Your browser does not allow this site to store cookies and other data. Some functionality on this site may not work without them. See Privacy Policy for details on how we would use cookies.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
        scp2 >>
        sftp2 >>
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>


The following options are available:

  • -b bits

    Specifies the length of the key in bits (default 2048).

  • -t dsa|rsa

    Selects the type of the key. Valid options are dsa (default) and rsa.

  • -c comment_string

    Specifies the key's comment string.

  • -e file

    Edits the specified key. Makes ssh-keygen2 interactive. You can change the key's passphrase or comment.

  • -p passphrase

    Specifies the passphrase used.

  • -P

    Specifies that the key will be saved with an empty passphrase.

  • -h | -?

    Prints a short summary of ssh-keygen2 commands.

  • -q

    Hides the progress indicator.

  • -1 file

    Converts a key from the SSH1 format to the SSH2 format.

  • -i file

    Loads and displays information on file.

  • -D file

    Derives the public key from the private key file.

  • -B number

    Specifies the number base for displaying key information (default 10).

  • -V

    Prints version string and exits.

  • -r file

    Adds entropy from file to the random pool. If file contains 'relatively random' data (i.e. data unpredictable by a potential attacker), the randomness of the pool is increased. Good randomness is essential for the security of the generated keys.

  • -x file

    Converts a private key from the X.509 format to the SSH2 format.

  • -k file

    Converts a PKCS #12 file to an SSH2-format certificate and private key.

  • -7 file

    Extracts certificates from a PKCS #7 file.

  • -F file

    Dumps the fingerprint of the given public key. The fingerprint is given in the Bubble Babble format, which makes the fingerprint look like a string of "real" words (making it easier to pronounce).

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice