diff options
Diffstat (limited to 'usr.bin')
-rw-r--r-- | usr.bin/skey/skey.1 | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/usr.bin/skey/skey.1 b/usr.bin/skey/skey.1 index 3b43cd4c428..b71c79ee904 100644 --- a/usr.bin/skey/skey.1 +++ b/usr.bin/skey/skey.1 @@ -1,4 +1,4 @@ -.\" $OpenBSD: skey.1,v 1.7 1996/10/23 21:53:37 millert Exp $ +.\" $OpenBSD: skey.1,v 1.8 1997/01/05 21:30:06 millert Exp $ .\" @(#)skey.1 1.1 10/28/93 .\" .Dd 28 October 1993 @@ -19,7 +19,10 @@ is a procedure for using one time passwords to authenticate access to computer systems. It uses 64 bits of information transformed by the MD4, MD5, or SHA1 algorithms. The user supplies the 64 bits in the form -of 6 English words that are generated by a secure computer. +of 6 English words that are generated by a secure computer. This +implementation of +.Nm s/key +is RFC 1938 compliant. .Pp When .Nm skey @@ -72,6 +75,7 @@ Selects SHA1 (NIST Secure Hash Algorithm Revision 1) as the hash algorithm. % .Sh SEE ALSO .Xr skeyinit 1 , -.Xr skeyinfo 1 +.Xr skeyinfo 1 , +.Em RFC1938 .Sh AUTHORS Phil Karn, Neil M. Haller, John S. Walden, Scott Chasin |