summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog3
-rw-r--r--ssh-keygen.16
2 files changed, 6 insertions, 3 deletions
diff --git a/ChangeLog b/ChangeLog
index 03d7d7a8b..d2474f17a 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -31,6 +31,9 @@
31 - jmc@cvs.openbsd.org 2011/09/05 07:01:44 31 - jmc@cvs.openbsd.org 2011/09/05 07:01:44
32 [scp.1] 32 [scp.1]
33 knock out a useless Ns; 33 knock out a useless Ns;
34 - deraadt@cvs.openbsd.org 2011/09/07 02:18:31
35 [ssh-keygen.1]
36 typo (they vs the) found by Lawrence Teo
34 37
3520110909 3820110909
36 - (dtucker) [entropy.h] Bug #1932: remove old definition of init_rng. From 39 - (dtucker) [entropy.h] Bug #1932: remove old definition of init_rng. From
diff --git a/ssh-keygen.1 b/ssh-keygen.1
index ede37921c..528fcd39d 100644
--- a/ssh-keygen.1
+++ b/ssh-keygen.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: ssh-keygen.1,v 1.106 2011/04/13 04:09:37 djm Exp $ 1.\" $OpenBSD: ssh-keygen.1,v 1.107 2011/09/07 02:18:31 deraadt Exp $
2.\" 2.\"
3.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 3.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -35,7 +35,7 @@
35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 35.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 36.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
37.\" 37.\"
38.Dd $Mdocdate: April 13 2011 $ 38.Dd $Mdocdate: September 7 2011 $
39.Dt SSH-KEYGEN 1 39.Dt SSH-KEYGEN 1
40.Os 40.Os
41.Sh NAME 41.Sh NAME
@@ -214,7 +214,7 @@ Generally, 2048 bits is considered sufficient.
214DSA keys must be exactly 1024 bits as specified by FIPS 186-2. 214DSA keys must be exactly 1024 bits as specified by FIPS 186-2.
215For ECDSA keys, the 215For ECDSA keys, the
216.Fl b 216.Fl b
217flag determines they key length by selecting from one of three elliptic 217flag determines the key length by selecting from one of three elliptic
218curve sizes: 256, 384 or 521 bits. 218curve sizes: 256, 384 or 521 bits.
219Attempting to use bit lengths other than these three values for ECDSA keys 219Attempting to use bit lengths other than these three values for ECDSA keys
220will fail. 220will fail.