version 1.2, 1998/09/27 16:57:53 |
version 1.3, 2000/03/11 21:40:02 |
|
|
.Op Fl v |
.Op Fl v |
.Op Ar user |
.Op Ar user |
.Sh DESCRIPTION |
.Sh DESCRIPTION |
.Nm skeyinfo |
.Nm |
prints out the next S/Key challenge for the specified user or for the |
prints out the next S/Key challenge for the specified user or for the |
current user if no user is specified. If the |
current user if no user is specified. |
.Fl v |
.Pp |
flag is given, the hash algorithm is printed as well. |
The options are as follows: |
.Sh EXAMPLE |
.Bl -tag -width Ds |
|
.It Fl v |
|
Print the hash algorithm as well. |
|
.El |
|
.Sh EXAMPLES |
% skey -n <number of passwords to print> `skeyinfo` | lpr |
% skey -n <number of passwords to print> `skeyinfo` | lpr |
.sp |
.Pp |
This would print out a list of S/Key passwords for use over |
This would print out a list of S/Key passwords for use over |
an untrusted network (perhaps for use at a conference). |
an untrusted network (perhaps for use at a conference). |
.Sh SEE ALSO |
.Sh SEE ALSO |