626 	case LA_TRACEPOLLS:
627 	    ctl->server.tracepolls = FLAG_TRUE;
628 	    break;
629 
630 	case '?':
631 	    helpflag = 1;
632 	default:
633 	    break;
634 	}
635 	*safewithbg &= option_safe;
636     }
637 
638     if (errflag || ocount > 1 || helpflag) {
639 	/* squawk if syntax errors were detected */
640 #define P(s)    fputs(s, helpflag ? stdout : stderr)
641 	P(GT_("usage:  fetchmail [options] [server ...]\n"));
642 	P(GT_("  Options are as follows:\n"));
643 	P(GT_("  -?, --help        display this option help\n"));
644 	P(GT_("  -V, --version     display version info\n"));
645 
646 	P(GT_("  -c, --check       check for messages without fetching\n"));
647 	P(GT_("  -s, --silent      work silently\n"));
648 	P(GT_("  -v, --verbose     work noisily (diagnostic output)\n"));
649 	P(GT_("  -d, --daemon      run as a daemon once per n seconds\n"));
650 	P(GT_("  -N, --nodetach    don't detach daemon process\n"));
651 	P(GT_("  -q, --quit        kill daemon process\n"));
652 	P(GT_("  -L, --logfile     specify logfile name\n"));
653 	P(GT_("      --syslog      use syslog(3) for most messages when running as a daemon\n"));
654 	P(GT_("      --nosyslog    turns off use of syslog(3)\n"));
655 	P(GT_("      --invisible   don't write Received & enable host spoofing\n"));
656 	P(GT_("  -f, --fetchmailrc specify alternate run control file\n"));
657 	P(GT_("  -i, --idfile      specify alternate UIDs file\n"));
658 	P(GT_("      --pidfile     specify alternate PID (lock) file\n"));
659 	P(GT_("      --postmaster  specify recipient of last resort\n"));
660 	P(GT_("      --nobounce    redirect bounces from user to postmaster.\n"));
661 	P(GT_("      --nosoftbounce fetchmail deletes permanently undeliverable messages.\n"));
662 	P(GT_("      --softbounce  keep permanently undeliverable messages on server (default).\n"));
663 #ifdef CAN_MONITOR
664 	P(GT_("  -I, --interface   interface required specification\n"));
665 	P(GT_("  -M, --monitor     monitor interface for activity\n"));
666 #endif
667 #if defined( SSL_ENABLE )
668 	P(GT_("      --ssl         enable ssl encrypted session\n"));
669 	P(GT_("      --sslkey      ssl private key file\n"));
670 	P(GT_("      --sslcert     ssl client certificate\n"));
671 	P(GT_("      --sslcertck   do strict server certificate check (recommended)\n"));
672 	P(GT_("      --nosslcertck skip strict server certificate check (insecure)\n"));
673 	P(GT_("      --sslcertfile path to trusted-CA ssl certificate file\n"));
674 	P(GT_("      --sslcertpath path to trusted-CA ssl certificate directory\n"));
675 	P(GT_("      --sslcommonname  expect this CommonName from server (discouraged)\n"));
676 	P(GT_("      --sslfingerprint fingerprint that must match that of the server's cert.\n"));
677 	P(GT_("      --sslproto    force ssl protocol (see manual)\n"));
678 #endif
679 	P(GT_("      --plugin      specify external command to open connection\n"));
680 	P(GT_("      --plugout     specify external command to open smtp connection\n"));
681 	P(GT_("      --bad-header {reject|accept}\n"
682 	      "                    specify policy for handling messages with bad headers\n"));
683 
684 	P(GT_("  -p, --proto[col]  specify retrieval protocol (see man page)\n"));
685 	P(GT_("  -U, --uidl        force the use of UIDLs (pop3 only)\n"));
686 	P(GT_("      --idle        tells the IMAP server to send notice of new messages\n"));
687 	P(GT_("      --port        TCP port to connect to (obsolete, use --service)\n"));
688 	P(GT_("  -P, --service     TCP service to connect to (can be numeric TCP port)\n"));
689 	P(GT_("      --auth        authentication type (see manual)\n"));
690 	P(GT_("  -t, --timeout     server nonresponse timeout\n"));
691 	P(GT_("  -E, --envelope    envelope address header\n"));
692 	P(GT_("  -Q, --qvirtual    prefix to remove from local user id\n"));
693 	P(GT_("      --principal   mail service principal\n"));
694 	P(GT_("      --tracepolls  add poll-tracing information to Received header\n"));
695 
696 	P(GT_("  -u, --user[name]  specify users's login on server\n"));
697 	P(GT_("  -a, --[fetch]all  retrieve old and new messages\n"));
698 	P(GT_("  -K, --nokeep      delete new messages after retrieval\n"));
699 	P(GT_("  -k, --keep        save new messages after retrieval\n"));
700 	P(GT_("  -F, --flush       delete old messages from server\n"));
701 	P(GT_("      --limitflush  delete oversized messages\n"));
702 	P(GT_("  -n, --norewrite   don't rewrite header addresses\n"));
703 	P(GT_("  -l, --limit       don't fetch messages over given size\n"));
704 	P(GT_("  -w, --warnings    interval between warning mail notification\n"));
705 
706 	P(GT_("  -S, --smtphost    set SMTP forwarding host\n"));
707 	P(GT_("      --fetchdomains fetch mail for specified domains\n"));
708 	P(GT_("  -D, --smtpaddress set SMTP delivery domain to use\n"));
709 	P(GT_("      --smtpname    set SMTP full name username@domain\n"));
710 	P(GT_("  -Z, --antispam,   set antispam response values\n"));
711 	P(GT_("  -b, --batchlimit  set batch limit for SMTP connections\n"));
712 	P(GT_("  -B, --fetchlimit  set fetch limit for server connections\n"));
713 	P(GT_("      --fetchsizelimit set fetch message size limit\n"));
714 	P(GT_("      --fastuidl    do a binary search for UIDLs\n"));
715 	P(GT_("  -e, --expunge     set max deletions between expunges\n"));
716 	P(GT_("  -m, --mda         set MDA to use for forwarding\n"));
717 	P(GT_("      --bsmtp       set output BSMTP file\n"));
718 	P(GT_("      --lmtp        use LMTP (RFC2033) for delivery\n"));
719 	P(GT_("  -r, --folder      specify remote folder name\n"));
720 	P(GT_("      --showdots    show progress dots even in logfiles\n"));
721 #undef P
722 	/* undocumented:
723 	 * --configdump (internal use by fetchmailconf, dumps
724 	 *               configuration as Python source code)
725 	 * --yydebug    (developer use, enables parser debugging) */
726 
727 	if (helpflag)
728 	    exit(PS_SUCCESS);
729 	else
730 	    exit(PS_SYNTAX);
731     }
732 
733     return(optind);
734 }
735 
736 /* options.c ends here */
737