wok view popt/description.txt @ rev 25463

Up expat (2.4.9) fixes CVE-2022-40674
author Pascal Bellard <pascal.bellard@slitaz.org>
date Thu Sep 29 20:05:23 2022 +0000 (20 months ago)
parents
children
line source
1 Popt was heavily influenced by the getopt() and getopt_long() functions, but it
2 allows more powerful argument expansion. It can parse arbitrary argv[] style
3 arrays and automatically set variables based on command line arguments. It also
4 allows command line arguments to be aliased via configuration files and includes
5 utility functions for parsing arbitrary strings into argv[] arrays using
6 shell-like rules.