wok view popt/description.txt @ rev 18501

Up firefox-official(41.0.2): fix CVE-2015-7184
author Aleksej Bobylev <al.bobylev@gmail.com>
date Fri Oct 16 14:36:34 2015 +0300 (2015-10-16)
parents
children
line source
1 Popt was heavily influenced by the getopt() and getopt_long() functions, but it
2 allows more powerful argument expansion. It can parse arbitrary argv[] style
3 arrays and automatically set variables based on command line arguments. It also
4 allows command line arguments to be aliased via configuration files and includes
5 utility functions for parsing arbitrary strings into argv[] arrays using
6 shell-like rules.