wok view popt/description.txt @ rev 18501
Up firefox-official(41.0.2): fix CVE-2015-7184
author | Aleksej Bobylev <al.bobylev@gmail.com> |
---|---|
date | Fri Oct 16 14:36:34 2015 +0300 (2015-10-16) |
parents | |
children |
line source
1 Popt was heavily influenced by the getopt() and getopt_long() functions, but it
2 allows more powerful argument expansion. It can parse arbitrary argv[] style
3 arrays and automatically set variables based on command line arguments. It also
4 allows command line arguments to be aliased via configuration files and includes
5 utility functions for parsing arbitrary strings into argv[] arrays using
6 shell-like rules.