Replaced secaudit by ntfssecaudit in its own usage output

The usage output did not match the command name change
pull/2/head
Jean-Pierre André 2017-02-11 08:57:37 +01:00
parent fdefd8feba
commit b66f5f8241
1 changed files with 40 additions and 40 deletions

View File

@ -16,47 +16,47 @@
* -t run internal tests (with no access to storage)
*
* On Linux (being root, with volume not mounted) :
* secaudit -h [file]
* ntfssecaudit -h [file]
* display the security descriptors found in file
* secaudit -a[rv] volume
* ntfssecaudit -a[rv] volume
* audit the volume
* secaudit [-v] volume file
* ntfssecaudit [-v] volume file
* display the security parameters of file
* secaudit -r[v] volume directory
* ntfssecaudit -r[v] volume directory
* display the security parameters of files in directory
* secaudit -b[v] volume [directory]
* ntfssecaudit -b[v] volume [directory]
* backup the security parameters of files in directory
* secaudit -s[ve] volume [backupfile]
* ntfssecaudit -s[ve] volume [backupfile]
* set the security parameters as indicated in backup
* with -e set extra parameters (Windows attrib)
* secaudit volume perms file
* ntfssecaudit volume perms file
* set the security parameters of file to perms (mode or acl)
* secaudit -r[v] volume perms directory
* ntfssecaudit -r[v] volume perms directory
* set the security parameters of files in directory to perms
* special cases, do not require being root :
* secaudit [-v] mounted-file
* ntfssecaudit [-v] mounted-file
* display the security parameters of mounted file
* secaudit -u[v] mounted-file
* ntfssecaudit -u[v] mounted-file
* display a user mapping proposal
*
*
* On Windows (the volume being part of file name)
* secaudit -h [file]
* ntfssecaudit -h [file]
* display the security descriptors found in file
* secaudit -a[rv] volume
* ntfssecaudit -a[rv] volume
* audit the volume
* secaudit [-v] file
* ntfssecaudit [-v] file
* display the security parameters of file
* secaudit -r[v] directory
* ntfssecaudit -r[v] directory
* display the security parameters of files in directory
* secaudit -b[v] directory
* ntfssecaudit -b[v] directory
* backup the security parameters of files in directory
* secaudit -s[v] volume [backupfile]
* ntfssecaudit -s[v] volume [backupfile]
* set the security parameters as indicated in backup
* with -e set extra parameters (Windows attrib)
* secaudit perms file
* ntfssecaudit perms file
* set the security parameters of file to perms (mode or acl)
* secaudit -r[v] perms directory
* ntfssecaudit -r[v] perms directory
* set the security parameters of files in directory to perms
*/
@ -583,7 +583,7 @@ static BOOL open_volume(const char *volume, unsigned long flags)
ntfs_context = ntfs_initialize_file_security(volume, flags);
if (ntfs_context) {
if (*(u32*)ntfs_context != MAGIC_API) {
fprintf(stderr,"Versions of ntfs-3g and secaudit"
fprintf(stderr,"Versions of ntfs-3g and ntfssecaudit"
" are not compatible\n");
} else {
fprintf(stderr,"\"%s\" opened %s\n",volume,
@ -5941,27 +5941,27 @@ static void usage(void)
#ifdef HAVE_WINDOWS_H
fprintf(stderr,"Usage:\n");
#ifdef SELFTESTS
fprintf(stderr," secaudit -t\n");
fprintf(stderr," ntfssecaudit -t\n");
fprintf(stderr," run self-tests\n");
#endif /* SELFTESTS */
fprintf(stderr," secaudit -h [file]\n");
fprintf(stderr," ntfssecaudit -h [file]\n");
fprintf(stderr," display security descriptors within file\n");
fprintf(stderr," secaudit -a[rv] volume\n");
fprintf(stderr," ntfssecaudit -a[rv] volume\n");
fprintf(stderr," audit the volume\n");
fprintf(stderr," secaudit [-v] file\n");
fprintf(stderr," ntfssecaudit [-v] file\n");
fprintf(stderr," display the security parameters of file\n");
fprintf(stderr," secaudit -r[v] directory\n");
fprintf(stderr," ntfssecaudit -r[v] directory\n");
fprintf(stderr," display the security parameters of files in directory\n");
fprintf(stderr," secaudit -b[v] directory\n");
fprintf(stderr," ntfssecaudit -b[v] directory\n");
fprintf(stderr," backup the security parameters of files in directory\n");
fprintf(stderr," secaudit -s[ev] volume [backupfile]\n");
fprintf(stderr," ntfssecaudit -s[ev] volume [backupfile]\n");
fprintf(stderr," set the security parameters as indicated in backup file\n");
fprintf(stderr," with -e also set extra parameters (Windows attrib)\n");
fprintf(stderr," secaudit perms file\n");
fprintf(stderr," ntfssecaudit perms file\n");
fprintf(stderr," set the security parameters of file to perms\n");
fprintf(stderr," secaudit -r[v] perms directory\n");
fprintf(stderr," ntfssecaudit -r[v] perms directory\n");
fprintf(stderr," set the security parameters of files in directory to perms\n");
fprintf(stderr," secaudit -u file\n");
fprintf(stderr," ntfssecaudit -u file\n");
fprintf(stderr," get a user mapping proposal applicable to file\n");
#if POSIXACLS
fprintf(stderr," Notes: perms can be an octal mode or a Posix ACL description\n");
@ -5973,31 +5973,31 @@ static void usage(void)
#else /* HAVE_WINDOWS_H */
fprintf(stderr,"Usage:\n");
#ifdef SELFTESTS
fprintf(stderr," secaudit -t\n");
fprintf(stderr," ntfssecaudit -t\n");
fprintf(stderr," run self-tests\n");
#endif /* SELFTESTS */
fprintf(stderr," secaudit -h [file]\n");
fprintf(stderr," ntfssecaudit -h [file]\n");
fprintf(stderr," display security descriptors within file\n");
fprintf(stderr," secaudit -a[rv] volume\n");
fprintf(stderr," ntfssecaudit -a[rv] volume\n");
fprintf(stderr," audit the volume\n");
fprintf(stderr," secaudit [-v] volume file\n");
fprintf(stderr," ntfssecaudit [-v] volume file\n");
fprintf(stderr," display the security parameters of file\n");
fprintf(stderr," secaudit -r[v] volume directory\n");
fprintf(stderr," ntfssecaudit -r[v] volume directory\n");
fprintf(stderr," display the security parameters of files in directory\n");
fprintf(stderr," secaudit -b[v] volume directory\n");
fprintf(stderr," ntfssecaudit -b[v] volume directory\n");
fprintf(stderr," backup the security parameters of files in directory\n");
fprintf(stderr," secaudit -s[ev] volume [backupfile]\n");
fprintf(stderr," ntfssecaudit -s[ev] volume [backupfile]\n");
fprintf(stderr," set the security parameters as indicated in backup file\n");
fprintf(stderr," with -e also set extra parameters (Windows attrib)\n");
fprintf(stderr," secaudit volume perms file\n");
fprintf(stderr," ntfssecaudit volume perms file\n");
fprintf(stderr," set the security parameters of file to perms\n");
fprintf(stderr," secaudit -r[v] volume perms directory\n");
fprintf(stderr," ntfssecaudit -r[v] volume perms directory\n");
fprintf(stderr," set the security parameters of files in directory to perms\n");
#ifdef HAVE_SETXATTR
fprintf(stderr," special cases, do not require being root :\n");
fprintf(stderr," secaudit -u mounted-file\n");
fprintf(stderr," ntfssecaudit -u mounted-file\n");
fprintf(stderr," get a user mapping proposal applicable to mounted file\n");
fprintf(stderr," secaudit [-v] mounted-file\n");
fprintf(stderr," ntfssecaudit [-v] mounted-file\n");
fprintf(stderr," display the security parameters of a mounted file\n");
#endif /* HAVE_SETXATTR */
#if POSIXACLS