Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
        scp2 >>
        sftp2 >>
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>


The following options are available:

  • -b bits

    Specifies the length of the key in bits (default 2048).

  • -t dsa|rsa

    Selects the type of the key. Valid options are dsa (default) and rsa.

  • -c comment_string

    Specifies the key's comment string.

  • -e file

    Edits the specified key. Makes ssh-keygen2 interactive. You can change the key's passphrase or comment.

  • -p passphrase

    Specifies the passphrase used.

  • -P

    Specifies that the key will be saved with an empty passphrase.

  • -h | -?

    Prints a short summary of ssh-keygen2 commands.

  • -q

    Hides the progress indicator.

  • -1 file

    Converts a key from the SSH1 format to the SSH2 format.

  • -i file

    Loads and displays information on file.

  • -D file

    Derives the public key from the private key file.

  • -B number

    Specifies the number base for displaying key information (default 10).

  • -V

    Prints version string and exits.

  • -r file

    Adds entropy from file to the random pool. If file contains 'relatively random' data (i.e. data unpredictable by a potential attacker), the randomness of the pool is increased. Good randomness is essential for the security of the generated keys.

  • -x file

    Converts a private key from the X.509 format to the SSH2 format.

  • -k file

    Converts a PKCS #12 file to an SSH2-format certificate and private key.

  • -7 file

    Extracts certificates from a PKCS #7 file.

  • -F file

    Dumps the fingerprint of the given public key. The fingerprint is given in the Bubble Babble format, which makes the fingerprint look like a string of "real" words (making it easier to pronounce).

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more