summaryrefslogtreecommitdiff
path: root/ssh-keyscan.1
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2005-03-02 12:04:01 +1100
committerDamien Miller <djm@mindrot.org>2005-03-02 12:04:01 +1100
commit9a2fdbd0d6e13dd28612a351561adb6b32b94bd5 (patch)
tree3d255df7d03a16fd1b53e22eb34299f98cf715ff /ssh-keyscan.1
parent4c9c6fdcfe21dcb220fb51177e6caa75e97c3d38 (diff)
- jmc@cvs.openbsd.org 2005/03/01 15:47:14
[ssh-keyscan.1 ssh-keyscan.c] sort options and sync usage();
Diffstat (limited to 'ssh-keyscan.1')
-rw-r--r--ssh-keyscan.144
1 files changed, 22 insertions, 22 deletions
diff --git a/ssh-keyscan.1 b/ssh-keyscan.1
index 63427e727..7e846f77c 100644
--- a/ssh-keyscan.1
+++ b/ssh-keyscan.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keyscan.1,v 1.19 2005/03/01 10:41:28 djm Exp $ 1.\" $OpenBSD: ssh-keyscan.1,v 1.20 2005/03/01 15:47:14 jmc Exp $
2.\" 2.\"
3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>. 3.\" Copyright 1995, 1996 by David Mazieres <dm@lcs.mit.edu>.
4.\" 4.\"
@@ -15,11 +15,11 @@
15.Sh SYNOPSIS 15.Sh SYNOPSIS
16.Nm ssh-keyscan 16.Nm ssh-keyscan
17.Bk -words 17.Bk -words
18.Op Fl Hv46 18.Op Fl 46Hv
19.Op Fl f Ar file
19.Op Fl p Ar port 20.Op Fl p Ar port
20.Op Fl T Ar timeout 21.Op Fl T Ar timeout
21.Op Fl t Ar type 22.Op Fl t Ar type
22.Op Fl f Ar file
23.Op Ar host | addrlist namelist 23.Op Ar host | addrlist namelist
24.Op Ar ... 24.Op Ar ...
25.Ek 25.Ek
@@ -46,6 +46,25 @@ scanning process involve any encryption.
46.Pp 46.Pp
47The options are as follows: 47The options are as follows:
48.Bl -tag -width Ds 48.Bl -tag -width Ds
49.It Fl 4
50Forces
51.Nm
52to use IPv4 addresses only.
53.It Fl 6
54Forces
55.Nm
56to use IPv6 addresses only.
57.It Fl f Ar file
58Read hosts or
59.Pa addrlist namelist
60pairs from this file, one per line.
61If
62.Pa -
63is supplied instead of a filename,
64.Nm
65will read hosts or
66.Pa addrlist namelist
67pairs from the standard input.
49.It Fl H 68.It Fl H
50Hash all hostnames and addresses in the output. 69Hash all hostnames and addresses in the output.
51Hashed names may be used normally by 70Hashed names may be used normally by
@@ -76,30 +95,11 @@ for protocol version 2.
76Multiple values may be specified by separating them with commas. 95Multiple values may be specified by separating them with commas.
77The default is 96The default is
78.Dq rsa1 . 97.Dq rsa1 .
79.It Fl f Ar filename
80Read hosts or
81.Pa addrlist namelist
82pairs from this file, one per line.
83If
84.Pa -
85is supplied instead of a filename,
86.Nm
87will read hosts or
88.Pa addrlist namelist
89pairs from the standard input.
90.It Fl v 98.It Fl v
91Verbose mode. 99Verbose mode.
92Causes 100Causes
93.Nm 101.Nm
94to print debugging messages about its progress. 102to print debugging messages about its progress.
95.It Fl 4
96Forces
97.Nm
98to use IPv4 addresses only.
99.It Fl 6
100Forces
101.Nm
102to use IPv6 addresses only.
103.El 103.El
104.Sh SECURITY 104.Sh SECURITY
105If a ssh_known_hosts file is constructed using 105If a ssh_known_hosts file is constructed using