HardenedBSD/usr.bin/key/key.1
guido 459ed7e431 1) Added s/key support .
2  Added optional excessive login logging.
3) Added login acces control on a per host/tty base.
4) See skey(1) for skey descriptions and src/usr.bin/login/README
  for the logging and access control features.

-Guido
1994-05-19 18:13:11 +00:00

50 lines
1011 B
Groff

.ll 6i
.pl 10.5i
.\" @(#)key.1 1.0 (Bellcore) 12/2/91
.\"
.lt 6.0i
.TH KEY 1 "2 December 1991"
.AT 3
.SH NAME
key \- Stand\-alone program for computing responses to S/Key challenges.
.SH SYNOPSIS
.B key [\-n <count>] <Sequence> <key>
.SH DESCRIPTION
.I key
Takes the optional count of the number of one time access
passwords to print
along with a (maximum) sequence number and key as command line args,
it prompts for the user's secret password, and produces both word
and hex format responses.
.SH EXAMPLE
.sh
Usage example:
.sp 0
>key \-n 5 99 th91334
.sp 0
Enter password: <your secret password is entered here>
.sp 0
OMEN US HORN OMIT BACK AHOY
.sp 0
.... 4 more passwords.
.sp 0
>
.LP
.SH OPTIONS
.LP
.B \-n <count>
the number of one time access passwords to print.
The default is one.
.SH DIAGNOSTICS
.SH BUGS
.LP
.SH SEE ALSO
.BR skey(1),
.BR keyinit(1),
.BR keysu(1),
.BR keyinfo(1)
.SH AUTHOR
Command by Phil Karn, Neil M. Haller, John S. Walden
.SH CONTACT
staff@thumper.bellcore.com