summaryrefslogtreecommitdiff
path: root/ssh-keygen.1
diff options
context:
space:
mode:
authorjmc@openbsd.org <jmc@openbsd.org>2019-09-27 20:03:24 +0000
committerDamien Miller <djm@mindrot.org>2019-10-01 20:24:07 +1000
commit3b44bf39ff4d7ef5d50861e2e9dda62d2926d2fe (patch)
tree6ae0fdb1e6c99a7b5e0a7518ca7c1fa26ec35064 /ssh-keygen.1
parent3e53ef28fab53094e3b19622ba0e9c3d5fe71273 (diff)
upstream: fix the DH-GEX text in -a; because this required a comma,
i added a comma to the first part, for balance... OpenBSD-Commit-ID: 2c3464e9e82a41e8cdfe8f0a16d94266e43dbb58
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r--ssh-keygen.110
1 files changed, 5 insertions, 5 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index a199d95a5..5d499fc5e 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.168 2019/09/20 18:50:58 jmc Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.169 2019/09/27 20:03:24 jmc Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -35,7 +35,7 @@
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\" 37.\"
38.Dd $Mdocdate: September 20 2019 $ 38.Dd $Mdocdate: September 27 2019 $
39.Dt SSH-KEYGEN 1 39.Dt SSH-KEYGEN 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -264,15 +264,15 @@ This is used by
264.Pa /etc/rc 264.Pa /etc/rc
265to generate new host keys. 265to generate new host keys.
266.It Fl a Ar rounds 266.It Fl a Ar rounds
267When saving a private key this option specifies the number of KDF 267When saving a private key, this option specifies the number of KDF
268(key derivation function) rounds used. 268(key derivation function) rounds used.
269Higher numbers result in slower passphrase verification and increased 269Higher numbers result in slower passphrase verification and increased
270resistance to brute-force password cracking (should the keys be stolen). 270resistance to brute-force password cracking (should the keys be stolen).
271.Pp 271.Pp
272When screening DH-GEX candidates (using the 272When screening DH-GEX candidates (using the
273.Fl T 273.Fl T
274command). 274command),
275This option specifies the number of primality tests to perform. 275this option specifies the number of primality tests to perform.
276.It Fl B 276.It Fl B
277Show the bubblebabble digest of specified private or public key file. 277Show the bubblebabble digest of specified private or public key file.
278.It Fl b Ar bits 278.It Fl b Ar bits