summaryrefslogtreecommitdiff
path: root/usr.bin/skey/skey.1
diff options
context:
space:
mode:
Diffstat (limited to 'usr.bin/skey/skey.1')
-rw-r--r--usr.bin/skey/skey.171
1 files changed, 34 insertions, 37 deletions
diff --git a/usr.bin/skey/skey.1 b/usr.bin/skey/skey.1
index 11cfcfeda10..3675c774f98 100644
--- a/usr.bin/skey/skey.1
+++ b/usr.bin/skey/skey.1
@@ -1,4 +1,4 @@
-.\" $OpenBSD: skey.1,v 1.4 1996/09/29 23:04:57 millert Exp $
+.\" $OpenBSD: skey.1,v 1.5 1996/09/30 18:49:52 millert Exp $
.\" @(#)skey.1 1.1 10/28/93
.\"
.Dd 28 October 1993
@@ -18,40 +18,8 @@
.Nm S/key
is a procedure for using one time passwords to authenticate access to
computer systems. It uses 64 bits of information transformed by the
-MD4 and MD5 algorithms. The user supplies the 64 bits in the form of 6
-English words that are generated by a secure computer.
-Example use of the S/key program
-.Xr skey 1 :
-.sp
-.sp 0
- % skey 99 th91334
-.sp 0
- Enter secret password: <your secret password is entered here>
-.sp 0
- OMEN US HORN OMIT BACK AHOY
-.sp 0
- %
-.Pp
-The options are as follows:
-.Bl -tag -width Ds
-.It Fl n Ar count
-Prints out
-.Ar count
-one time passwords. The default is to print one.
-.It Fl p Ar password
-Uses
-.Ar password
-as the secret password. Use of this option is discouraged as
-your secret password could be visible in a process listing.
-.It Fl x
-causes output to be in hexidecimal instead of ASCII.
-.It Fl md4
-Selects MD4 as the hash algorithm.
-.It Fl md5
-Selects MD5 as the hash algorithm.
-.It Fl sha1
-Selects SHA (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
-.El
+MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form
+of 6 English words that are generated by a secure computer.
.Pp
When
.Nm skey
@@ -65,14 +33,43 @@ as the hash function where
is currently one of md4, md5, or sha1.
.Pp
If you misspell your password while running
-.Xr skey 1 ,
+.Nm skey ,
you will get a list of passwords
that will not work, and no indication about the problem.
.Pp
Password sequence numbers count backward from 99.
You can enter the passwords using small letters, even though
-.Xr skey 1
+.Nm skey
prints them capitalized.
+.Sh OPTIONS
+.Bl -tag -width Ds
+.It Fl n Ar count
+Prints out
+.Ar count
+one time passwords. The default is to print one.
+.It Fl p Ar password
+Uses
+.Ar password
+as the secret password. Use of this option is discouraged as
+your secret password could be visible in a process listing.
+.It Fl x
+causes output to be in hexidecimal instead of ASCII.
+.It Fl md4
+Selects MD4 as the hash algorithm.
+.It Fl md5
+Selects MD5 as the hash algorithm.
+.It Fl sha1
+Selects SHA1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
+.El
+.Sh EXAMPLE
+.sp 0
+ % skey 99 th91334
+.sp 0
+ Enter secret password: <your secret password is entered here>
+.sp 0
+ OMEN US HORN OMIT BACK AHOY
+.sp 0
+ %
.Sh SEE ALSO
.Xr skeyinit 1 ,
.Xr skeyinfo 1