diff options
Diffstat (limited to 'contrib/scripts/astgenkey.8')
-rw-r--r-- | contrib/scripts/astgenkey.8 | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/contrib/scripts/astgenkey.8 b/contrib/scripts/astgenkey.8 index b32bf5d91..520c44233 100644 --- a/contrib/scripts/astgenkey.8 +++ b/contrib/scripts/astgenkey.8 @@ -49,31 +49,31 @@ .ds f2\" .ds f3\" .ds f4\" -'\" t -.ta 8n 16n 24n 32n 40n 48n 56n 64n 72n +'\" t +.ta 8n 16n 24n 32n 40n 48n 56n 64n 72n .TH ASTGENKEY 8 "May 14th, 2005" "Asterisk" "Linux Programmer's Manual" .SH NAME .B astgenkey \- generates keys for for Asterisk IAX2 RSA authentication .SH SYNOPSIS -.PP +.PP .B astgenkey [ \-q ] [ \-n ] [ \fIkeyname\fP ] .SH DESCRIPTION -.B astgenkey -This script generates an RSA private and public key pair in PEM format -for use by Asterisk. The private key should be kept a secret, as it can -be used to fake your system's identity. Thus by default (without the -option +.B astgenkey +This script generates an RSA private and public key pair in PEM format +for use by Asterisk. The private key should be kept a secret, as it can +be used to fake your system's identity. Thus by default (without the +option .I \-n -) the script will create a passphrase-encrypted copy of your secret key: -without entering the passphrase you won't be able to use it. +) the script will create a passphrase-encrypted copy of your secret key: +without entering the passphrase you won't be able to use it. -However if you want to use such a key with Asterisk, you'll have to start +However if you want to use such a key with Asterisk, you'll have to start it interactively, because the scripts that start asterisk can't use that encrypted key. -The key is identified by a name. If you don't write the name on the +The key is identified by a name. If you don't write the name on the command-line you'll be prompted for one. The outputs of the script are: .I name\fB.pub @@ -86,7 +86,7 @@ The public key: not secret. Send this to the other side. The private key: secret. .RE -Those files should be copied to +Those files should be copied to .I /var/lib/asterisk/keys (The private key: on your system. The public key: on other systems) @@ -128,16 +128,16 @@ user "asterisk"). .RS .RE -.SH "SEE ALSO" -asterisk(8), genrsa(1), rsa(1), +.SH "SEE ALSO" +asterisk(8), genrsa(1), rsa(1), http://www.voip\-info.org/wiki\-Asterisk+iax+rsa+auth -.SH "AUTHOR" -This manual page was written by Tzafrir Cohen <tzafrir.cohen@xorcom.com> -Permission is granted to copy, distribute and/or modify this document under -the terms of the GNU General Public License, Version 2 any -later version published by the Free Software Foundation. +.SH "AUTHOR" +This manual page was written by Tzafrir Cohen <tzafrir.cohen@xorcom.com> +Permission is granted to copy, distribute and/or modify this document under +the terms of the GNU General Public License, Version 2 any +later version published by the Free Software Foundation. -On Debian systems, the complete text of the GNU General Public -License can be found in /usr/share/common\-licenses/GPL\-2. +On Debian systems, the complete text of the GNU General Public +License can be found in /usr/share/common\-licenses/GPL\-2. |