[BACK]Return to scp.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/scp.1 between version 1.2 and 1.3

version 1.2, 1999/09/30 21:25:03 version 1.3, 1999/10/03 18:15:39
Line 11 
Line 11 
 .\"  .\"
 .\" $Id$  .\" $Id$
 .\"  .\"
 .TH SCP 1 "November 8, 1995" SSH SSH  .Dd September 25, 1999
   .Dt SCP 1
 .SH NAME  .Os
 scp \- secure copy (remote file copy program)  .Sh NAME
   .Nm scp
 .SH SYNOPSIS  .Nd secure copy (remote file copy program)
 .LP  .Sh SYNOPSIS
 .B scp  .Nm scp
 [\c  .Op Fl pqrvC
 .B \-pqrvC\c  .Op Fl P Ar port
 ]  .Op Fl c Ar cipher
 [\c  .Op Fl i Ar identity_file
 .BI \-P "\ port\c  .Sm off
 ]  .Oo
 [\c  .Op Ar user@
 .BI \-c "\ cipher\c  .Ar host1 No :
 ]  .Oc Ns Ar file1
 [\c  .Sm on
 .BI \-i "\ identity\c  .Op Ar ...
 ]  .Sm off
 .if n .ti +5  .Oo
 [[\c  .Op Ar user@
 .B user@\c  .Ar host2 No :
 ]\c  .Oc Ar file2
 .B host1:\c  .Sm on
 ]\c  .Sh DESCRIPTION
 .B filename1\c  .Nm
 \&.\|.\|.  
 [[\c  
 .B user@\c  
 ]\c  
 .B host2:\c  
 ]\c  
 .B filename2  
   
 .SH DESCRIPTION  
 .LP  
 .B Scp  
 copies files between hosts on a network.  It uses  copies files between hosts on a network.  It uses
 .B ssh  .Xr ssh 1
 for data transfer, and uses the same authentication and provides the  for data transfer, and uses the same authentication and provides the
 same security as  same security as
 .B ssh.  .Xr ssh 1 .
 Unlike  Unlike
 .BR rcp ",  .Xr rcp 1 ,
 .B ssh  .Nm
 will ask for passwords or passphrases if they are needed for  will ask for passwords or passphrases if they are needed for
 authentication.  authentication.
 .LP  .Pp
 Any file name may contain a host and user specification to indicate  Any file name may contain a host and user specification to indicate
 that the file is to be copied to/from that host.  Copies between two  that the file is to be copied to/from that host.  Copies between two
 remote hosts are permitted.  remote hosts are permitted.
   .Pp
 .SH OPTIONS  The options are as follows:
   .Bl -tag -width Ds
 .TP 0.6i  .It Fl c Ar cipher
 .BI \-c "\ cipher  
 Selects the cipher to use for encrypting the data transfer.  This  Selects the cipher to use for encrypting the data transfer.  This
 option is directly passed to  option is directly passed to
 .B ssh.  .Xr ssh 1 .
 .TP  .It Fl i Ar identity_file
 .BI \-i "\ identity_file  
 Selects the file from which the identity (private key) for RSA  Selects the file from which the identity (private key) for RSA
 authentication is read.  This option is directly passed to  authentication is read.  This option is directly passed to
 .B ssh.  .Xr ssh 1 .
 .TP  .It Fl p
 .B \-p  
 Preserves modification times, access times, and modes from the  Preserves modification times, access times, and modes from the
 original file.  original file.
 .TP  .It Fl r
 .B \-r  
 Recursively copy entire directories.  Recursively copy entire directories.
 .TP  .It Fl v
 .B \-v  
 Verbose mode.  Causes  Verbose mode.  Causes
 .B scp  .Nm
 and  and
 .B ssh  .Xr ssh 1
 to print debugging messages about their progress.  This is helpful in  to print debugging messages about their progress.  This is helpful in
 debugging connection, authentication, and configuration problems.  debugging connection, authentication, and configuration problems.
 .TP  .It Fl B
 .B \-B  
 Selects batch mode (prevents asking for passwords or passphrases).  Selects batch mode (prevents asking for passwords or passphrases).
 .TP  .It Fl q
 .B \-q  
 Disables the progress meter.  Disables the progress meter.
 .TP  .It Fl C
 .B \-C  Compression enable.  Passes the
 Compression enable.  Passes the -C flag to  .Fl C
 .B ssh  flag to
   .Xr ssh 1
 to enable compression.  to enable compression.
 .TP  .It Fl p Ar port
 .BI \-P "\ port  
 Specifies the port to connect to on the remote host.  Note that this  Specifies the port to connect to on the remote host.  Note that this
 option is written with a capital P, because \-p is already reserved for  option is written with a capital
 preserving the times and modes of the file in rcp.  .Sq P ,
   because
 .SH AUTHORS  .Fl p
 .LP  is already reserved for preserving the times and modes of the file in
   .Xr rcp 1 .
   .Sh AUTHORS
 Timo Rinne <tri@iki.fi> and Tatu Ylonen <ylo@cs.hut.fi>  Timo Rinne <tri@iki.fi> and Tatu Ylonen <ylo@cs.hut.fi>
   .Sh HISTORY
 .SH DERIVATION  .Nm
 .LP  
 .B Scp  
 is based on the  is based on the
 .B rcp  .Xr rcp 1
 program in BSD source code from the Regents of the University of  program in BSD source code from the Regents of the University of
 California.  California.
   .Sh SEE ALSO
 .SH SEE ALSO  .Xr rcp 1 ,
 .LP  .Xr ssh 1 ,
 .BR ssh (1),  .Xr ssh-add 1 ,
 .BR sshd (8),  .Xr ssh-agent 1 ,
 .BR ssh-keygen (1),  .Xr ssh-keygen 1 ,
 .BR ssh-agent (1),  .Xr sshd 8
 .BR ssh-add (1),  
 .BR rcp (1)  

Legend:
Removed from v.1.2  
changed lines
  Added in v.1.3