Module Name:    src
Committed By:   joerg
Date:           Wed Oct 14 23:37:34 UTC 2009

Modified Files:
        src/crypto/dist/heimdal/admin: ktutil.8
        src/crypto/dist/heimdal/kadmin: kadmin.8 kadmind.8
        src/crypto/dist/heimdal/kcm: kcm.8
        src/crypto/dist/heimdal/kdc: hprop.8 hpropd.8 kdc.8 kstash.8
            string2key.8
        src/crypto/dist/heimdal/kpasswd: kpasswdd.8
        src/crypto/dist/heimdal/kuser: kgetcred.1 kimpersonate.1 kinit.1
            klist.1
        src/crypto/dist/heimdal/lib/kadm5: iprop-log.8 iprop.8

Log Message:
Do not work around ancient groff limits with .Xo/.Xc.


To generate a diff of this commit:
cvs rdiff -u -r1.8 -r1.9 src/crypto/dist/heimdal/admin/ktutil.8
cvs rdiff -u -r1.9 -r1.10 src/crypto/dist/heimdal/kadmin/kadmin.8
cvs rdiff -u -r1.10 -r1.11 src/crypto/dist/heimdal/kadmin/kadmind.8
cvs rdiff -u -r1.1 -r1.2 src/crypto/dist/heimdal/kcm/kcm.8
cvs rdiff -u -r1.10 -r1.11 src/crypto/dist/heimdal/kdc/hprop.8 \
    src/crypto/dist/heimdal/kdc/hpropd.8
cvs rdiff -u -r1.13 -r1.14 src/crypto/dist/heimdal/kdc/kdc.8
cvs rdiff -u -r1.7 -r1.8 src/crypto/dist/heimdal/kdc/kstash.8 \
    src/crypto/dist/heimdal/kdc/string2key.8
cvs rdiff -u -r1.8 -r1.9 src/crypto/dist/heimdal/kpasswd/kpasswdd.8
cvs rdiff -u -r1.7 -r1.8 src/crypto/dist/heimdal/kuser/kgetcred.1
cvs rdiff -u -r1.1 -r1.2 src/crypto/dist/heimdal/kuser/kimpersonate.1
cvs rdiff -u -r1.10 -r1.11 src/crypto/dist/heimdal/kuser/kinit.1 \
    src/crypto/dist/heimdal/kuser/klist.1
cvs rdiff -u -r1.1 -r1.2 src/crypto/dist/heimdal/lib/kadm5/iprop-log.8 \
    src/crypto/dist/heimdal/lib/kadm5/iprop.8

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/crypto/dist/heimdal/admin/ktutil.8
diff -u src/crypto/dist/heimdal/admin/ktutil.8:1.8 src/crypto/dist/heimdal/admin/ktutil.8:1.9
--- src/crypto/dist/heimdal/admin/ktutil.8:1.8	Sat Mar 22 08:36:49 2008
+++ src/crypto/dist/heimdal/admin/ktutil.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: ktutil.8 14792 2005-04-14 16:43:57Z lha $
-.\" $NetBSD: ktutil.8,v 1.8 2008/03/22 08:36:49 mlelstv Exp $
+.\" $NetBSD: ktutil.8,v 1.9 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd April 14, 2005
 .Dt KTUTIL 8
@@ -54,72 +54,43 @@
 is a program for managing keytabs.
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl v ,
-.Fl -verbose
-.Xc
+.It Fl v , Fl -verbose
 Verbose output.
 .El
 .Pp
 .Ar command
 can be one of the following:
-.Bl -tag -width srvconvert
-.It add Xo
-.Op Fl p Ar principal
-.Op Fl -principal= Ns Ar principal
-.Op Fl V Ar kvno
-.Op Fl -kvno= Ns Ar kvno
-.Op Fl e Ar enctype
-.Op Fl -enctype= Ns Ar enctype
-.Op Fl w Ar password
-.Op Fl -password= Ns Ar password
-.Op Fl r
-.Op Fl -random
-.Op Fl s
-.Op Fl -no-salt
-.Op Fl H
-.Op Fl -hex
-.Xc
+.Bl -tag -width srvconvert -width srvconvert
+.It add Oo Fl p Ar principal Oc Oo Fl -principal= Ns Ar principal Oc \
+Oo Fl V Ar kvno Oc Oo Fl -kvno= Ns Ar kvno Oc Oo Fl e Ar enctype Oc \
+Oo Fl -enctype= Ns Ar enctype Oc Oo Fl w Ar password Oc \
+Oo Fl -password= Ns Ar password Oc Oo Fl r Oc Oo Fl -random Oc \
+Oo Fl s Oc Oo Fl -no-salt Oc Oo Fl H Oc Op Fl -hex
 Adds a key to the keytab. Options that are not specified will be
 prompted for. This requires that you know the password or the hex key of the
 principal to add; if what you really want is to add a new principal to
 the keytab, you should consider the
 .Ar get
 command, which talks to the kadmin server.
-.It change Xo
-.Op Fl r Ar realm
-.Op Fl -realm= Ns Ar realm
-.Op Fl -a Ar host
-.Op Fl -admin-server= Ns Ar host
-.Op Fl -s Ar port
-.Op Fl -server-port= Ns Ar port
-.Xc
+.It change Oo Fl r Ar realm Oc Oo Fl -realm= Ns Ar realm Oc \
+Oo Fl -a Ar host Oc Oo Fl -admin-server= Ns Ar host Oc \
+Oo Fl -s Ar port Oc Op Fl -server-port= Ns Ar port
 Update one or several keys to new versions.  By default, use the admin
 server for the realm of a keytab entry.  Otherwise it will use the
 values specified by the options.
 .Pp
 If no principals are given, all the ones in the keytab are updated.
-.It copy Xo
-.Ar keytab-src
-.Ar keytab-dest
-.Xc
+.It copy Ar keytab-src Ar keytab-dest
 Copies all the entries from
 .Ar keytab-src
 to
 .Ar keytab-dest .
-.It get Xo
-.Op Fl p Ar admin principal
-.Op Fl -principal= Ns Ar admin principal
-.Op Fl e Ar enctype
-.Op Fl -enctypes= Ns Ar enctype
-.Op Fl r Ar realm
-.Op Fl -realm= Ns Ar realm
-.Op Fl a Ar admin server
-.Op Fl -admin-server= Ns Ar admin server
-.Op Fl s Ar server port
-.Op Fl -server-port= Ns Ar server port
-.Ar principal ...
-.Xc
+.It get Oo Fl p Ar admin principal Oc \
+Oo Fl -principal= Ns Ar admin principal Oc Oo Fl e Ar enctype Oc \
+Oo Fl -enctypes= Ns Ar enctype Oc Oo Fl r Ar realm Oc \
+Oo Fl -realm= Ns Ar realm Oc Oo Fl a Ar admin server Oc \
+Oo Fl -admin-server= Ns Ar admin server Oc Oo Fl s Ar server port Oc \
+Oo Fl -server-port= Ns Ar server port Oc Ar principal ...
 For each
 .Ar principal ,
 generate a new key for it (creating it if it doesn't already exist),
@@ -129,44 +100,28 @@
 .Ar realm
 is specified, the realm to operate on is taken from the first
 principal.
-.It list Xo
-.Op Fl -keys
-.Op Fl -timestamp
-.Xc
+.It list Oo Fl -keys Oc Op Fl -timestamp
 List the keys stored in the keytab.
-.It remove Xo
-.Op Fl p Ar principal
-.Op Fl -principal= Ns Ar principal
-.Op Fl V kvno
-.Op Fl -kvno= Ns Ar kvno
-.Op Fl e enctype
-.Op Fl -enctype= Ns Ar enctype
-.Xc
+.It remove Oo Fl p Ar principal Oc Oo Fl -principal= Ns Ar principal Oc \
+Oo Fl V kvno Oc Oo Fl -kvno= Ns Ar kvno Oc Oo Fl e enctype Oc \
+Oo Fl -enctype= Ns Ar enctype Oc
 Removes the specified key or keys. Not specifying a
 .Ar kvno
 removes keys with any version number. Not specifying an
 .Ar enctype
 removes keys of any type.
-.It rename Xo
-.Ar from-principal
-.Ar to-principal
-.Xc
+.It rename Ar from-principal Ar to-principal
 Renames all entries in the keytab that match the
 .Ar from-principal
 to
 .Ar to-principal .
-.It purge Xo
-.Op Fl -age= Ns Ar age
-.Xc
+.It purge Op Fl -age= Ns Ar age
 Removes all old versions of a key for which there is a newer version
 that is at least
 .Ar age
 (default one week) old.
 .It srvconvert
-.It srv2keytab Xo
-.Op Fl s Ar srvtab
-.Op Fl -srvtab= Ns Ar srvtab
-.Xc
+.It srv2keytab Oo Fl s Ar srvtab Oc Op Fl -srvtab= Ns Ar srvtab
 Converts the version 4 srvtab in
 .Ar srvtab
 to a version 5 keytab and stores it in
@@ -178,10 +133,7 @@
 .Ar keytab
 .Ed
 .It srvcreate
-.It key2srvtab Xo
-.Op Fl s Ar srvtab
-.Op Fl -srvtab= Ns Ar srvtab
-.Xc
+.It key2srvtab Oo Fl s Ar srvtab Oc Op Fl -srvtab= Ns Ar srvtab
 Converts the version 5 keytab in
 .Ar keytab
 to a version 4 srvtab and stores it in

Index: src/crypto/dist/heimdal/kadmin/kadmin.8
diff -u src/crypto/dist/heimdal/kadmin/kadmin.8:1.9 src/crypto/dist/heimdal/kadmin/kadmin.8:1.10
--- src/crypto/dist/heimdal/kadmin/kadmin.8:1.9	Sat Mar 22 08:37:02 2008
+++ src/crypto/dist/heimdal/kadmin/kadmin.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE.
 .\"
 .\" $Heimdal: kadmin.8 21739 2007-07-31 15:55:32Z lha $
-.\" $NetBSD: kadmin.8,v 1.9 2008/03/22 08:37:02 mlelstv Exp $
+.\" $NetBSD: kadmin.8,v 1.10 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd Feb  22, 2007
 .Dt KADMIN 8
@@ -41,34 +41,13 @@
 .Sh SYNOPSIS
 .Nm
 .Bk -words
-.Oo Fl p Ar string \*(Ba Xo
-.Fl -principal= Ns Ar string
-.Xc
-.Oc
-.Oo Fl K Ar string \*(Ba Xo
-.Fl -keytab= Ns Ar string
-.Xc
-.Oc
-.Oo Fl c Ar file \*(Ba Xo
-.Fl -config-file= Ns Ar file
-.Xc
-.Oc
-.Oo Fl k Ar file \*(Ba Xo
-.Fl -key-file= Ns Ar file
-.Xc
-.Oc
-.Oo Fl r Ar realm \*(Ba Xo
-.Fl -realm= Ns Ar realm
-.Xc
-.Oc
-.Oo Fl a Ar host \*(Ba Xo
-.Fl -admin-server= Ns Ar host
-.Xc
-.Oc
-.Oo Fl s Ar port number \*(Ba Xo
-.Fl -server-port= Ns Ar port number
-.Xc
-.Oc
+.Op Fl p Ar string \*(Ba Fl -principal= Ns Ar string
+.Op Fl K Ar string \*(Ba Fl -keytab= Ns Ar string
+.Op Fl c Ar file \*(Ba Fl -config-file= Ns Ar file
+.Op Fl k Ar file \*(Ba Fl -key-file= Ns Ar file
+.Op Fl r Ar realm \*(Ba Fl -realm= Ns Ar realm
+.Op Fl a Ar host \*(Ba Fl -admin-server= Ns Ar host
+.Op Fl s Ar port number \*(Ba Fl -server-port= Ns Ar port number
 .Op Fl l | Fl -local
 .Op Fl h | Fl -help
 .Op Fl v | Fl -version
@@ -85,45 +64,21 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl p Ar string ,
-.Fl -principal= Ns Ar string
-.Xc
+.It Fl p Ar string , Fl -principal= Ns Ar string
 principal to authenticate as
-.It Xo
-.Fl K Ar string ,
-.Fl -keytab= Ns Ar string
-.Xc
+.It Fl K Ar string , Fl -keytab= Ns Ar string
 keytab for authentication principal
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 location of config file
-.It Xo
-.Fl k Ar file ,
-.Fl -key-file= Ns Ar file
-.Xc
+.It Fl k Ar file , Fl -key-file= Ns Ar file
 location of master key file
-.It Xo
-.Fl r Ar realm ,
-.Fl -realm= Ns Ar realm
-.Xc
+.It Fl r Ar realm , Fl -realm= Ns Ar realm
 realm to use
-.It Xo
-.Fl a Ar host ,
-.Fl -admin-server= Ns Ar host
-.Xc
+.It Fl a Ar host , Fl -admin-server= Ns Ar host
 server to contact
-.It Xo
-.Fl s Ar port number ,
-.Fl -server-port= Ns Ar port number
-.Xc
+.It Fl s Ar port number , Fl -server-port= Ns Ar port number
 port to use
-.It Xo
-.Fl l ,
-.Fl -local
-.Xc
+.It Fl l , Fl -local
 local admin mode
 .El
 .Pp
@@ -145,14 +100,12 @@
 Commands include:
 .\" not using a list here, since groff apparently gets confused
 .\" with nested Xo/Xc
-.Bd -ragged -offset indent
+.Bl -item -offset indent
+.It
 .Nm add
 .Op Fl r | Fl -random-key
 .Op Fl -random-password
-.Oo Fl p Ar string \*(Ba Xo
-.Fl -password= Ns Ar string
-.Xc
-.Oc
+.Op Fl p Ar string \*(Ba Fl -password= Ns Ar string
 .Op Fl -key= Ns Ar string
 .Op Fl -max-ticket-life= Ns Ar lifetime
 .Op Fl -max-renewable-life= Ns Ar lifetime
@@ -165,7 +118,7 @@
 Adds a new principal to the database. The options not passed on the
 command line will be promped for.
 .Ed
-.Pp
+.It
 .Nm add_enctype
 .Op Fl r | Fl -random-key
 .Ar principal enctypes...
@@ -174,14 +127,14 @@
 Adds a new encryption type to the principal, only random key are
 supported.
 .Ed
-.Pp
+.It
 .Nm delete
 .Ar principal...
 .Pp
 .Bd -ragged -offset indent
 Removes a principal.
 .Ed
-.Pp
+.It
 .Nm del_enctype
 .Ar principal enctypes...
 .Pp
@@ -190,7 +143,7 @@
 service belonging to the principal is known to not handle certain
 enctypes.
 .Ed
-.Pp
+.It
 .Nm ext_keytab
 .Oo Fl k Ar string \*(Ba Xo
 .Fl -keytab= Ns Ar string
@@ -201,7 +154,7 @@
 .Bd -ragged -offset indent
 Creates a keytab with the keys of the specified principals.
 .Ed
-.Pp
+.It
 .Nm get
 .Op Fl l | Fl -long
 .Op Fl s | Fl -short
@@ -243,7 +196,7 @@
 and
 .Li keytypes .
 .Ed
-.Pp
+.It
 .Nm modify
 .Oo Fl a Ar attributes \*(Ba Xo
 .Fl -attributes= Ns Ar attributes
@@ -281,7 +234,7 @@
 .Pp 
 kadmin -l modify -a -disallow-proxiable user
 .Ed
-.Pp
+.It
 .Nm passwd
 .Op Fl r | Fl -random-key
 .Op Fl -random-password
@@ -295,7 +248,7 @@
 .Bd -ragged -offset indent
 Changes the password of an existing principal.
 .Ed
-.Pp
+.It
 .Nm password-quality
 .Ar principal
 .Ar password
@@ -307,7 +260,7 @@
 The verification is done locally, if kadmin is run in remote mode,
 no rpc call is done to the server.
 .Ed
-.Pp
+.It
 .Nm privileges
 .Pp
 .Bd -ragged -offset indent
@@ -322,7 +275,7 @@
 and
 .Li modify .
 .Ed
-.Pp
+.It
 .Nm rename
 .Ar from to
 .Pp
@@ -332,7 +285,7 @@
 and clients which are unable to cope with this will fail. Kerberos 4
 suffers from this.
 .Ed
-.Pp
+.It
 .Nm check
 .Op Ar realm
 .Pp
@@ -340,11 +293,11 @@
 Check database for strange configurations on important principals. If
 no realm is given, the default realm is used.
 .Ed
-.Pp
-.Ed
+.El
 .Pp
 When running in local mode, the following commands can also be used:
-.Bd -ragged -offset indent
+.Bl -item -offset indent
+.It
 .Nm dump
 .Op Fl d | Fl -decrypt
 .Op Ar dump-file
@@ -357,7 +310,7 @@
 .Fl -decrypt
 is used.
 .Ed
-.Pp
+.It
 .Nm init
 .Op Fl -realm-max-ticket-life= Ns Ar string
 .Op Fl -realm-max-renewable-life= Ns Ar string
@@ -367,7 +320,7 @@
 Initializes the Kerberos database with entries for a new realm. It's
 possible to have more than one realm served by one server.
 .Ed
-.Pp
+.It
 .Nm load
 .Ar file
 .Pp
@@ -375,7 +328,7 @@
 Reads a previously dumped database, and re-creates that database from
 scratch.
 .Ed
-.Pp
+.It
 .Nm merge
 .Ar file
 .Pp
@@ -384,7 +337,7 @@
 .Nm load
 but just modifies the database with the entries in the dump file.
 .Ed
-.Pp
+.It
 .Nm stash
 .Oo Fl e Ar enctype \*(Ba Xo
 .Fl -enctype= Ns Ar enctype
@@ -401,7 +354,7 @@
 Writes the Kerberos master key to a file used by the KDC.
 .Ed
 .Pp
-.Ed
+.El
 .\".Sh ENVIRONMENT
 .\".Sh FILES
 .\".Sh EXAMPLES

Index: src/crypto/dist/heimdal/kadmin/kadmind.8
diff -u src/crypto/dist/heimdal/kadmin/kadmind.8:1.10 src/crypto/dist/heimdal/kadmin/kadmind.8:1.11
--- src/crypto/dist/heimdal/kadmin/kadmind.8:1.10	Sat Mar 22 08:37:02 2008
+++ src/crypto/dist/heimdal/kadmin/kadmind.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: kadmind.8 14370 2004-12-08 17:20:21Z lha $
-.\" $NetBSD: kadmind.8,v 1.10 2008/03/22 08:37:02 mlelstv Exp $
+.\" $NetBSD: kadmind.8,v 1.11 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd December  8, 2004
 .Dt KADMIND 8
@@ -119,34 +119,17 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 location of config file
-.It Xo
-.Fl k Ar file ,
-.Fl -key-file= Ns Ar file
-.Xc
+.It Fl k Ar file , Fl -key-file= Ns Ar file
 location of master key file
-.It Xo
-.Fl -keytab= Ns Ar keytab
-.Xc
+.It Fl -keytab= Ns Ar keytab
 what keytab to use
-.It Xo
-.Fl r Ar realm ,
-.Fl -realm= Ns Ar realm
-.Xc
+.It Fl r Ar realm , Fl -realm= Ns Ar realm
 realm to use
-.It Xo
-.Fl d ,
-.Fl -debug
-.Xc
+.It Fl d , Fl -debug
 enable debugging
-.It Xo
-.Fl p Ar port ,
-.Fl -ports= Ns Ar port
-.Xc
+.It Fl p Ar port , Fl -ports= Ns Ar port
 ports to listen to. By default, if run as a daemon, it listens to port
 749, but you can add any number of ports with this option. The port
 string is a whitespace separated list of port specifications, with the

Index: src/crypto/dist/heimdal/kcm/kcm.8
diff -u src/crypto/dist/heimdal/kcm/kcm.8:1.1 src/crypto/dist/heimdal/kcm/kcm.8:1.2
--- src/crypto/dist/heimdal/kcm/kcm.8:1.1	Sat Mar 22 09:29:56 2008
+++ src/crypto/dist/heimdal/kcm/kcm.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\"
 .\" $Heimdal: kcm.8 15497 2005-06-20 13:32:44Z lha $
-.\" $NetBSD: kcm.8,v 1.1 2008/03/22 09:29:56 mlelstv Exp $
+.\" $NetBSD: kcm.8,v 1.2 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd May 29, 2005
 .Dt KCM 8
@@ -128,91 +128,42 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl -cache-name= Ns Ar cachename
-.Xc
+.It Fl -cache-name= Ns Ar cachename
 system cache name
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 location of config file
-.It Xo
-.Fl g Ar group ,
-.Fl -group= Ns Ar group
-.Xc
+.It Fl g Ar group , Fl -group= Ns Ar group
 system cache group
-.It Xo
-.Fl -max-request= Ns Ar size
-.Xc
+.It Fl -max-request= Ns Ar size
 max size for a kcm-request
-.It Xo
-.Fl -disallow-getting-krbtgt
-.Xc
+.It Fl -disallow-getting-krbtgt
 disallow extracting any krbtgt from the
 .Nm kcm
 daemon.
-.It Xo
-.Fl -detach
-.Xc
+.It Fl -detach
 detach from console
-.It Xo
-.Fl h ,
-.Fl -help
-.Xc
-.It Xo
-.Fl k Ar principal ,
-.Fl -system-principal= Ns Ar principal
-.Xc
+.It Fl h , Fl -help
+.It Fl k Ar principal , Fl -system-principal= Ns Ar principal
 system principal name
-.It Xo
-.Fl l Ar time ,
-.Fl -lifetime= Ns Ar time
-.Xc
+.It Fl l Ar time , Fl -lifetime= Ns Ar time
 lifetime of system tickets
-.It Xo
-.Fl m Ar mode ,
-.Fl -mode= Ns Ar mode
-.Xc
+.It Fl m Ar mode , Fl -mode= Ns Ar mode
 octal mode of system cache
-.It Xo
-.Fl n ,
-.Fl -no-name-constraints
-.Xc
+.It Fl n , Fl -no-name-constraints
 disable credentials cache name constraints
-.It Xo
-.Fl r Ar time ,
-.Fl -renewable-life= Ns Ar time
-.Xc
+.It Fl r Ar time , Fl -renewable-life= Ns Ar time
 renewable lifetime of system tickets
-.It Xo
-.Fl s Ar path ,
-.Fl -socket-path= Ns Ar path
-.Xc
+.It Fl s Ar path , Fl -socket-path= Ns Ar path
 path to kcm domain socket
-.It Xo
-.Fl -door-path= Ns Ar path
-.Xc
+.It Fl -door-path= Ns Ar path
 path to kcm door socket
-.It Xo
-.Fl S Ar principal ,
-.Fl -server= Ns Ar principal
-.Xc
+.It Fl S Ar principal , Fl -server= Ns Ar principal
 server to get system ticket for
-.It Xo
-.Fl t Ar keytab ,
-.Fl -keytab= Ns Ar keytab
-.Xc
+.It Fl t Ar keytab , Fl -keytab= Ns Ar keytab
 system keytab name
-.It Xo
-.Fl u Ar user ,
-.Fl -user= Ns Ar user
-.Xc
+.It Fl u Ar user , Fl -user= Ns Ar user
 system cache owner
-.It Xo
-.Fl v ,
-.Fl -version
-.Xc
+.It Fl v , Fl -version
 .El
 .\".Sh ENVIRONMENT
 .\".Sh FILES

Index: src/crypto/dist/heimdal/kdc/hprop.8
diff -u src/crypto/dist/heimdal/kdc/hprop.8:1.10 src/crypto/dist/heimdal/kdc/hprop.8:1.11
--- src/crypto/dist/heimdal/kdc/hprop.8:1.10	Fri Nov  7 16:51:27 2008
+++ src/crypto/dist/heimdal/kdc/hprop.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: hprop.8 20456 2007-04-19 20:29:42Z lha $
-.\" $NetBSD: hprop.8,v 1.10 2008/11/07 16:51:27 wiz Exp $
+.\" $NetBSD: hprop.8,v 1.11 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd December  8, 2004
 .Dt HPROP 8
@@ -91,19 +91,11 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl m Ar file ,
-.Fl -master-key= Ns Pa file
-.Xc
+.It Fl m Ar file , Fl -master-key= Ns Pa file
 Where to find the master key to encrypt or decrypt keys with.
-.It Xo
-.Fl d Ar file ,
-.Fl -database= Ns Pa file
-.Xc
+.It Fl d Ar file , Fl -database= Ns Pa file
 The database to be propagated.
-.It Xo
-.Fl -source= Ns Ar heimdal|mit-dump|krb4-dump|kaserver
-.Xc
+.It Fl -source= Ns Ar heimdal|mit-dump|krb4-dump|kaserver
 Specifies the type of the source database. Alternatives include:
 .Pp
 .Bl -tag -width krb4-dump -compact -offset indent
@@ -116,36 +108,21 @@
 .It kaserver
 an AFS kaserver database
 .El
-.It Xo
-.Fl k Ar keytab ,
-.Fl -keytab= Ns Ar keytab
-.Xc
+.It Fl k Ar keytab , Fl -keytab= Ns Ar keytab
 The keytab to use for fetching the key to be used for authenticating
 to the propagation daemon(s). The key
 .Pa kadmin/hprop
 is used from this keytab.  The default is to fetch the key from the
 KDC database.
-.It Xo
-.Fl R Ar string ,
-.Fl -v5-realm= Ns Ar string
-.Xc
+.It Fl R Ar string , Fl -v5-realm= Ns Ar string
 Local realm override.
-.It Xo
-.Fl D ,
-.Fl -decrypt
-.Xc
+.It Fl D , Fl -decrypt
 The encryption keys in the database can either be in clear, or
 encrypted with a master key. This option transmits the database with
 unencrypted keys.
-.It Xo
-.Fl E ,
-.Fl -encrypt
-.Xc
+.It Fl E , Fl -encrypt
 This option transmits the database with encrypted keys.
-.It Xo
-.Fl n ,
-.Fl -stdout
-.Xc
+.It Fl n , Fl -stdout
 Dump the database on stdout, in a format that can be fed to hpropd.
 .El
 .Pp
@@ -153,32 +130,20 @@
 .Nm hprop
 is compiled with support for Kerberos 4 (kaserver).
 .Bl -tag -width Ds
-.It Xo
-.Fl r Ar string ,
-.Fl -v4-realm= Ns Ar string
-.Xc
+.It Fl r Ar string , Fl -v4-realm= Ns Ar string
 v4 realm to use.
-.It Xo
-.Fl c Ar cell ,
-.Fl -cell= Ns Ar cell
-.Xc
+.It Fl c Ar cell , Fl -cell= Ns Ar cell
 The AFS cell name, used if reading a kaserver database.
-.It Xo
-.Fl S ,
-.Fl -kaspecials
-.Xc
+.It Fl S , Fl -kaspecials
 Also dump the principals marked as special in the kaserver database.
-.It Xo
-.Fl K ,
-.Fl -ka-db
-.Xc
+.It Fl K , Fl -ka-db
 Deprecated, identical to
 .Sq --source=kaserver .
 .El
 .Sh EXAMPLES
 The following will propagate a database to another machine (which
 should run
-.Xr hpropd 8 ):
+.Xr hpropd 8 ) :
 .Bd -literal -offset indent
 $ hprop slave-1 slave-2
 .Ed
Index: src/crypto/dist/heimdal/kdc/hpropd.8
diff -u src/crypto/dist/heimdal/kdc/hpropd.8:1.10 src/crypto/dist/heimdal/kdc/hpropd.8:1.11
--- src/crypto/dist/heimdal/kdc/hpropd.8:1.10	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kdc/hpropd.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: hpropd.8 14381 2004-12-10 09:44:05Z lha $
-.\" $NetBSD: hpropd.8,v 1.10 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: hpropd.8,v 1.11 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd August 27, 1997
 .Dt HPROPD 8
@@ -74,34 +74,17 @@
 .Pp
 Options supported:
 .Bl -tag -width Ds
-.It Xo
-.Fl d Ar file ,
-.Fl -database= Ns Ar file
-.Xc
+.It Fl d Ar file , Fl -database= Ns Ar file
 database
-.It Xo
-.Fl n ,
-.Fl -stdin
-.Xc
+.It Fl n , Fl -stdin
 read from stdin
-.It Xo
-.Fl -print
-.Xc
+.It Fl -print
 print dump to stdout
-.It Xo
-.Fl i ,
-.Fl -no-inetd
-.Xc
+.It Fl i , Fl -no-inetd
 not started from inetd
-.It Xo
-.Fl k Ar keytab ,
-.Fl -keytab= Ns Ar keytab
-.Xc
+.It Fl k Ar keytab , Fl -keytab= Ns Ar keytab
 keytab to use for authentication
-.It Xo
-.Fl 4 ,
-.Fl -v4dump
-.Xc
+.It Fl 4 , Fl -v4dump
 create v4 type DB
 .El
 .Sh SEE ALSO

Index: src/crypto/dist/heimdal/kdc/kdc.8
diff -u src/crypto/dist/heimdal/kdc/kdc.8:1.13 src/crypto/dist/heimdal/kdc/kdc.8:1.14
--- src/crypto/dist/heimdal/kdc/kdc.8:1.13	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kdc/kdc.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\"
 .\" $Heimdal: kdc.8 18419 2006-10-12 10:05:57Z lha $
-.\" $NetBSD: kdc.8,v 1.13 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: kdc.8,v 1.14 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd August 24, 2006
 .Dt KDC 8
@@ -73,17 +73,11 @@
 .Pp
 Options supported:
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 Specifies the location of the config file, the default is
 .Pa /var/heimdal/kdc.conf .
 This is the only value that can't be specified in the config file.
-.It Xo
-.Fl p ,
-.Fl -no-require-preauth
-.Xc
+.It Fl p , Fl -no-require-preauth
 Turn off the requirement for pre-autentication in the initial AS-REQ
 for all principals.
 The use of pre-authentication makes it more difficult to do offline
@@ -96,34 +90,20 @@
 The default is to require pre-authentication.
 Adding the require-preauth per principal is a more flexible way of
 handling this.
-.It Xo
-.Fl -max-request= Ns Ar size
-.Xc
+.It Fl -max-request= Ns Ar size
 Gives an upper limit on the size of the requests that the kdc is
 willing to handle.
-.It Xo
-.Fl H ,
-.Fl -enable-http
-.Xc
+.It Fl H , Fl -enable-http
 Makes the kdc listen on port 80 and handle requests encapsulated in HTTP.
-.It Xo
-.Fl -no-524
-.Xc
+.It Fl -no-524
 don't respond to 524 requests
-.It Xo
-.Fl -kerberos4
-.Xc
+.It Fl -kerberos4
 respond to Kerberos 4 requests
-.It Xo
-.Fl -kerberos4-cross-realm
-.Xc
+.It Fl -kerberos4-cross-realm
 respond to Kerberos 4 requests from foreign realms.
 This is a known security hole and should not be enabled unless you
 understand the consequences and are willing to live with them.
-.It Xo
-.Fl r Ar string ,
-.Fl -v4-realm= Ns Ar string
-.Xc
+.It Fl r Ar string , Fl -v4-realm= Ns Ar string
 What realm this server should act as when dealing with version 4
 requests.
 The database can contain any number of realms, but since the version 4
@@ -133,15 +113,9 @@
 .Fn krb_get_lrealm .
 This option is only availabe if the KDC has been compiled with version
 4 support.
-.It Xo
-.Fl K ,
-.Fl -kaserver
-.Xc
+.It Fl K , Fl -kaserver
 Enable kaserver emulation (in case it's compiled in).
-.It Xo
-.Fl P Ar portspec ,
-.Fl -ports= Ns Ar portspec
-.Xc
+.It Fl P Ar portspec , Fl -ports= Ns Ar portspec
 Specifies the set of ports the KDC should listen on.
 It is given as a
 white-space separated list of services or port numbers.
@@ -199,11 +173,8 @@
 .It Li max-kdc-datagram-reply-length = Va number
 Maximum packet size the UDP rely that the KDC will transmit, instead
 the KDC sends back a reply telling the client to use TCP instead.
-.It Li transited-policy = Xo
-.Li always-check \*(Ba
-.Li allow-per-principal |
-.Li always-honour-request
-.Xc
+.It Li transited-policy = Li always-check \*(Ba \
+Li allow-per-principal | Li always-honour-request
 This controls how KDC requests with the
 .Li disable-transited-check
 flag are handled. It can be one of:

Index: src/crypto/dist/heimdal/kdc/kstash.8
diff -u src/crypto/dist/heimdal/kdc/kstash.8:1.7 src/crypto/dist/heimdal/kdc/kstash.8:1.8
--- src/crypto/dist/heimdal/kdc/kstash.8:1.7	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kdc/kstash.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\"
 .\" $Heimdal: kstash.8 20316 2007-04-11 11:53:20Z lha $
-.\" $NetBSD: kstash.8,v 1.7 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: kstash.8,v 1.8 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd April 10, 2007
 .Dt KSTASH 8
@@ -63,28 +63,16 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl e Ar string ,
-.Fl -enctype= Ns Ar string
-.Xc
+.It Fl e Ar string , Fl -enctype= Ns Ar string
 the encryption type to use, defaults to DES3-CBC-SHA1.
-.It Xo
-.Fl k Ar file ,
-.Fl -key-file= Ns Ar file
-.Xc
+.It Fl k Ar file , Fl -key-file= Ns Ar file
 the name of the master key file.
-.It Xo
-.Fl -convert-file
-.Xc
+.It Fl -convert-file
 don't ask for a new master key, just read an old master key file, and
 write it back in the new keyfile format.
-.It Xo
-.Fl -random-key
-.Xc
+.It Fl -random-key
 generate a random master key.
-.It Xo
-.Fl -master-key-fd= Ns Ar fd
-.Xc
+.It Fl -master-key-fd= Ns Ar fd
 filedescriptor to read passphrase from, if not specified the
 passphrase will be read from the terminal.
 .El
Index: src/crypto/dist/heimdal/kdc/string2key.8
diff -u src/crypto/dist/heimdal/kdc/string2key.8:1.7 src/crypto/dist/heimdal/kdc/string2key.8:1.8
--- src/crypto/dist/heimdal/kdc/string2key.8:1.7	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kdc/string2key.8	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: string2key.8 11648 2003-02-16 21:10:32Z lha $
-.\" $NetBSD: string2key.8,v 1.7 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: string2key.8,v 1.8 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd March  4, 2000
 .Dt STRING2KEY 8
@@ -66,46 +66,21 @@
 This is useful when you want to handle the raw key instead of the password.
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl 5 ,
-.Fl -version5
-.Xc
+.It Fl 5 , Fl -version5
 Output Kerberos v5 string-to-key
-.It Xo
-.Fl 4 ,
-.Fl -version4
-.Xc
+.It Fl 4 , Fl -version4
 Output Kerberos v4 string-to-key
-.It Xo
-.Fl a ,
-.Fl -afs
-.Xc
+.It Fl a , Fl -afs
 Output AFS string-to-key
-.It Xo
-.Fl c Ar cell ,
-.Fl -cell= Ns Ar cell
-.Xc
+.It Fl c Ar cell , Fl -cell= Ns Ar cell
 AFS cell to use
-.It Xo
-.Fl w Ar password ,
-.Fl -password= Ns Ar password
-.Xc
+.It Fl w Ar password , Fl -password= Ns Ar password
 Password to use
-.It Xo
-.Fl p Ar principal ,
-.Fl -principal= Ns Ar principal
-.Xc
+.It Fl p Ar principal , Fl -principal= Ns Ar principal
 Kerberos v5 principal to use
-.It Xo
-.Fl k Ar string ,
-.Fl -keytype= Ns Ar string
-.Xc
+.It Fl k Ar string , Fl -keytype= Ns Ar string
 Keytype
-.It Xo
-.Fl -version
-.Xc
+.It Fl -version
 print version
-.It Xo
-.Fl -help
-.Xc
+.It Fl -help
 .El

Index: src/crypto/dist/heimdal/kpasswd/kpasswdd.8
diff -u src/crypto/dist/heimdal/kpasswd/kpasswdd.8:1.8 src/crypto/dist/heimdal/kpasswd/kpasswdd.8:1.9
--- src/crypto/dist/heimdal/kpasswd/kpasswdd.8:1.8	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kpasswd/kpasswdd.8	Wed Oct 14 23:37:33 2009
@@ -1,5 +1,5 @@
 .\" $Heimdal: kpasswdd.8 14481 2005-01-05 18:07:44Z lha $
-.\" $NetBSD: kpasswdd.8,v 1.8 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: kpasswdd.8,v 1.9 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd April 19, 1999
 .Dt KPASSWDD 8
@@ -36,20 +36,14 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl -addresses= Ns Ar address
-.Xc
+.It Fl -addresses= Ns Ar address
 For each till the argument is given, add the address to what kpasswdd
 should listen too.
-.It Xo
-.Fl -check-library= Ns Ar library
-.Xc
+.It Fl -check-library= Ns Ar library
 If your system has support for dynamic loading of shared libraries,
 you can use an external function to check password quality. This
 option specifies which library to load.
-.It Xo
-.Fl -check-function= Ns Ar function
-.Xc
+.It Fl -check-function= Ns Ar function
 This is the function to call in the loaded library. The function
 should look like this:
 .Pp
@@ -64,20 +58,11 @@
 is the new password. Note that the password (in
 .Fa password->data )
 is not zero terminated.
-.It Xo
-.Fl k Ar kspec ,
-.Fl -keytab= Ns Ar kspec
-.Xc
+.It Fl k Ar kspec , Fl -keytab= Ns Ar kspec
 Keytab to get authentication key from.
-.It Xo
-.Fl r Ar realm ,
-.Fl -realm= Ns Ar realm
-.Xc
+.It Fl r Ar realm , Fl -realm= Ns Ar realm
 Default realm.
-.It Xo
-.Fl p Ar string ,
-.Fl -port= Ns Ar string
-.Xc
+.It Fl p Ar string , Fl -port= Ns Ar string
 Port to listen on (default service kpasswd - 464).
 .El
 .Sh DIAGNOSTICS

Index: src/crypto/dist/heimdal/kuser/kgetcred.1
diff -u src/crypto/dist/heimdal/kuser/kgetcred.1:1.7 src/crypto/dist/heimdal/kuser/kgetcred.1:1.8
--- src/crypto/dist/heimdal/kuser/kgetcred.1:1.7	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kuser/kgetcred.1	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: kgetcred.1 14090 2004-08-05 18:49:47Z lha $
-.\" $NetBSD: kgetcred.1,v 1.7 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: kgetcred.1,v 1.8 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd March 12, 2004
 .Dt KGETCRED 1
@@ -62,30 +62,16 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl -canonicalize
-.Xc
+.It Fl -canonicalize
 requests that the KDC canonicalize the principal.
-.It Xo
-.Fl c Ar cache ,
-.Fl -cache= Ns Ar cache
-.Xc
+.It Fl c Ar cache , Fl -cache= Ns Ar cache
 the credential cache to use.
-.It Xo
-.Fl e Ar enctype ,
-.Fl -enctype= Ns Ar enctype
-.Xc
+.It Fl e Ar enctype , Fl -enctype= Ns Ar enctype
 encryption type to use.
-.It Xo
-.Fl -no-transit-check
-.Xc
+.It Fl -no-transit-check
 requests that the KDC doesn't do trasnit checking.
-.It Xo
-.Fl -version
-.Xc
-.It Xo
-.Fl -help
-.Xc
+.It Fl -version
+.It Fl -help
 .El
 .Sh SEE ALSO
 .Xr kinit 1 ,

Index: src/crypto/dist/heimdal/kuser/kimpersonate.1
diff -u src/crypto/dist/heimdal/kuser/kimpersonate.1:1.1 src/crypto/dist/heimdal/kuser/kimpersonate.1:1.2
--- src/crypto/dist/heimdal/kuser/kimpersonate.1:1.1	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kuser/kimpersonate.1	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: kimpersonate.1 20259 2007-02-17 23:49:54Z lha $
-.\" $NetBSD: kimpersonate.1,v 1.1 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: kimpersonate.1,v 1.2 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd September 18, 2006
 .Dt KERBEROS 1
@@ -41,28 +41,14 @@
 impersonate a user when there exist a srvtab, keyfile or KeyFile
 .Sh SYNOPSIS
 .Nm
-.Oo Fl s Ar string \*(Ba Xo
-.Fl -server= Ns Ar string Oc
-.Xc
-.Oo Fl c Ar string \*(Ba Xo
-.Fl -client= Ns Ar string Oc
-.Xc
-.Oo Fl k Ar string \*(Ba Xo
-.Fl -keytab= Ns Ar string Oc
-.Xc
+.Op Fl s Ar string \*(Ba Fl -server= Ns Ar string
+.Op Fl c Ar string \*(Ba Fl -client= Ns Ar string
+.Op Fl k Ar string \*(Ba Fl -keytab= Ns Ar string
 .Op Fl 5 | Fl -krb5
-.Oo Fl e Ar integer \*(Ba Xo
-.Fl -expire-time= Ns Ar integer Oc
-.Xc
-.Oo Fl a Ar string \*(Ba Xo
-.Fl -client-address= Ns Ar string Oc
-.Xc
-.Oo Fl t Ar string \*(Ba Xo
-.Fl -enc-type= Ns Ar string Oc
-.Xc
-.Oo Fl f Ar string \*(Ba Xo
-.Fl -ticket-flags= Ns Ar string Oc
-.Xc
+.Op Fl e Ar integer \*(Ba Fl -expire-time= Ns Ar integer
+.Op Fl a Ar string \*(Ba Fl -client-address= Ns Ar string
+.Op Fl t Ar string \*(Ba Fl -enc-type= Ns Ar string
+.Op Fl f Ar string \*(Ba Fl -ticket-flags= Ns Ar string
 .Op Fl -verbose
 .Op Fl -version
 .Op Fl -help
@@ -74,57 +60,27 @@
 (if compiled with support for Kerberos 4) a Kerberos 4 srvtab.
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl s Ar string Ns ,
-.Fl -server= Ns Ar string
-.Xc
+.It Fl s Ar string Ns , Fl -server= Ns Ar string
 name of server principal
-.It Xo
-.Fl c Ar string Ns ,
-.Fl -client= Ns Ar string
-.Xc
+.It Fl c Ar string Ns , Fl -client= Ns Ar string
 name of client principal
-.It Xo
-.Fl k Ar string Ns ,
-.Fl -keytab= Ns Ar string
-.Xc
+.It Fl k Ar string Ns , Fl -keytab= Ns Ar string
 name of keytab file
-.It Xo
-.Fl 5 Ns ,
-.Fl -krb5
-.Xc
+.It Fl 5 Ns , Fl -krb5
 create a Kerberos 5 ticket
-.It Xo
-.Fl e Ar integer Ns ,
-.Fl -expire-time= Ns Ar integer
-.Xc
+.It Fl e Ar integer Ns , Fl -expire-time= Ns Ar integer
 lifetime of ticket in seconds
-.It Xo
-.Fl a Ar string Ns ,
-.Fl -client-address= Ns Ar string
-.Xc
+.It Fl a Ar string Ns , Fl -client-address= Ns Ar string
 address of client
-.It Xo
-.Fl t Ar string Ns ,
-.Fl -enc-type= Ns Ar string
-.Xc
+.It Fl t Ar string Ns , Fl -enc-type= Ns Ar string
 encryption type
-.It Xo
-.Fl f Ar string Ns ,
-.Fl -ticket-flags= Ns Ar string
-.Xc
+.It Fl f Ar string Ns , Fl -ticket-flags= Ns Ar string
 ticket flags for krb5 ticket
-.It Xo
-.Fl -verbose
-.Xc
+.It Fl -verbose
 Verbose output
-.It Xo
-.Fl -version
-.Xc
+.It Fl -version
 Print version
-.It Xo
-.Fl -help
-.Xc
+.It Fl -help
 .El
 .Sh FILES
 Uses

Index: src/crypto/dist/heimdal/kuser/kinit.1
diff -u src/crypto/dist/heimdal/kuser/kinit.1:1.10 src/crypto/dist/heimdal/kuser/kinit.1:1.11
--- src/crypto/dist/heimdal/kuser/kinit.1:1.10	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kuser/kinit.1	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: kinit.1 17822 2006-07-10 14:46:58Z lha $
-.\" $NetBSD: kinit.1,v 1.10 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: kinit.1,v 1.11 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd April 25, 2006
 .Dt KINIT 1
@@ -106,40 +106,22 @@
 .Pp
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar cachename
-.Fl -cache= Ns Ar cachename
-.Xc
+.It Fl c Ar cachename , Fl -cache= Ns Ar cachename
 The credentials cache to put the acquired ticket in, if other than
 default.
-.It Xo
-.Fl f ,
-.Fl -forwardable
-.Xc
+.It Fl f , Fl -forwardable
 Get ticket that can be forwarded to another host.
-.It Xo
-.Fl t Ar keytabname ,
-.Fl -keytab= Ns Ar keytabname
-.Xc
+.It Fl t Ar keytabname , Fl -keytab= Ns Ar keytabname
 Don't ask for a password, but instead get the key from the specified
 keytab.
-.It Xo
-.Fl l Ar time ,
-.Fl -lifetime= Ns Ar time
-.Xc
+.It Fl l Ar time , Fl -lifetime= Ns Ar time
 Specifies the lifetime of the ticket.
 The argument can either be in seconds, or a more human readable string
 like
 .Sq 1h .
-.It Xo
-.Fl p ,
-.Fl -proxiable
-.Xc
+.It Fl p , Fl -proxiable
 Request tickets with the proxiable flag set.
-.It Xo
-.Fl R ,
-.Fl -renew
-.Xc
+.It Fl R , .Fl -renew
 Try to renew ticket.
 The ticket must have the
 .Sq renewable
@@ -148,46 +130,26 @@
 The same as
 .Fl -renewable-life ,
 with an infinite time.
-.It Xo
-.Fl r Ar time ,
-.Fl -renewable-life= Ns Ar time
-.Xc
+.It Fl r Ar time , Fl -renewable-life= Ns Ar time
 The max renewable ticket life.
-.It Xo
-.Fl S Ar principal ,
-.Fl -server= Ns Ar principal
-.Xc
+.It Fl S Ar principal , Fl -server= Ns Ar principal
 Get a ticket for a service other than krbtgt/LOCAL.REALM.
-.It Xo
-.Fl s Ar time ,
-.Fl -start-time= Ns Ar time
-.Xc
+.It Fl s Ar time , Fl -start-time= Ns Ar time
 Obtain a ticket that starts to be valid
 .Ar time
 (which can really be a generic time specification, like
 .Sq 1h )
 seconds into the future.
-.It Xo
-.Fl k ,
-.Fl -use-keytab
-.Xc
+.It Fl k , Fl -use-keytab
 The same as
 .Fl -keytab ,
 but with the default keytab name (normally
 .Ar FILE:/etc/krb5.keytab ) .
-.It Xo
-.Fl v ,
-.Fl -validate
-.Xc
+.It Fl v , Fl -validate
 Try to validate an invalid ticket.
-.It Xo
-.Fl e ,
-.Fl -enctypes= Ns Ar enctypes
-.Xc
+.It Fl e , Fl -enctypes= Ns Ar enctypes
 Request tickets with this particular enctype.
-.It Xo
-.Fl -password-file= Ns Ar filename
-.Xc
+.It Fl -password-file= Ns Ar filename
 read the password from the first line of
 .Ar filename .
 If the
@@ -195,15 +157,10 @@
 is
 .Ar STDIN ,
 the password will be read from the standard input.
-.It Xo
-.Fl -fcache-version= Ns Ar version-number
-.Xc
+.It Fl -fcache-version= Ns Ar version-number
 Create a credentials cache of version
 .Ar version-number .
-.It Xo
-.Fl a ,
-.Fl -extra-addresses= Ns Ar enctypes
-.Xc
+.It Fl a , Fl -extra-addresses= Ns Ar enctypes
 Adds a set of addresses that will, in addition to the systems local
 addresses, be put in the ticket.
 This can be useful if all addresses a client can use can't be
@@ -213,14 +170,9 @@
 .Li libdefaults/extra_addresses
 in
 .Xr krb5.conf 5 .
-.It Xo
-.Fl A ,
-.Fl -no-addresses
-.Xc
+.It Fl A , Fl -no-addresses
 Request a ticket with no addresses.
-.It Xo
-.Fl -anonymous
-.Xc
+.It Fl -anonymous
 Request an anonymous ticket (which means that the ticket will be
 issued to an anonymous principal, typically
 .Dq anonym...@realm ) .
@@ -230,17 +182,11 @@
 .Nm
 has been compiled with support for Kerberos 4.
 .Bl -tag -width Ds
-.It Xo
-.Fl 4 ,
-.Fl -524init
-.Xc
+.It Fl 4 , Fl -524init
 Try to convert the obtained Kerberos 5 krbtgt to a version 4
 compatible ticket.
 It will store this ticket in the default Kerberos 4 ticket file.
-.It Xo
-.Fl 9 ,
-.Fl -524convert
-.Xc
+.It Fl 9 , Fl -524convert
 only convert ticket to version 4
 .It Fl -afslog
 Gets AFS tickets, converts them to version 4 format, and stores them
Index: src/crypto/dist/heimdal/kuser/klist.1
diff -u src/crypto/dist/heimdal/kuser/klist.1:1.10 src/crypto/dist/heimdal/kuser/klist.1:1.11
--- src/crypto/dist/heimdal/kuser/klist.1:1.10	Sat Mar 22 08:37:03 2008
+++ src/crypto/dist/heimdal/kuser/klist.1	Wed Oct 14 23:37:33 2009
@@ -30,7 +30,7 @@
 .\" SUCH DAMAGE. 
 .\" 
 .\" $Heimdal: klist.1 20458 2007-04-19 20:41:27Z lha $
-.\" $NetBSD: klist.1,v 1.10 2008/03/22 08:37:03 mlelstv Exp $
+.\" $NetBSD: klist.1,v 1.11 2009/10/14 23:37:33 joerg Exp $
 .\"
 .Dd October  6, 2005
 .Dt KLIST 1
@@ -61,27 +61,14 @@
 .Pp
 Options supported:
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar cache ,
-.Fl -cache= Ns Ar cache
-.Xc
+.It Fl c Ar cache , Fl -cache= Ns Ar cache
 credential cache to list
-.It Xo
-.Fl s ,
-.Fl t ,
-.Fl -test
-.Xc
+.It Fl s , Fl t , Fl -test
 Test for there being an active and valid TGT for the local realm of
 the user in the credential cache.
-.It Xo
-.Fl T ,
-.Fl -tokens
-.Xc
+.It Fl T , Fl -tokens
 display AFS tokens
-.It Xo
-.Fl 5 ,
-.Fl -v5
-.Xc
+.It Fl 5 , Fl -v5
 display v5 cred cache (this is the default)
 .It Fl f
 Include ticket flags in short form, each character stands for a
@@ -114,10 +101,7 @@
 This information is also output with the
 .Fl -verbose
 option, but in a more verbose way.
-.It Xo
-.Fl v ,
-.Fl -verbose
-.Xc
+.It Fl v , Fl -verbose
 Verbose output. Include all possible information:
 .Bl -tag -width XXXX -offset indent
 .It Server
@@ -142,10 +126,7 @@
 .It Addresses
 the set of addresses from which this ticket is valid
 .El
-.It Xo
-.Fl l ,
-.Fl -list-caches
-.Xc
+.It Fl l , Fl -list-caches
 List the credential caches for the current users, not all cache types
 supports listing multiple caches.
 .Pp

Index: src/crypto/dist/heimdal/lib/kadm5/iprop-log.8
diff -u src/crypto/dist/heimdal/lib/kadm5/iprop-log.8:1.1 src/crypto/dist/heimdal/lib/kadm5/iprop-log.8:1.2
--- src/crypto/dist/heimdal/lib/kadm5/iprop-log.8:1.1	Sat Mar 22 08:37:12 2008
+++ src/crypto/dist/heimdal/lib/kadm5/iprop-log.8	Wed Oct 14 23:37:34 2009
@@ -1,5 +1,5 @@
 .\" $Heimdal: iprop-log.8 21713 2007-07-27 14:38:49Z lha $
-.\" $NetBSD: iprop-log.8,v 1.1 2008/03/22 08:37:12 mlelstv Exp $
+.\" $NetBSD: iprop-log.8,v 1.2 2009/10/14 23:37:34 joerg Exp $
 .\" 
 .\" Copyright (c) 2005 - 2007 Kungliga Tekniska Högskolan
 .\" (Royal Institute of Technology, Stockholm, Sweden).
@@ -32,7 +32,7 @@
 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
 .\" SUCH DAMAGE. 
 .\"
-.\"	$Id: iprop-log.8,v 1.1 2008/03/22 08:37:12 mlelstv Exp $
+.\"	$Id: iprop-log.8,v 1.2 2009/10/14 23:37:34 joerg Exp $
 .\"
 .Dd February 18, 2007
 .Dt IPROP-LOG 8
@@ -84,28 +84,17 @@
 .Sh DESCRIPTION
 Supported options:
 .Bl -tag -width Ds
-.It Xo
-.Fl -version
-.Xc
-.It Xo
-.Fl h ,
-.Fl -help
-.Xc
+.It Fl -version
+.It Fl h , Fl -help
 .El
 .Pp
 command can be one of the following:
 .Bl -tag -width truncate
 .It truncate
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 configuration file
-.It Xo
-.Fl r Ar string ,
-.Fl -realm= Ns Ar string
-.Xc
+.It Fl r Ar string , Fl -realm= Ns Ar string
 realm
 .El
 .Pp
@@ -114,38 +103,22 @@
 file, the log will start over at the first version (0).
 .It dump
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 configuration file
-.It Xo
-.Fl r Ar string ,
-.Fl -realm= Ns Ar string
-.Xc
+.It Fl r Ar string , Fl -realm= Ns Ar string
 realm
 .El
 .Pp
 Print out all entires in the log to standard output.
 .It replay
 .Bl -tag -width Ds
-.It Xo
-.Fl -start-version= Ns Ar version-number
-.Xc
+.It Fl -start-version= Ns Ar version-number
 start replay with this version
-.It Xo
-.Fl -end-version= Ns Ar version-number
-.Xc
+.It Fl -end-version= Ns Ar version-number
 end replay with this version
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 configuration file
-.It Xo
-.Fl r Ar string ,
-.Fl -realm= Ns Ar string
-.Xc
+.It Fl r Ar string , Fl -realm= Ns Ar string
 realm
 .El
 .Pp
@@ -153,15 +126,9 @@
 specified) in the transaction log to the database.
 .It last-version
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar file ,
-.Fl -config-file= Ns Ar file
-.Xc
+.It Fl c Ar file , Fl -config-file= Ns Ar file
 configuration file
-.It Xo
-.Fl r Ar string ,
-.Fl -realm= Ns Ar string
-.Xc
+.It Fl r Ar string , Fl -realm= Ns Ar string
 realm
 .El
 .Pp
Index: src/crypto/dist/heimdal/lib/kadm5/iprop.8
diff -u src/crypto/dist/heimdal/lib/kadm5/iprop.8:1.1 src/crypto/dist/heimdal/lib/kadm5/iprop.8:1.2
--- src/crypto/dist/heimdal/lib/kadm5/iprop.8:1.1	Sat Mar 22 08:37:12 2008
+++ src/crypto/dist/heimdal/lib/kadm5/iprop.8	Wed Oct 14 23:37:34 2009
@@ -1,5 +1,5 @@
 .\" $Heimdal: iprop.8 21940 2007-09-28 22:28:09Z lha $
-.\" $NetBSD: iprop.8,v 1.1 2008/03/22 08:37:12 mlelstv Exp $
+.\" $NetBSD: iprop.8,v 1.2 2009/10/14 23:37:34 joerg Exp $
 .\" 
 .\" Copyright (c) 2005 Kungliga Tekniska Högskolan
 .\" (Royal Institute of Technology, Stockholm, Sweden).
@@ -137,78 +137,37 @@
 Supported options for
 .Nm ipropd-master :
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar string ,
-.Fl -config-file= Ns Ar string
-.Xc
-.It Xo
-.Fl r Ar string ,
-.Fl -realm= Ns Ar string
-.Xc
-.It Xo
-.Fl k Ar kspec ,
-.Fl -keytab= Ns Ar kspec
-.Xc
+.It Fl c Ar string , Fl -config-file= Ns Ar string
+.It Fl r Ar string , Fl -realm= Ns Ar string
+.It Fl k Ar kspec , Fl -keytab= Ns Ar kspec
 keytab to get authentication from
-.It Xo
-.Fl d Ar file ,
-.Fl -database= Ns Ar file
-.Xc
+.It Fl d Ar file , Fl -database= Ns Ar file
 Database (default per KDC)
-.It Xo
-.Fl -slave-stats-file= Ns Ar file
-.Xc
+.It Fl -slave-stats-file= Ns Ar file
 file for slave status information
-.It Xo
-.Fl -time-missing= Ns Ar time
-.Xc
+.It Fl -time-missing= Ns Ar time
 time before slave is polled for presence (default 2 min)
-.It Xo
-.Fl -time-gone= Ns Ar time
-.Xc
+.It Fl -time-gone= Ns Ar time
 time of inactivity after which a slave is considered gone (default 5 min)
-.It Xo
-.Fl -detach
-.Xc
+.It Fl -detach
 detach from console
-.It Xo
-.Fl -version
-.Xc
-.It Xo
-.Fl -help
-.Xc
+.It Fl -version
+.It Fl -help
 .El
 .Pp
 Supported options for
 .Nm ipropd-slave :
 .Bl -tag -width Ds
-.It Xo
-.Fl c Ar string ,
-.Fl -config-file= Ns Ar string
-.Xc
-.It Xo
-.Fl r Ar string ,
-.Fl -realm= Ns Ar string
-.Xc
-.It Xo
-.Fl k Ar kspec ,
-.Fl -keytab= Ns Ar kspec
-.Xc
+.It Fl c Ar string , Fl -config-file= Ns Ar string
+.It Fl r Ar string , Fl -realm= Ns Ar string
+.It Fl k Ar kspec , Fl -keytab= Ns Ar kspec
 keytab to get authentication from
-.It Xo
-.Fl -time-lost= Ns Ar time
-.Xc
+.It Fl -time-lost= Ns Ar time
 time before server is considered lost (default 5 min)
-.It Xo
-.Fl -detach
-.Xc
+.It Fl -detach
 detach from console
-.It Xo
-.Fl -version
-.Xc
-.It Xo
-.Fl -help
-.Xc
+.It Fl -version
+.It Fl -help
 .El
 Time arguments for the relevant options above may be specified in forms
 like 5 min, 300 s, or simply a number of seconds.

Reply via email to