diff options
author | jmc@openbsd.org <jmc@openbsd.org> | 2019-12-27 08:28:44 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-12-30 14:31:40 +1100 |
commit | 20ccd854245c598e2b47cc9f8d4955d645195055 (patch) | |
tree | a9db76540d1b035531862531b241a517de17d358 /ssh-keygen.1 | |
parent | 5b6c954751dd3677466cda7adb92e4f05446c96c (diff) |
upstream: sort -Y internally in the options list, as is already
done in synopsis;
OpenBSD-Commit-ID: 86d033c5764404057616690d7be992e445b42274
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r-- | ssh-keygen.1 | 34 |
1 files changed, 17 insertions, 17 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1 index 8d62bc72e..038e2c578 100644 --- a/ssh-keygen.1 +++ b/ssh-keygen.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keygen.1,v 1.181 2019/12/27 08:25:07 jmc Exp $ | 1 | .\" $OpenBSD: ssh-keygen.1,v 1.182 2019/12/27 08:28:44 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -688,6 +688,22 @@ Note that | |||
688 | .Xr sshd 8 | 688 | .Xr sshd 8 |
689 | will refuse such signatures by default, unless overridden via | 689 | will refuse such signatures by default, unless overridden via |
690 | an authorized_keys option. | 690 | an authorized_keys option. |
691 | .It Fl Y Cm check-novalidate | ||
692 | Checks that a signature generated using | ||
693 | .Nm | ||
694 | .Fl Y Cm sign | ||
695 | has a valid structure. | ||
696 | This does not validate if a signature comes from an authorized signer. | ||
697 | When testing a signature, | ||
698 | .Nm | ||
699 | accepts a message on standard input and a signature namespace using | ||
700 | .Fl n . | ||
701 | A file containing the corresponding signature must also be supplied using the | ||
702 | .Fl s | ||
703 | flag. | ||
704 | Successful testing of the signature is signalled by | ||
705 | .Nm | ||
706 | returning a zero exit status. | ||
691 | .It Fl Y Cm sign | 707 | .It Fl Y Cm sign |
692 | Cryptographically sign a file or some data using a SSH key. | 708 | Cryptographically sign a file or some data using a SSH key. |
693 | When signing, | 709 | When signing, |
@@ -744,22 +760,6 @@ The revocation file may be a KRL or a one-per-line list of public keys. | |||
744 | Successful verification by an authorized signer is signalled by | 760 | Successful verification by an authorized signer is signalled by |
745 | .Nm | 761 | .Nm |
746 | returning a zero exit status. | 762 | returning a zero exit status. |
747 | .It Fl Y Cm check-novalidate | ||
748 | Checks that a signature generated using | ||
749 | .Nm | ||
750 | .Fl Y Cm sign | ||
751 | has a valid structure. | ||
752 | This does not validate if a signature comes from an authorized signer. | ||
753 | When testing a signature, | ||
754 | .Nm | ||
755 | accepts a message on standard input and a signature namespace using | ||
756 | .Fl n . | ||
757 | A file containing the corresponding signature must also be supplied using the | ||
758 | .Fl s | ||
759 | flag. | ||
760 | Successful testing of the signature is signalled by | ||
761 | .Nm | ||
762 | returning a zero exit status. | ||
763 | .It Fl y | 763 | .It Fl y |
764 | This option will read a private | 764 | This option will read a private |
765 | OpenSSH format file and print an OpenSSH public key to stdout. | 765 | OpenSSH format file and print an OpenSSH public key to stdout. |