diff options
author | Colin Watson <cjwatson@debian.org> | 2016-08-06 10:49:59 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2016-08-07 12:18:58 +0100 |
commit | 477bb7636238c106f8cd7c868a8c0c5eabcfb3db (patch) | |
tree | 601176af2ecf358c36b766776a86845ad7a3cd6f /sftp.1 | |
parent | 747fac2de0d889183f67f6900194c0462c558544 (diff) | |
parent | 4c914ccd85bbf391c4dc61b85e3c178fef465e3f (diff) |
New upstream release (7.3p1).
Diffstat (limited to 'sftp.1')
-rw-r--r-- | sftp.1 | 8 |
1 files changed, 5 insertions, 3 deletions
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: sftp.1,v 1.102 2015/09/25 18:19:54 jmc Exp $ | 1 | .\" $OpenBSD: sftp.1,v 1.105 2016/07/16 06:57:55 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2001 Damien Miller. All rights reserved. | 3 | .\" Copyright (c) 2001 Damien Miller. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -22,7 +22,7 @@ | |||
22 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 22 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
23 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 23 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
24 | .\" | 24 | .\" |
25 | .Dd $Mdocdate: September 25 2015 $ | 25 | .Dd $Mdocdate: July 16 2016 $ |
26 | .Dt SFTP 1 | 26 | .Dt SFTP 1 |
27 | .Os | 27 | .Os |
28 | .Sh NAME | 28 | .Sh NAME |
@@ -220,8 +220,9 @@ For full details of the options listed below, and their possible values, see | |||
220 | .It HostKeyAlgorithms | 220 | .It HostKeyAlgorithms |
221 | .It HostKeyAlias | 221 | .It HostKeyAlias |
222 | .It HostName | 222 | .It HostName |
223 | .It IdentityFile | ||
224 | .It IdentitiesOnly | 223 | .It IdentitiesOnly |
224 | .It IdentityAgent | ||
225 | .It IdentityFile | ||
225 | .It IPQoS | 226 | .It IPQoS |
226 | .It KbdInteractiveAuthentication | 227 | .It KbdInteractiveAuthentication |
227 | .It KbdInteractiveDevices | 228 | .It KbdInteractiveDevices |
@@ -236,6 +237,7 @@ For full details of the options listed below, and their possible values, see | |||
236 | .It PreferredAuthentications | 237 | .It PreferredAuthentications |
237 | .It Protocol | 238 | .It Protocol |
238 | .It ProxyCommand | 239 | .It ProxyCommand |
240 | .It ProxyJump | ||
239 | .It PubkeyAuthentication | 241 | .It PubkeyAuthentication |
240 | .It RekeyLimit | 242 | .It RekeyLimit |
241 | .It RhostsRSAAuthentication | 243 | .It RhostsRSAAuthentication |