Blame SOURCES/0043-Add-long-options-to-command-line-help.patch

f0b236
From f5b4420f01272f14416558286c66511b1e35816d Mon Sep 17 00:00:00 2001
f0b236
From: Rob Crittenden <rcritten@redhat.com>
f0b236
Date: Thu, 14 May 2020 14:37:31 -0400
f0b236
Subject: [PATCH 43/43] Add long options to command-line help
f0b236
f0b236
The command-line help mostly consisted of only the short options.
f0b236
Add the long-option and clean up some of the output.
f0b236
f0b236
https://bugzilla.redhat.com/show_bug.cgi?id=1782838
f0b236
---
f0b236
 src/getcert.c | 536 ++++++++++++++++++++++++++++++++------------------
f0b236
 src/scep.c    |   2 +-
f0b236
 2 files changed, 345 insertions(+), 193 deletions(-)
f0b236
f0b236
diff --git a/src/getcert.c b/src/getcert.c
f0b236
index 5c8dc94..84e0bf3 100644
f0b236
--- a/src/getcert.c
f0b236
+++ b/src/getcert.c
f0b236
@@ -4864,50 +4864,90 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Required arguments:\n"),
f0b236
 		N_("* If using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	NSS database for key and cert\n"),
f0b236
-		N_("  -n NAME	nickname for NSS-based storage (only valid with -d)\n"),
f0b236
-		N_("  -t NAME	optional token name for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -t NAME, --token=NAME	optional token name for NSS-based storage\n"),
f0b236
+		N_("			(only valid with -d)\n"),
f0b236
 		N_("* If using files for storage:\n"),
f0b236
-		N_("  -k FILE	PEM file for private key\n"),
f0b236
-		N_("  -f FILE	PEM file for certificate (only valid with -k)\n"),
f0b236
+		N_("  -k FILE, --keyfile=FILE\n"),
f0b236
+		N_("			PEM file for private key\n"),
f0b236
+		N_("  -f FILE, --certfile=FILE\n"),
f0b236
+		N_("			PEM file for certificate (only valid with -k)\n"),
f0b236
 		N_("* If keys are to be encrypted:\n"),
f0b236
-		N_("  -p FILE	file which holds the encryption PIN\n"),
f0b236
-		N_("  -P PIN	PIN value\n"),
f0b236
+		N_("  -p FILE, --pinfile=FILE\n"),
f0b236
+		N_("			file which holds the encryption PIN\n"),
f0b236
+		N_("  -P PIN, --pin=PIN	PIN value\n"),
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* Certificate handling settings:\n"),
f0b236
-		N_("  -I NAME	nickname to assign to the request\n"),
f0b236
-		N_("  -G TYPE	type of key to be generated if one is not already in place\n"),
f0b236
-		N_("  -g SIZE	size of key to be generated if one is not already in place\n"),
f0b236
-		N_("  -r		attempt to renew the certificate when expiration nears (default)\n"),
f0b236
-		N_("  -R		don't attempt to renew the certificate when expiration nears\n"),
f0b236
+		N_("  -I NAME, --new-id=NAME\n"),
f0b236
+		N_("			new nickname to give to tracking request\n"),
f0b236
+		N_("  -G TYPE, --key-type=TYPE\n"),
f0b236
+		N_("			type of key to be generated if one is not already\n"),
f0b236
+		N_("			in place\n"),
f0b236
+		N_("  -g BITS, --key-size=BITS\n"),
f0b236
+		N_("			size of key to be generated if one is not already\n"),
f0b236
+		N_("			in place\n"),
f0b236
+		N_("  -r, --renew		attempt to renew the certificate when\n"),
f0b236
+		N_("			expiration nears (default)\n"),
f0b236
+		N_("  -R, --no-renew	don't attempt to renew the certificate when\n"),
f0b236
+		N_("			expiration nears\n"),
f0b236
 #ifndef FORCE_CA
f0b236
-		N_("  -c CA		use the specified CA rather than the default\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
 #endif
f0b236
-		N_("  -T PROFILE	ask the CA to process the request using the named profile or template\n"),
f0b236
+		N_("  -T PROFILE, --profile=NAME\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named profile or template\n"),
f0b236
 		N_("  --ms-template-spec SPEC\n"),
f0b236
-		N_("	 include V2 template specifier in CSR (format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
-		N_("  -X ISSUER	ask the CA to process the request using the named issuer\n"),
f0b236
+		N_("	 		include V2 template specifier in CSR\n"),
f0b236
+		N_("			(format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
+		N_("  -X ISSUER, --issuer=ISSUER\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named issuer\n"),
f0b236
 		N_("* Parameters for the signing request:\n"),
f0b236
-		N_("  -N NAME	set requested subject name (default: CN=<hostname>)\n"),
f0b236
-		N_("  -U EXTUSAGE	set requested extended key usage OID\n"),
f0b236
-		N_("  -u KEYUSAGE	set requested key usage value\n"),
f0b236
-		N_("  -K NAME	set requested principal name\n"),
f0b236
-		N_("  -D DNSNAME	set requested DNS name\n"),
f0b236
-		N_("  -E EMAIL	set requested email address\n"),
f0b236
-		N_("  -A ADDRESS	set requested IP address\n"),
f0b236
-		N_("  -l FILE	file which holds an optional challenge password\n"),
f0b236
-		N_("  -L PASSWORD	an optional challenge password value\n"),
f0b236
+		N_("  -N NAME, --subject-name=NAME\n"),
f0b236
+		N_("			set requested subject name (default: CN=<hostname>)\n"),
f0b236
+		N_("  -U EXTUSAGE, --extended-key-usage=EXTUSAGE\n"),
f0b236
+		N_("			override requested extended key usage OID\n"),
f0b236
+		N_("  -u KEYUSAGE, --key-usage=KEYUSAGE\n"),
f0b236
+		N_("			set requested key usage value\n"),
f0b236
+		N_("  -K NAME, --principal=NAME\n"),
f0b236
+		N_("			override requested principal name\n"),
f0b236
+		N_("  -D DNSNAME, --dns=DNSNAME\n"),
f0b236
+		N_("			override requested DNS name\n"),
f0b236
+		N_("  -E EMAIL, --email=EMAIL\n"),
f0b236
+		N_("			override requested email address\n"),
f0b236
+		N_("  -A ADDRESS, --ip-address=ADDRESS\n"),
f0b236
+		N_("			override requested IP address\n"),
f0b236
+		N_("  -l FILE, --challenge-password-file=FILE\n"),
f0b236
+		N_("			file which holds an optional challenge password\n"),
f0b236
+		N_("  -L PASSWORD, --challenge-password=PASSWORD\n"),
f0b236
+		N_("			an optional challenge password value\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S		connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s		connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -B	command to run before saving the certificate\n"),
f0b236
-		N_("  -C	command to run after saving the certificate\n"),
f0b236
-		N_("  -F	file in which to store the CA's certificates\n"),
f0b236
-		N_("  -a	NSS database in which to store the CA's certificates\n"),
f0b236
-		N_("  -w	try to wait for the certificate to be issued\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -B COMMAND, --before-command=COMMAND\n"),
f0b236
+		N_("			command to run before saving the certificate\n"),
f0b236
+		N_("  -C COMMAND, --after-command=COMMAND\n"),
f0b236
+		N_("			command to run after saving the certificate\n"),
f0b236
+		N_("  -F FILE, --ca-file=FILE\n"),
f0b236
+		N_("			file in which to store the CA's certificates\n"),
f0b236
+		N_("  -a DIR, --ca-dbdir=DIR\n"),
f0b236
+		N_("			NSS database in which to store the CA's certificates\n"),
f0b236
+		N_("  -w, --wait		try to wait for the certificate to be issued\n"),
f0b236
+		N_("  --wait-timeout TIMEOUT\n"),
f0b236
+		N_("			Maximum time to wait for the certificateto be issued\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
+		N_("  -o OWNER, --key-owner=OWNER\n"),
f0b236
+		N_("			owner information for private key\n"),
f0b236
+		N_("  -m MODE, --key-perms=MODE\n"),
f0b236
+		N_("			file permissions for private key\n"),
f0b236
+		N_("  -O OWNER, --cert-owner=OWNER\n"),
f0b236
+		N_("			owner information for certificate\n"),
f0b236
+		N_("  -M MODE, --cert-perms=MODE\n"),
f0b236
+		N_("			file permissions for certificate\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *start_tracking_help[] = {
f0b236
@@ -4915,49 +4955,84 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Required arguments:\n"),
f0b236
 		N_("* If modifying an existing request:\n"),
f0b236
-		N_("  -i NAME	nickname of an existing tracking request\n"),
f0b236
+		N_("  -i NAME, --id=NAME	nickname of an existing tracking request\n"),
f0b236
 		N_("* If using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	NSS database for key and cert\n"),
f0b236
-		N_("  -n NAME	nickname for NSS-based storage (only valid with -d)\n"),
f0b236
-		N_("  -t NAME	optional token name for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -t NAME, --token=NAME	optional token name for NSS-based storage\n"),
f0b236
+		N_("			(only valid with -d)\n"),
f0b236
 		N_("* If using files for storage:\n"),
f0b236
-		N_("  -k FILE	PEM file for private key\n"),
f0b236
-		N_("  -f FILE	PEM file for certificate (only valid with -k)\n"),
f0b236
+		N_("  -k FILE, --keyfile=FILE\n"),
f0b236
+		N_("			PEM file for private key\n"),
f0b236
+		N_("  -f FILE, --certfile=FILE\n"),
f0b236
+		N_("			PEM file for certificate (only valid with -k)\n"),
f0b236
 		N_("* If keys are encrypted:\n"),
f0b236
-		N_("  -p FILE	file which holds the encryption PIN\n"),
f0b236
-		N_("  -P PIN	PIN value\n"),
f0b236
+		N_("  -p FILE, --pinfile=FILE\n"),
f0b236
+		N_("			file which holds the encryption PIN\n"),
f0b236
+		N_("  -P PIN, --pin=PIN	PIN value\n"),
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* Certificate handling settings:\n"),
f0b236
-		N_("  -I NAME	nickname to give to tracking request\n"),
f0b236
-		N_("  -r		attempt to renew the certificate when expiration nears (default)\n"),
f0b236
-		N_("  -R		don't attempt to renew the certificate when expiration nears\n"),
f0b236
+		N_("  -I NAME, --new-id=NAME\n"),
f0b236
+		N_("			nickname to give to tracking request\n"),
f0b236
+		N_("  -r, --renew		attempt to renew the certificate when\n"),
f0b236
+		N_("			expiration nears (default)\n"),
f0b236
+		N_("  -R, --no-renew	don't attempt to renew the certificate when\n"),
f0b236
+		N_("			expiration nears\n"),
f0b236
 #ifndef FORCE_CA
f0b236
-		N_("  -c CA		use the specified CA rather than the default\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
 #endif
f0b236
-		N_("  -T PROFILE	ask the CA to process the request using the named profile or template\n"),
f0b236
+		N_("  -T PROFILE, --profile=NAME\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named profile or template\n"),
f0b236
 		N_("  --ms-template-spec SPEC\n"),
f0b236
-		N_("	 include V2 template specifier in CSR (format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
-		N_("  -X ISSUER	ask the CA to process the request using the named issuer\n"),
f0b236
+		N_("	 		include V2 template specifier in CSR\n"),
f0b236
+		N_("			(format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
+		N_("  -X ISSUER, --issuer=ISSUER\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named issuer\n"),
f0b236
 		N_("* Parameters for the signing request at renewal time:\n"),
f0b236
-		N_("  -U EXTUSAGE	override requested extended key usage OID\n"),
f0b236
-		N_("  -u KEYUSAGE	set requested key usage value\n"),
f0b236
-		N_("  -K NAME	override requested principal name\n"),
f0b236
-		N_("  -D DNSNAME	override requested DNS name\n"),
f0b236
-		N_("  -E EMAIL	override requested email address\n"),
f0b236
-		N_("  -A ADDRESS	override requested IP address\n"),
f0b236
-		N_("  -l FILE	file which holds an optional challenge password\n"),
f0b236
-		N_("  -L PASSWORD	an optional challenge password value\n"),
f0b236
+		N_("  -U EXTUSAGE, --extended-key-usage=EXTUSAGE\n"),
f0b236
+		N_("			override requested extended key usage OID\n"),
f0b236
+		N_("  -u KEYUSAGE, --key-usage=KEYUSAGE\n"),
f0b236
+		N_("			set requested key usage value\n"),
f0b236
+		N_("  -K NAME, --principal=NAME\n"),
f0b236
+		N_("			override requested principal name\n"),
f0b236
+		N_("  -D DNSNAME, --dns=DNSNAME\n"),
f0b236
+		N_("			override requested DNS name\n"),
f0b236
+		N_("  -E EMAIL, --email=EMAIL\n"),
f0b236
+		N_("			override requested email address\n"),
f0b236
+		N_("  -A ADDRESS, --ip-address=ADDRESS\n"),
f0b236
+		N_("			override requested IP address\n"),
f0b236
+		N_("  -l FILE, --challenge-password-file=FILE\n"),
f0b236
+		N_("			file which holds an optional challenge password\n"),
f0b236
+		N_("  -L PASSWORD, --challenge-password=PASSWORD\n"),
f0b236
+		N_("			an optional challenge password value\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S		connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s		connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -B	command to run before saving the certificate\n"),
f0b236
-		N_("  -C	command to run after saving the certificate\n"),
f0b236
-		N_("  -F	file in which to store the CA's certificates\n"),
f0b236
-		N_("  -a	NSS database in which to store the CA's certificates\n"),
f0b236
-		N_("  -w	try to wait for the certificate to be issued\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -B COMMAND, --before-command=COMMAND\n"),
f0b236
+		N_("			command to run before saving the certificate\n"),
f0b236
+		N_("  -C COMMAND, --after-command=COMMAND\n"),
f0b236
+		N_("			command to run after saving the certificate\n"),
f0b236
+		N_("  -F FILE, --ca-file=FILE\n"),
f0b236
+		N_("			file in which to store the CA's certificates\n"),
f0b236
+		N_("  -a DIR, --ca-dbdir=DIR\n"),
f0b236
+		N_("			NSS database in which to store the CA's certificates\n"),
f0b236
+		N_("  -w, --wait		try to wait for the certificate to be issued\n"),
f0b236
+		N_("  --wait-timeout TIMEOUT\n"),
f0b236
+		N_("			Maximum time to wait for the certificateto be issued\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
+		N_("  -o OWNER, --key-owner=OWNER\n"),
f0b236
+		N_("			owner information for private key\n"),
f0b236
+		N_("  -m MODE, --key-perms=MODE\n"),
f0b236
+		N_("			file permissions for private key\n"),
f0b236
+		N_("  -O OWNER, --cert-owner=OWNER\n"),
f0b236
+		N_("			owner information for certificate\n"),
f0b236
+		N_("  -M MODE, --cert-perms=MODE\n"),
f0b236
+		N_("			file permissions for certificate\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *stop_tracking_help[] = {
f0b236
@@ -4965,21 +5040,24 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Required arguments:\n"),
f0b236
 		N_("* By request identifier:\n"),
f0b236
-		N_("  -i NAME	nickname for tracking request\n"),
f0b236
+		N_("  -i NAME, --id=NAME	nickname for tracking request\n"),
f0b236
 		N_("* If using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	NSS database for key and cert\n"),
f0b236
-		N_("  -n NAME	nickname for NSS-based storage (only valid with -d)\n"),
f0b236
-		N_("  -t NAME	optional token name for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
 		N_("* If using files for storage:\n"),
f0b236
-		N_("  -k FILE	PEM file for private key\n"),
f0b236
-		N_("  -f FILE	PEM file for certificate (only valid with -k)\n"),
f0b236
+		N_("  -k FILE, --keyfile=FILE\n"),
f0b236
+		N_("			PEM file for private key\n"),
f0b236
+		N_("  -f FILE, --certfile=FILE\n"),
f0b236
+		N_("			PEM file for certificate (only valid with -k)\n"),
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S		connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s		connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
+		"\n",
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *resubmit_help[] = {
f0b236
@@ -4987,49 +5065,81 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Required arguments:\n"),
f0b236
 		N_("* By request identifier:\n"),
f0b236
-		N_("  -i NAME	nickname for tracking request\n"),
f0b236
+		N_("  -i NAME, --id=NAME	nickname for tracking request\n"),
f0b236
 		N_("* If using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	NSS database for key and cert\n"),
f0b236
-		N_("  -n NAME	nickname for NSS-based storage (only valid with -d)\n"),
f0b236
-		N_("  -t NAME	optional token name for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -t NAME, --token=NAME	optional token name for NSS-based storage\n"),
f0b236
+		N_("			(only valid with -d)\n"),
f0b236
 		N_("* If using files for storage:\n"),
f0b236
 		N_("  -f FILE	PEM file for certificate\n"),
f0b236
 		"\n",
f0b236
 		N_("* If keys are encrypted:\n"),
f0b236
-		N_("  -p FILE	file which holds the encryption PIN\n"),
f0b236
-		N_("  -P PIN	PIN value\n"),
f0b236
+		N_("  -p FILE, --pinfile=FILE\n"),
f0b236
+		N_("			file which holds the encryption PIN\n"),
f0b236
+		N_("  -P PIN, --pin=PIN	PIN value\n"),
f0b236
 		"\n",
f0b236
 		N_("* New parameter values for the signing request:\n"),
f0b236
-		N_("  -N NAME	set requested subject name (default: CN=<hostname>)\n"),
f0b236
-		N_("  -U EXTUSAGE	set requested extended key usage OID\n"),
f0b236
-		N_("  -u KEYUSAGE	set requested key usage value\n"),
f0b236
-		N_("  -K NAME	set requested principal name\n"),
f0b236
-		N_("  -D DNSNAME	set requested DNS name\n"),
f0b236
-		N_("  -E EMAIL	set requested email address\n"),
f0b236
-		N_("  -A ADDRESS	set requested IP address\n"),
f0b236
-		N_("  -l FILE	file which holds an optional challenge password\n"),
f0b236
-		N_("  -L PASSWORD	an optional challenge password value\n"),
f0b236
+		N_("  -N NAME, --subject-name=NAME\n"),
f0b236
+		N_("			set requested subject name (default: CN=<hostname>)\n"),
f0b236
+		N_("  -U EXTUSAGE, --extended-key-usage=EXTUSAGE\n"),
f0b236
+		N_("			override requested extended key usage OID\n"),
f0b236
+		N_("  -u KEYUSAGE, --key-usage=KEYUSAGE\n"),
f0b236
+		N_("			set requested key usage value\n"),
f0b236
+		N_("  -K NAME, --principal=NAME\n"),
f0b236
+		N_("			override requested principal name\n"),
f0b236
+		N_("  -D DNSNAME, --dns=DNSNAME\n"),
f0b236
+		N_("			override requested DNS name\n"),
f0b236
+		N_("  -E EMAIL, --email=EMAIL\n"),
f0b236
+		N_("			override requested email address\n"),
f0b236
+		N_("  -A ADDRESS, --ip-address=ADDRESS\n"),
f0b236
+		N_("			override requested IP address\n"),
f0b236
+		N_("  -l FILE, --challenge-password-file=FILE\n"),
f0b236
+		N_("			file which holds an optional challenge password\n"),
f0b236
+		N_("  -L PASSWORD, --challenge-password=PASSWORD\n"),
f0b236
+		N_("			an optional challenge password value\n"),
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* Certificate handling settings:\n"),
f0b236
-		N_("  -I NAME	new nickname to give to tracking request\n"),
f0b236
+		N_("  -I NAME, --new-id=NAME\n"),
f0b236
+		N_("			nickname to give to tracking request\n"),
f0b236
 #ifndef FORCE_CA
f0b236
-		N_("  -c CA		use the specified CA rather than the current one\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
 #endif
f0b236
-		N_("  -T PROFILE	ask the CA to process the request using the named profile or template\n"),
f0b236
+		N_("  -T PROFILE, --profile=NAME\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named profile or template\n"),
f0b236
 		N_("  --ms-template-spec SPEC\n"),
f0b236
-		N_("	 include V2 template specifier in CSR (format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
-		N_("  -X ISSUER	ask the CA to process the request using the named issuer\n"),
f0b236
+		N_("	 		include V2 template specifier in CSR\n"),
f0b236
+		N_("			(format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
+		N_("  -X ISSUER, --issuer=ISSUER\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named issuer\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S		connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s		connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -B	command to run before saving the certificate\n"),
f0b236
-		N_("  -C	command to run after saving the certificate\n"),
f0b236
-		N_("  -F	file in which to store the CA's certificates\n"),
f0b236
-		N_("  -a	NSS database in which to store the CA's certificates\n"),
f0b236
-		N_("  -w	try to wait for the certificate to be issued\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -B COMMAND, --before-command=COMMAND\n"),
f0b236
+		N_("			command to run before saving the certificate\n"),
f0b236
+		N_("  -C COMMAND, --after-command=COMMAND\n"),
f0b236
+		N_("			command to run after saving the certificate\n"),
f0b236
+		N_("  -F FILE, --ca-file=FILE\n"),
f0b236
+		N_("			file in which to store the CA's certificates\n"),
f0b236
+		N_("  -a DIR, --ca-dbdir=DIR\n"),
f0b236
+		N_("			NSS database in which to store the CA's certificates\n"),
f0b236
+		N_("  -w, --wait		try to wait for the certificate to be issued\n"),
f0b236
+		N_("  --wait-timeout TIMEOUT\n"),
f0b236
+		N_("			Maximum time to wait for the certificateto be issued\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
+		N_("  -o OWNER, --key-owner=OWNER\n"),
f0b236
+		N_("			owner information for private key\n"),
f0b236
+		N_("  -m MODE, --key-perms=MODE\n"),
f0b236
+		N_("			file permissions for private key\n"),
f0b236
+		N_("  -O OWNER, --cert-owner=OWNER\n"),
f0b236
+		N_("			owner information for certificate\n"),
f0b236
+		N_("  -M MODE, --cert-perms=MODE\n"),
f0b236
+		N_("			file permissions for certificate\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *rekey_help[] = {
f0b236
@@ -5037,51 +5147,80 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Required arguments:\n"),
f0b236
 		N_("* By request identifier:\n"),
f0b236
-		N_("  -i NAME	nickname for tracking request\n"),
f0b236
+		N_("  -i NAME, --id=NAME	nickname for tracking request\n"),
f0b236
 		N_("* If using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	NSS database for key and cert\n"),
f0b236
-		N_("  -n NAME	nickname for NSS-based storage (only valid with -d)\n"),
f0b236
-		N_("  -t NAME	optional token name for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -t NAME, --token=NAME	optional token name for NSS-based storage\n"),
f0b236
+		N_("			(only valid with -d)\n"),
f0b236
 		N_("* If using files for storage:\n"),
f0b236
-		N_("  -f FILE	PEM file for certificate\n"),
f0b236
+		N_("  -f FILE, --certfile=FILE\n"),
f0b236
+		N_("			PEM file for certificate\n"),
f0b236
 		"\n",
f0b236
 		N_("* If keys are encrypted:\n"),
f0b236
-		N_("  -p FILE	file which holds the encryption PIN\n"),
f0b236
-		N_("  -P PIN	PIN value\n"),
f0b236
+		N_("  -p FILE, --pinfile=FILE\n"),
f0b236
+		N_("			file which holds the encryption PIN\n"),
f0b236
+		N_("  -P PIN, --pin=PIN	PIN value\n"),
f0b236
 		"\n",
f0b236
 		N_("* New parameter values for the signing request:\n"),
f0b236
-		N_("  -N NAME	set requested subject name (default: CN=<hostname>)\n"),
f0b236
-		N_("  -U EXTUSAGE	set requested extended key usage OID\n"),
f0b236
-		N_("  -u KEYUSAGE	set requested key usage value\n"),
f0b236
-		N_("  -K NAME	set requested principal name\n"),
f0b236
-		N_("  -D DNSNAME	set requested DNS name\n"),
f0b236
-		N_("  -E EMAIL	set requested email address\n"),
f0b236
-		N_("  -A ADDRESS	set requested IP address\n"),
f0b236
-		N_("  -l FILE	file which holds an optional challenge password\n"),
f0b236
-		N_("  -L PASSWORD	an optional challenge password value\n"),
f0b236
+		N_("  -N NAME, --subject-name=NAME\n"),
f0b236
+		N_("			set requested subject name (default: CN=<hostname>)\n"),
f0b236
+		N_("  -U EXTUSAGE, --extended-key-usage=EXTUSAGE\n"),
f0b236
+		N_("			override requested extended key usage OID\n"),
f0b236
+		N_("  -u KEYUSAGE, --key-usage=KEYUSAGE\n"),
f0b236
+		N_("			set requested key usage value\n"),
f0b236
+		N_("  -K NAME, --principal=NAME\n"),
f0b236
+		N_("			override requested principal name\n"),
f0b236
+		N_("  -D DNSNAME, --dns=DNSNAME\n"),
f0b236
+		N_("			override requested DNS name\n"),
f0b236
+		N_("  -E EMAIL, --email=EMAIL\n"),
f0b236
+		N_("			override requested email address\n"),
f0b236
+		N_("  -A ADDRESS, --ip-address=ADDRESS\n"),
f0b236
+		N_("			override requested IP address\n"),
f0b236
+		N_("  -l FILE, --challenge-password-file=FILE\n"),
f0b236
+		N_("			file which holds an optional challenge password\n"),
f0b236
+		N_("  -L PASSWORD, --challenge-password=PASSWORD\n"),
f0b236
+		N_("			an optional challenge password value\n"),
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* Certificate handling settings:\n"),
f0b236
-		N_("  -I NAME	new nickname to give to tracking request\n"),
f0b236
+		N_("  -I NAME, --new-id=NAME\n"),
f0b236
+		N_("			new nickname to give to tracking request\n"),
f0b236
 #ifndef FORCE_CA
f0b236
-		N_("  -c CA		use the specified CA rather than the current one\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
 #endif
f0b236
-		N_("  -T PROFILE	ask the CA to process the request using the named profile or template\n"),
f0b236
+		N_("  -T PROFILE, --profile=NAME\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named profile or template\n"),
f0b236
 		N_("  --ms-template-spec SPEC\n"),
f0b236
-		N_("	 include V2 template specifier in CSR (format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
-		N_("  -X ISSUER	ask the CA to process the request using the named issuer\n"),
f0b236
-		N_("  -G TYPE	type of new key to be generated\n"),
f0b236
-		N_("  -g SIZE	size of new key to be generated\n"),
f0b236
+		N_("	 		include V2 template specifier in CSR\n"),
f0b236
+		N_("			(format: OID:MAJOR-VERSION[:MINOR-VERSION])\n"),
f0b236
+		N_("  -X ISSUER, --issuer=ISSUER\n"),
f0b236
+		N_("			ask the CA to process the request using the\n"),
f0b236
+		N_("			named issuer\n"),
f0b236
+		N_("  -G TYPE, --key-type=TYPE\n"),
f0b236
+		N_("			type of key to be generated if one is not already\n"),
f0b236
+		N_("			in place\n"),
f0b236
+		N_("  -g BITS, --key-size=BITS\n"),
f0b236
+		N_("			size of key to be generated if one is not already\n"),
f0b236
+		N_("			in place\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S		connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s		connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -B	command to run before saving the certificate\n"),
f0b236
-		N_("  -C	command to run after saving the certificate\n"),
f0b236
-		N_("  -F	file in which to store the CA's certificates\n"),
f0b236
-		N_("  -a	NSS database in which to store the CA's certificates\n"),
f0b236
-		N_("  -w	try to wait for the certificate to be issued\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -B COMMAND, --before-command=COMMAND\n"),
f0b236
+		N_("			command to run before saving the certificate\n"),
f0b236
+		N_("  -C COMMAND, --after-command=COMMAND\n"),
f0b236
+		N_("			command to run after saving the certificate\n"),
f0b236
+		N_("  -F FILE, --ca-file=FILE\n"),
f0b236
+		N_("			file in which to store the CA's certificates\n"),
f0b236
+		N_("  -a DIR, --ca-dbdir=DIR\n"),
f0b236
+		N_("			NSS database in which to store the CA's certificates\n"),
f0b236
+		N_("  -w, --wait		try to wait for the certificate to be issued\n"),
f0b236
+		N_("  --wait-timeout TIMEOUT\n"),
f0b236
+		N_("			Maximum time to wait for the certificateto be issued\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *list_help[] = {
f0b236
@@ -5090,46 +5229,52 @@ help(const char *twopartcmd, const char *category)
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* General options:\n"),
f0b236
 #ifndef FORCE_CA
f0b236
-		N_("  -c CA	list only requests and certs associated with this CA\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
 #endif
f0b236
-		N_("  -r	list only information about outstanding requests\n"),
f0b236
-		N_("  -t	list only information about tracked certificates\n"),
f0b236
-		N_("  -u	display times in UTC instead of local time\n"),
f0b236
+		N_("  -r, --requests-only	list only information about outstanding requests\n"),
f0b236
+		N_("  -t, --tracking-only	list only information about tracked certificates\n"),
f0b236
+		N_("  -u, --utc		display times in UTC instead of local time\n"),
f0b236
 		N_("* If selecting a specific request:\n"),
f0b236
-		N_("  -i NAME	nickname for tracking request\n"),
f0b236
+		N_("  -i NAME, --id=NAME	nickname for tracking request\n"),
f0b236
 		N_("* If using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	only list requests and certs which use this NSS database\n"),
f0b236
-		N_("  -n NAME	only list requests and certs which use this nickname\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
 		N_("* If using files for storage:\n"),
f0b236
-		N_("  -f FILE	only list requests and certs stored in this PEM file\n"),
f0b236
+		N_("  -f FILE, --certfile=FILE\n"),
f0b236
+		N_("			only list requests and certs stored in this PEM file\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *refresh_help[] = {
f0b236
 		N_("Usage: %s refresh [options]\n"),
f0b236
 		"\n",
f0b236
 		N_("* General options:\n"),
f0b236
-		N_("  -a	refresh information about all outstanding requests\n"),
f0b236
+		N_("  -a, --all		refresh information about all outstanding requests\n"),
f0b236
 		"\n",
f0b236
 		N_("Required arguments:\n"),
f0b236
 		N_("* By request identifier:\n"),
f0b236
-		N_("  -i NAME	nickname for tracking request\n"),
f0b236
+		N_("  -i NAME, --id=NAME	nickname for tracking request\n"),
f0b236
 		N_("* If using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	NSS database for key and cert\n"),
f0b236
-		N_("  -n NAME	nickname for NSS-based storage (only valid with -d)\n"),
f0b236
-		N_("  -t NAME	optional token name for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
+		N_("  -t NAME, --token=NAME	optional token name for NSS-based storage\n"),
f0b236
+		N_("			(only valid with -d)\n"),
f0b236
 		N_("* If using files for storage:\n"),
f0b236
-		N_("  -f FILE	PEM file for certificate\n"),
f0b236
+		N_("  -f FILE, --certfile=FILE\n"),
f0b236
+		N_("			PEM file for certificate\n"),
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S		connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s		connect to the certmonger service on the session bus\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
+		N_("* Other options:\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *status_help[] = {
f0b236
@@ -5137,17 +5282,19 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* Selecting a specific request:\n"),
f0b236
-		N_("  -i NAME	nickname for tracking request\n"),
f0b236
+		N_("  -i NAME, --id=NAME	nickname for tracking request\n"),
f0b236
 		N_("* When using an NSS database for storage:\n"),
f0b236
-		N_("  -d DIR	return status for the request in this NSS database\n"),
f0b236
-		N_("  -n NAME	return status for cert which uses this nickname\n"),
f0b236
+		N_("  -d DIR, --dbdir=DIR	NSS database for key and cert\n"),
f0b236
+		N_("  -n NAME, --nickname NAME\n"),
f0b236
+		N_("			nickname for NSS-based storage (only valid with -d)\n"),
f0b236
 		N_("* When using files for storage:\n"),
f0b236
-		N_("  -f FILE	return status for cert stored in this PEM file\n"),
f0b236
+		N_("  -f FILE, --certfile=FILE\n"),
f0b236
+		N_("			return status for cert stored in this PEM file\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *list_cas_help[] = {
f0b236
@@ -5156,13 +5303,13 @@ help(const char *twopartcmd, const char *category)
f0b236
 		N_("Optional arguments:\n"),
f0b236
 #ifndef FORCE_CA
f0b236
 		N_("* General options:\n"),
f0b236
-		N_("  -c CA	list only information about the CA with this name\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
 #endif
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *refresh_ca_help[] = {
f0b236
@@ -5171,14 +5318,14 @@ help(const char *twopartcmd, const char *category)
f0b236
 		N_("Optional arguments:\n"),
f0b236
 #ifndef FORCE_CA
f0b236
 		N_("* General options:\n"),
f0b236
-		N_("  -c CA	refresh information about the CA with this name\n"),
f0b236
-		N_("  -a	refresh information about all known CAs\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
+		N_("  -a, --all		refresh information about all known CAs\n"),
f0b236
 #endif
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 #ifndef FORCE_CA
f0b236
@@ -5187,13 +5334,13 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* General options:\n"),
f0b236
-		N_("  -c CA		nickname to give to the new CA configuration\n"),
f0b236
-		N_("  -e CMD	helper command to run to communicate with CA\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
+		N_("  -e CMD, --command CMD	helper command to run to communicate with CA\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *add_scep_ca_help[] = {
f0b236
@@ -5201,18 +5348,23 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* General options:\n"),
f0b236
-		N_("  -c CA		nickname to give to the new CA configuration\n"),
f0b236
-		N_("  -u URL	location of SCEP server\n"),
f0b236
-		N_("  -i ID		CA identifier\n"),
f0b236
-		N_("  -R FILE	file containing CA's certificate\n"),
f0b236
-		N_("  -r FILE	file containing RA's certificate\n"),
f0b236
-		N_("  -I FILE	file containing certificates in RA's certifying chain\n"),
f0b236
-		N_("  -n	prefer not to use the SCEP Renewal feature\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
+		N_("  -u URL, --URL URL	location of SCEP server\n"),
f0b236
+		N_("  -i ID, --id ID	CA identifier\n"),
f0b236
+		N_("  -R FILE, --cacert=FILE\n"),
f0b236
+		N_("			file containing web server's certificate\n"),
f0b236
+		N_("  -r FILE, --racert=FILE\n"),
f0b236
+		N_("			file containing RA's certificate\n"),
f0b236
+		N_("  -N FILE, --signingca=FILE\n"),
f0b236
+		N_("			file containing CA's certificate\n"),
f0b236
+		N_("  -I FILE, --other-certs=FILE\n"),
f0b236
+		N_("			file containing certificates in RA's certifying chain\n"),
f0b236
+		N_("  -n, --non-renewal	prefer not to use the SCEP Renewal feature\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *modify_ca_help[] = {
f0b236
@@ -5220,13 +5372,13 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* General options:\n"),
f0b236
-		N_("  -c CA		nickname of the CA configuration\n"),
f0b236
-		N_("  -e CMD	updated helper command to run to communicate with CA\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
+		N_("  -e CMD, --command CMD	helper command to run to communicate with CA\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 	const char *remove_ca_help[] = {
f0b236
@@ -5234,12 +5386,12 @@ help(const char *twopartcmd, const char *category)
f0b236
 		"\n",
f0b236
 		N_("Optional arguments:\n"),
f0b236
 		N_("* General options:\n"),
f0b236
-		N_("  -c CA	nickname of CA configuration to remove\n"),
f0b236
+		N_("  -c CA, --ca=NAME	use the specified CA rather than the default\n"),
f0b236
 		N_("* Bus options:\n"),
f0b236
-		N_("  -S	connect to the certmonger service on the system bus\n"),
f0b236
-		N_("  -s	connect to the certmonger service on the session bus\n"),
f0b236
+		N_("  -S, --system		connect to the certmonger service on the system bus\n"),
f0b236
+		N_("  -s, --session		connect to the certmonger service on the session bus\n"),
f0b236
 		N_("* Other options:\n"),
f0b236
-		N_("  -v	report all details of errors\n"),
f0b236
+		N_("  -v, --verbose		report all details of errors\n"),
f0b236
 		NULL,
f0b236
 	};
f0b236
 #endif
f0b236
diff --git a/src/scep.c b/src/scep.c
f0b236
index 4294cda..4dde1ce 100644
f0b236
--- a/src/scep.c
f0b236
+++ b/src/scep.c
f0b236
@@ -230,7 +230,7 @@ main(int argc, const char **argv)
f0b236
 		{"url", 'u', POPT_ARG_STRING, &url, 0, "service location", "URL"},
f0b236
 		{"ca-identifier", 'i', POPT_ARG_STRING, &id, 0, "name to use when querying for capabilities", "IDENTIFIER"},
f0b236
 		{"retrieve-ca-capabilities", 'c', POPT_ARG_NONE, NULL, 'c', "make a GetCACaps request", NULL},
f0b236
-		{"retrieve-ca-certificates", 'C', POPT_ARG_NONE, NULL, 'C', "make GetCACert/GetCAChain requests", NULL},
f0b236
+		{"retrieve-ca-certificates", 'C', POPT_ARG_NONE, NULL, 'C', "make GetCACert request", NULL},
f0b236
 		{"get-initial-cert", 'g', POPT_ARG_NONE, NULL, 'g', "send a PKIOperation pkiMessage", NULL},
f0b236
 		{"pki-message", 'p', POPT_ARG_NONE, NULL, 'p', "send a PKIOperation pkiMessage", NULL},
f0b236
 		{"racert", 'r', POPT_ARG_STRING, NULL, 'r', "the RA certificate, used for encrypting requests", "FILENAME"},
f0b236
-- 
f0b236
2.21.1
f0b236