Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
        scp2 >>
        sftp2 >>
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>


The following options are available:

  • -b bits

    Specifies the length of the key in bits (default 2048).

  • -t dsa|rsa

    Selects the type of the key. Valid options are dsa (default) and rsa.

  • -c comment_string

    Specifies the key's comment string.

  • -e file

    Edits the specified key. Makes ssh-keygen2 interactive. You can change the key's passphrase or comment.

  • -p passphrase

    Specifies the passphrase used.

  • -P

    Specifies that the key will be saved with an empty passphrase.

  • -h | -?

    Prints a short summary of ssh-keygen2 commands.

  • -q

    Hides the progress indicator.

  • -1 file

    Converts a key from the SSH1 format to the SSH2 format.

  • -i file

    Loads and displays information on file.

  • -D file

    Derives the public key from the private key file.

  • -B number

    Specifies the number base for displaying key information (default 10).

  • -V

    Prints version string and exits.

  • -r file

    Adds entropy from file to the random pool. If file contains 'relatively random' data (i.e. data unpredictable by a potential attacker), the randomness of the pool is increased. Good randomness is essential for the security of the generated keys.

  • -x file

    Converts a private key from the X.509 format to the SSH2 format.

  • -k file

    Converts a PKCS #12 file to an SSH2-format certificate and private key.

  • -7 file

    Extracts certificates from a PKCS #7 file.

  • -F file

    Dumps the fingerprint of the given public key. The fingerprint is given in the Bubble Babble format, which makes the fingerprint look like a string of "real" words (making it easier to pronounce).

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now