summaryrefslogtreecommitdiffstats
path: root/usr.bin/keyinfo/keyinfo.1
blob: 9ddea83432e5ac7f62e7e77a7d5220d202754643 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
.ll 6i
.pl 10.5i
.\"	from: @(#)keyinfo.1	1.1 (Bellcore) 7/20/93
.\"	$Id$
.\"
.lt 6.0i
.TH KEYINFO 1 "26 April 1996"
.AT 3
.SH NAME
keyinfo \-  display current S/Key sequence number and seed
.SH SYNOPSIS
.B keyinfo [username]
.SH DESCRIPTION
.I keyinfo
takes an optional user name and displays the user\'s current sequence
number and seed found in the S/Key database /etc/skeykeys.
.sp 1
The command can be useful when generating a list of passwords for use
on a field trip, by combining with the command
.I key
in the form:
.sp
    > key \-n  <number of passwords> `keyinfo`|lpr
.SH EXAMPLE
.sh
Usage example:
.sp 0
    > keyinfo
.sp 0
    0098 ws91340
.LP
.SH ARGUMENTS
.TP
.B username
The S/key user to display the information for.  The default is 
to display S/Key information on the user who invokes the command.
.SH DIAGNOSTICS
.I keyinfo
exits with status 0 if a key for the requested user has been found,
else with status 1.
.SH SEE ALSO
.BR keyinit(1),
.BR key(1)
.SH AUTHOR
Original command by Phil Karn, Neil M. Haller, John S. Walden.
Rewritten in Perl by
.ie t J\(:org \%Wunsch
.el Joerg Wunsch
so it can be made setuid, and the S/Key keys file can be read-protected
from the users.
OpenPOWER on IntegriCloud