亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? ssh-keygen.0

?? OpenSSH 是 SSH (Secure SHell) 協(xié)議的免費(fèi)開源實(shí)現(xiàn)。它用安全、加密的網(wǎng)絡(luò)連接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。OpenSSH 支持
?? 0
字號(hào):
SSH-KEYGEN(1)              OpenBSD Reference Manual              SSH-KEYGEN(1)NAME     ssh-keygen - authentication key generation, management and conversionSYNOPSIS     ssh-keygen [-q] [-b bits] -t type [-N new_passphrase] [-C comment]                [-f output_keyfile]     ssh-keygen -p [-P old_passphrase] [-N new_passphrase] [-f keyfile]     ssh-keygen -i [-f input_keyfile]     ssh-keygen -e [-f input_keyfile]     ssh-keygen -y [-f input_keyfile]     ssh-keygen -c [-P passphrase] [-C comment] [-f keyfile]     ssh-keygen -l [-f input_keyfile]     ssh-keygen -B [-f input_keyfile]     ssh-keygen -D reader     ssh-keygen -F hostname [-f known_hosts_file]     ssh-keygen -H [-f known_hosts_file]     ssh-keygen -R hostname [-f known_hosts_file]     ssh-keygen -U reader [-f input_keyfile]     ssh-keygen -r hostname [-f input_keyfile] [-g]     ssh-keygen -G output_file [-v] [-b bits] [-M memory] [-S start_point]     ssh-keygen -T output_file -f input_file [-v] [-a num_trials] [-W                generator]DESCRIPTION     ssh-keygen generates, manages and converts authentication keys for     ssh(1).  ssh-keygen can create RSA keys for use by SSH protocol version 1     and RSA or DSA keys for use by SSH protocol version 2.  The type of key     to be generated is specified with the -t option.     ssh-keygen is also used to generate groups for use in Diffie-Hellman     group exchange (DH-GEX).  See the MODULI GENERATION section for details.     Normally each user wishing to use SSH with RSA or DSA authentication runs     this once to create the authentication key in $HOME/.ssh/identity,     $HOME/.ssh/id_dsa or $HOME/.ssh/id_rsa.  Additionally, the system admin-     istrator may use this to generate host keys, as seen in /etc/rc.     Normally this program generates the key and asks for a file in which to     store the private key.  The public key is stored in a file with the same     name but ``.pub'' appended.  The program also asks for a passphrase.  The     passphrase may be empty to indicate no passphrase (host keys must have an     empty passphrase), or it may be a string of arbitrary length.  A     passphrase is similar to a password, except it can be a phrase with a se-     ries of words, punctuation, numbers, whitespace, or any string of charac-     ters you want.  Good passphrases are 10-30 characters long, are not sim-     ple sentences or otherwise easily guessable (English prose has only 1-2     bits of entropy per character, and provides very bad passphrases), and     contain a mix of upper and lowercase letters, numbers, and non-alphanu-     meric characters.  The passphrase can be changed later by using the -p     option.     There is no way to recover a lost passphrase.  If the passphrase is lost     or forgotten, a new key must be generated and copied to the corresponding     public key to other machines.     For RSA1 keys, there is also a comment field in the key file that is only     for convenience to the user to help identify the key.  The comment can     tell what the key is for, or whatever is useful.  The comment is initial-     ized to ``user@host'' when the key is created, but can be changed using     the -c option.     After a key is generated, instructions below detail where the keys should     be placed to be activated.     The options are as follows:     -a trials             Specifies the number of primality tests to perform when screening             DH-GEX candidates using the -T command.     -B      Show the bubblebabble digest of specified private or public key             file.     -b bits             Specifies the number of bits in the key to create.  Minimum is             512 bits.  Generally, 1024 bits is considered sufficient.  The             default is 1024 bits.     -C comment             Provides a new comment.     -c      Requests changing the comment in the private and public key             files.  This operation is only supported for RSA1 keys.  The pro-             gram will prompt for the file containing the private keys, for             the passphrase if the key has one, and for the new comment.     -D reader             Download the RSA public key stored in the smartcard in reader.     -e      This option will read a private or public OpenSSH key file and             print the key in a `SECSH Public Key File Format' to stdout.             This option allows exporting keys for use by several commercial             SSH implementations.     -F hostname             Search for the specified hostname in a known_hosts file, listing             any occurrences found.  This option is useful to find hashed host             names or addresses and may also be used in conjunction with the             -H option to print found keys in a hashed format.     -f filename             Specifies the filename of the key file.     -G output_file             Generate candidate primes for DH-GEX.  These primes must be             screened for safety (using the -T option) before use.     -g      Use generic DNS format when printing fingerprint resource records             using the -r command.     -H      Hash a known_hosts file, printing the result to standard output.             This replaces all hostnames and addresses with hashed representa-             tions.  These hashes may be used normally by ssh and sshd, but             they do not reveal identifying information should the file's con-             tents be disclosed.  This option will not modify existing hashed             hostnames and is therefore safe to use on files that mix hashed             and non-hashed names.     -i      This option will read an unencrypted private (or public) key file             in SSH2-compatible format and print an OpenSSH compatible private             (or public) key to stdout.  ssh-keygen also reads the `SECSH             Public Key File Format'.  This option allows importing keys from             several commercial SSH implementations.     -l      Show fingerprint of specified public key file.  Private RSA1 keys             are also supported.  For RSA and DSA keys ssh-keygen tries to             find the matching public key file and prints its fingerprint.     -M memory             Specify the amount of memory to use (in megabytes) when generat-             ing candidate moduli for DH-GEX.     -N new_passphrase             Provides the new passphrase.     -P passphrase             Provides the (old) passphrase.     -p      Requests changing the passphrase of a private key file instead of             creating a new private key.  The program will prompt for the file             containing the private key, for the old passphrase, and twice for             the new passphrase.     -q      Silence ssh-keygen.  Used by /etc/rc when creating a new key.     -R hostname             Removes all keys belonging to hostname from a known_hosts file.             This option is useful to delete hashed hosts (see the -H option             above).     -r hostname             Print the SSHFP fingerprint resource record named hostname for             the specified public key file.     -S start             Specify start point (in hex) when generating candidate moduli for             DH-GEX.     -T output_file             Test DH group exchange candidate primes (generated using the -G             option) for safety.     -t type             Specifies the type of key to create.  The possible values are             ``rsa1'' for protocol version 1 and ``rsa'' or ``dsa'' for proto-             col version 2.     -U reader             Upload an existing RSA private key into the smartcard in reader.     -v      Verbose mode.  Causes ssh-keygen to print debugging messages             about its progress.  This is helpful for debugging moduli genera-             tion.  Multiple -v options increase the verbosity.  The maximum             is 3.     -W generator             Specify desired generator when testing candidate moduli for DH-             GEX.     -y      This option will read a private OpenSSH format file and print an             OpenSSH public key to stdout.MODULI GENERATION     ssh-keygen may be used to generate groups for the Diffie-Hellman Group     Exchange (DH-GEX) protocol.  Generating these groups is a two-step pro-     cess: first, candidate primes are generated using a fast, but memory in-     tensive process.  These candidate primes are then tested for suitability     (a CPU-intensive process).     Generation of primes is performed using the -G option.  The desired     length of the primes may be specified by the -b option.  For example:           # ssh-keygen -G moduli-2048.candidates -b 2048     By default, the search for primes begins at a random point in the desired     length range.  This may be overridden using the -S option, which speci-     fies a different start point (in hex).     Once a set of candidates have been generated, they must be tested for     suitability.  This may be performed using the -T option.  In this mode     ssh-keygen will read candidates from standard input (or a file specified     using the -f option).  For example:           # ssh-keygen -T moduli-2048 -f moduli-2048.candidates     By default, each candidate will be subjected to 100 primality tests.     This may be overridden using the -a option.  The DH generator value will     be chosen automatically for the prime under consideration.  If a specific     generator is desired, it may be requested using the -W option.  Valid     generator values are 2, 3, and 5.     Screened DH groups may be installed in /etc/moduli.  It is important that     this file contains moduli of a range of bit lengths and that both ends of     a connection share common moduli.FILES     $HOME/.ssh/identity             Contains the protocol version 1 RSA authentication identity of             the user.  This file should not be readable by anyone but the us-             er.  It is possible to specify a passphrase when generating the             key; that passphrase will be used to encrypt the private part of             this file using 3DES.  This file is not automatically accessed by             ssh-keygen but it is offered as the default file for the private             key.  ssh(1) will read this file when a login attempt is made.     $HOME/.ssh/identity.pub             Contains the protocol version 1 RSA public key for authentica-             tion.  The contents of this file should be added to             $HOME/.ssh/authorized_keys on all machines where the user wishes             to log in using RSA authentication.  There is no need to keep the             contents of this file secret.     $HOME/.ssh/id_dsa             Contains the protocol version 2 DSA authentication identity of             the user.  This file should not be readable by anyone but the us-             er.  It is possible to specify a passphrase when generating the             key; that passphrase will be used to encrypt the private part of             this file using 3DES.  This file is not automatically accessed by             ssh-keygen but it is offered as the default file for the private             key.  ssh(1) will read this file when a login attempt is made.     $HOME/.ssh/id_dsa.pub             Contains the protocol version 2 DSA public key for authentica-             tion.  The contents of this file should be added to             $HOME/.ssh/authorized_keys on all machines where the user wishes             to log in using public key authentication.  There is no need to             keep the contents of this file secret.     $HOME/.ssh/id_rsa             Contains the protocol version 2 RSA authentication identity of             the user.  This file should not be readable by anyone but the us-             er.  It is possible to specify a passphrase when generating the             key; that passphrase will be used to encrypt the private part of             this file using 3DES.  This file is not automatically accessed by             ssh-keygen but it is offered as the default file for the private             key.  ssh(1) will read this file when a login attempt is made.     $HOME/.ssh/id_rsa.pub             Contains the protocol version 2 RSA public key for authentica-             tion.  The contents of this file should be added to             $HOME/.ssh/authorized_keys on all machines where the user wishes             to log in using public key authentication.  There is no need to             keep the contents of this file secret.     /etc/moduli             Contains Diffie-Hellman groups used for DH-GEX.  The file format             is described in moduli(5).SEE ALSO     ssh(1), ssh-add(1), ssh-agent(1), moduli(5), sshd(8)     J. Galbraith and R. Thayer, SECSH Public Key File Format, draft-ietf-     secsh-publickeyfile-01.txt, March 2001, work in progress material.AUTHORS     OpenSSH is a derivative of the original and free ssh 1.2.12 release by     Tatu Ylonen.  Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo     de Raadt and Dug Song removed many bugs, re-added newer features and     created OpenSSH.  Markus Friedl contributed the support for SSH protocol     versions 1.5 and 2.0.OpenBSD 3.6                   September 25, 1999                             5

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩另类国产亚洲欧美一级| 婷婷久久综合九色综合绿巨人 | 国产亚洲成年网址在线观看| bt欧美亚洲午夜电影天堂| 午夜久久久久久久久| 亚洲国产精品t66y| 日韩欧美在线观看一区二区三区| 色综合中文字幕国产| 日本亚洲一区二区| 亚洲精品videosex极品| 久久久久99精品一区| 69堂亚洲精品首页| 色妞www精品视频| 国产黄色精品视频| 久久超级碰视频| 亚洲午夜精品17c| 亚洲人吸女人奶水| 亚洲欧洲av在线| 国产亚洲美州欧州综合国| 91精品国产综合久久小美女| 日本道色综合久久| 99这里只有精品| 不卡视频免费播放| 国产福利一区二区三区视频| 久久er精品视频| 麻豆91在线观看| 天天综合色天天综合色h| 亚洲综合视频在线| 亚洲欧美另类久久久精品| 国产欧美日韩激情| 欧美国产综合色视频| 亚洲精品一区二区三区香蕉| 欧美xxx久久| 日韩精品一区二| 日韩三级视频中文字幕| 91精品在线观看入口| 91精品国产高清一区二区三区蜜臀| 欧美亚洲一区二区在线观看| 日本精品视频一区二区| 99国产精品一区| 不卡av电影在线播放| jlzzjlzz国产精品久久| 99久久国产综合精品女不卡| 99这里只有久久精品视频| 成人v精品蜜桃久久一区| 成人美女在线视频| 99视频一区二区| 91福利在线导航| 欧美性一级生活| 欧美美女黄视频| 日韩精品一区二区三区在线播放| 日韩欧美国产系列| 久久综合色之久久综合| 国产欧美一区视频| 亚洲欧美中日韩| 亚洲精品国产无套在线观| 亚洲综合色区另类av| 午夜精品久久久久| 久久精品免费看| 高清不卡一二三区| 91在线porny国产在线看| 欧美色综合网站| 91精品国产麻豆国产自产在线| 26uuu久久综合| 久久久精品综合| 亚洲天堂成人在线观看| 亚洲成人综合网站| 看电影不卡的网站| 99r国产精品| 欧美精品在欧美一区二区少妇| 日韩视频免费直播| 国产精品福利一区二区| 亚洲国产精品久久久男人的天堂| 奇米精品一区二区三区在线观看一 | 亚洲人成网站在线| 国产精品欧美一级免费| 亚洲丰满少妇videoshd| 久久精品国产亚洲高清剧情介绍| 丁香天五香天堂综合| 91麻豆视频网站| 欧美精品自拍偷拍| 国产欧美一区二区三区网站| 一区二区三区欧美在线观看| 免费高清不卡av| 成人黄色小视频在线观看| 欧美亚洲国产一区二区三区| 久久久一区二区三区| 亚洲一区二区三区在线| 激情另类小说区图片区视频区| www.欧美色图| 3atv在线一区二区三区| 中文字幕免费不卡| 午夜欧美2019年伦理| 不卡欧美aaaaa| 日韩女优毛片在线| 亚洲欧美日本在线| 精品一区二区三区欧美| 在线视频观看一区| 久久只精品国产| 亚洲成av人片在线观看无码| 国产精品88888| 91精品欧美一区二区三区综合在| 国产精品黄色在线观看| 精品亚洲aⅴ乱码一区二区三区| 91色|porny| 久久久高清一区二区三区| 亚洲成人777| 91视频一区二区| 久久久久88色偷偷免费| 免费在线观看成人| 欧美三级中文字幕| 中文字幕在线不卡一区二区三区| 久久www免费人成看片高清| 在线观看三级视频欧美| 亚洲欧洲精品一区二区三区不卡| 老司机免费视频一区二区三区| 欧美日韩国产欧美日美国产精品| 亚洲欧洲国产日本综合| 国产成a人亚洲| www国产精品av| 久久99精品国产.久久久久久| 欧美日韩另类一区| 亚洲尤物在线视频观看| 色综合久久中文字幕综合网| 亚洲国产成人私人影院tom| 国产一区在线不卡| 久久你懂得1024| 国产在线看一区| 精品国产青草久久久久福利| 日韩在线一二三区| 在线成人免费视频| 日韩精品一级中文字幕精品视频免费观看 | 亚洲一区二区免费视频| 99久久国产综合精品麻豆| 国产精品理伦片| 成人高清在线视频| 国产精品视频一区二区三区不卡| 青青草国产精品97视觉盛宴| 欧美高清视频在线高清观看mv色露露十八 | 美女视频黄免费的久久| 欧美精品一级二级| 日韩av不卡在线观看| 欧美日本高清视频在线观看| 午夜国产不卡在线观看视频| 欧美日韩中字一区| 亚洲国产sm捆绑调教视频| 欧美三级中文字| 日韩**一区毛片| 精品国产亚洲在线| 国产69精品久久久久毛片| 一区在线中文字幕| 91福利视频网站| 日韩vs国产vs欧美| 久久综合九色综合欧美就去吻| 国产精品一卡二卡| 中文字幕中文字幕一区二区| 色狠狠桃花综合| 日韩成人免费看| 国产亚洲一二三区| 91福利区一区二区三区| 视频一区二区中文字幕| 欧美v日韩v国产v| 成人黄页在线观看| 亚洲一区二区视频在线| 日韩美女视频一区二区在线观看| 国产精品一区二区无线| 亚洲欧美色图小说| 717成人午夜免费福利电影| 国产精品一区一区三区| 伊人婷婷欧美激情| 精品国偷自产国产一区| 99久久er热在这里只有精品15 | 欧美日韩mp4| 国产福利一区二区| 一区二区免费在线| 精品三级av在线| 99久久久精品免费观看国产蜜| 亚洲电影在线免费观看| 久久久精品国产免费观看同学| 日本福利一区二区| 精品系列免费在线观看| 亚洲精品伦理在线| 欧美电影免费观看高清完整版在| 国产盗摄一区二区三区| 亚洲第一在线综合网站| 国产午夜亚洲精品午夜鲁丝片| 欧美亚洲国产怡红院影院| 国产黄色91视频| 日韩激情一区二区| 中文字幕一区二区在线观看| 5858s免费视频成人| 97精品视频在线观看自产线路二| 美女在线观看视频一区二区| 国产精品久久午夜夜伦鲁鲁| 91麻豆精品国产91| 91国产免费看| 成人99免费视频| 国产一区二区主播在线| 天天综合天天综合色| 一区二区三区四区在线播放|