summaryrefslogtreecommitdiff
path: root/ssh-keygen.1
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2012-05-17 13:04:02 +0100
committerColin Watson <cjwatson@debian.org>2012-05-17 13:04:02 +0100
commitdd5ed53e20d218607260916a6b04d1c8c5b3d88f (patch)
treec59b4dbcc610f10700945f885adf3bddc2542c26 /ssh-keygen.1
parent8241a65bf12ac53c1b7304bba7ce739aad80b8b8 (diff)
parentb9bc38990c5eb5d99e28ca5af6d3491fd4a0060a (diff)
merge 6.0p1
Diffstat (limited to 'ssh-keygen.1')
-rw-r--r--ssh-keygen.115
1 files changed, 12 insertions, 3 deletions
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index ede37921c..41da2077b 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.106 2011/04/13 04:09:37 djm Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.108 2011/10/16 11:02:46 dtucker Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -35,7 +35,7 @@
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\" 37.\"
38.Dd $Mdocdate: April 13 2011 $ 38.Dd $Mdocdate: October 16 2011 $
39.Dt SSH-KEYGEN 1 39.Dt SSH-KEYGEN 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -104,6 +104,7 @@
104.Fl f Ar input_file 104.Fl f Ar input_file
105.Op Fl v 105.Op Fl v
106.Op Fl a Ar num_trials 106.Op Fl a Ar num_trials
107.Op Fl K Ar checkpt
107.Op Fl W Ar generator 108.Op Fl W Ar generator
108.Nm ssh-keygen 109.Nm ssh-keygen
109.Fl s Ar ca_key 110.Fl s Ar ca_key
@@ -214,7 +215,7 @@ Generally, 2048 bits is considered sufficient.
214DSA keys must be exactly 1024 bits as specified by FIPS 186-2. 215DSA keys must be exactly 1024 bits as specified by FIPS 186-2.
215For ECDSA keys, the 216For ECDSA keys, the
216.Fl b 217.Fl b
217flag determines they key length by selecting from one of three elliptic 218flag determines the key length by selecting from one of three elliptic
218curve sizes: 256, 384 or 521 bits. 219curve sizes: 256, 384 or 521 bits.
219Attempting to use bit lengths other than these three values for ECDSA keys 220Attempting to use bit lengths other than these three values for ECDSA keys
220will fail. 221will fail.
@@ -296,6 +297,14 @@ in the format specified by the
296.Fl m 297.Fl m
297option and print an OpenSSH compatible private 298option and print an OpenSSH compatible private
298(or public) key to stdout. 299(or public) key to stdout.
300.It Fl K Ar checkpt
301Write the last line processed to the file
302.Ar checkpt
303while performing DH candidate screening using the
304.Fl T
305option.
306This will be used to skip lines in the input file that have already been
307processed if the job is restarted.
299This option allows importing keys from other software, including several 308This option allows importing keys from other software, including several
300commercial SSH implementations. 309commercial SSH implementations.
301The default import format is 310The default import format is