summaryrefslogtreecommitdiff
path: root/usr.bin/skey
diff options
context:
space:
mode:
Diffstat (limited to 'usr.bin/skey')
-rw-r--r--usr.bin/skey/Makefile9
-rw-r--r--usr.bin/skey/skey.159
2 files changed, 36 insertions, 32 deletions
diff --git a/usr.bin/skey/Makefile b/usr.bin/skey/Makefile
index eec4851173c..42aea2907e7 100644
--- a/usr.bin/skey/Makefile
+++ b/usr.bin/skey/Makefile
@@ -1,10 +1,13 @@
-# $OpenBSD: Makefile,v 1.5 1996/09/29 21:28:37 millert Exp $
+# $OpenBSD: Makefile,v 1.6 1996/09/29 23:04:58 millert Exp $
PROG= skey
MAN= skey.1 skeyinfo.1 skeyaudit.1 skeyprune.8
-LINKS= /usr/bin/skey /usr/bin/otp-md5 \
- /usr/bin/skey /usr/bin/otp-md4 \
+LINKS= /usr/bin/skey /usr/bin/otp-md4 \
+ /usr/bin/skey /usr/bin/otp-md5 \
/usr/bin/skey /usr/bin/otp-sha1
+MLINKS= skey.1 otp-md4.1 \
+ skey.1 otp-md5.1 \
+ skey.1 otp-sha1.1
DPADD= ${LIBSKEY}
LDADD= -lskey
diff --git a/usr.bin/skey/skey.1 b/usr.bin/skey/skey.1
index ca71e8db4e1..11cfcfeda10 100644
--- a/usr.bin/skey/skey.1
+++ b/usr.bin/skey/skey.1
@@ -1,12 +1,19 @@
-.\" $OpenBSD: skey.1,v 1.3 1996/09/27 15:41:36 millert Exp $
+.\" $OpenBSD: skey.1,v 1.4 1996/09/29 23:04:57 millert Exp $
.\" @(#)skey.1 1.1 10/28/93
.\"
.Dd 28 October 1993
.Dt SKEY 1
.Os NetBSD 4
.Sh NAME
-.Nm S/key
-.Nd a one time password system
+.Nm skey, otp-md4, otp-md5, otp-sha1
+.Nd Respond to a OTP challenge.
+.Sh SYNOPSIS
+.Nm skey
+.Op Fl x
+.Op Fl md4 | Fl md5 | Fl sha1
+.Op Fl b Ar count
+.Op Fl p Ar passwd
+<sequence#>[/] key
.Sh DESCRIPTION
.Nm S/key
is a procedure for using one time passwords to authenticate access to
@@ -19,7 +26,7 @@ Example use of the S/key program
.sp 0
% skey 99 th91334
.sp 0
- Enter password: <your secret password is entered here>
+ Enter secret password: <your secret password is entered here>
.sp 0
OMEN US HORN OMIT BACK AHOY
.sp 0
@@ -27,12 +34,6 @@ Example use of the S/key program
.Pp
The options are as follows:
.Bl -tag -width Ds
-.It Fl x
-causes output to be in hexidecimal instead of ASCII.
-.It Fl 4
-Selects MD4 as the hash algorithm.
-.It Fl 5
-Selects MD5 as the hash algorithm.
.It Fl n Ar count
Prints out
.Ar count
@@ -42,28 +43,28 @@ Uses
.Ar password
as the secret password. Use of this option is discouraged as
your secret password could be visible in a process listing.
+.It Fl x
+causes output to be in hexidecimal instead of ASCII.
+.It Fl md4
+Selects MD4 as the hash algorithm.
+.It Fl md5
+Selects MD5 as the hash algorithm.
+.It Fl sha1
+Selects SHA (NIST Secure Hash Algorithm Revision 1) as the hash algorithm.
.El
.Pp
-The programs that are part of the S/Key system are:
-.Bl -tag -width skeyinit...
-.It Xr skeyinit 1
-used to setup your S/Key.
-.It Xr skey 1
-used to get the one time password each time.
-.It Xr skeyinfo 1
-used to extract information from the S/Key database.
-It tells you what your next challenge will be.
-.El
+When
+.Nm skey
+is invoked as
+.Nm otp-method ,
+.Nm skey
+will use
+.Ar method
+as the hash function where
+.Ar method
+is currently one of md4, md5, or sha1.
.Pp
-When you run
-.Xr skeyinit 1
-you inform the system of your
-secret password. Running
-.Xr skey 1
-then generates the
-one-time passwords, and also requires your secret
-password. If however, you misspell your password
-while running
+If you misspell your password while running
.Xr skey 1 ,
you will get a list of passwords
that will not work, and no indication about the problem.