summaryrefslogtreecommitdiff
path: root/contrib/scripts/astgenkey.8
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/scripts/astgenkey.8')
-rw-r--r--contrib/scripts/astgenkey.844
1 files changed, 22 insertions, 22 deletions
diff --git a/contrib/scripts/astgenkey.8 b/contrib/scripts/astgenkey.8
index b32bf5d91..520c44233 100644
--- a/contrib/scripts/astgenkey.8
+++ b/contrib/scripts/astgenkey.8
@@ -49,31 +49,31 @@
.ds f2\"
.ds f3\"
.ds f4\"
-'\" t
-.ta 8n 16n 24n 32n 40n 48n 56n 64n 72n
+'\" t
+.ta 8n 16n 24n 32n 40n 48n 56n 64n 72n
.TH ASTGENKEY 8 "May 14th, 2005" "Asterisk" "Linux Programmer's Manual"
.SH NAME
.B astgenkey \- generates keys for for Asterisk IAX2 RSA authentication
.SH SYNOPSIS
-.PP
+.PP
.B astgenkey
[ \-q ] [ \-n ] [ \fIkeyname\fP ]
.SH DESCRIPTION
-.B astgenkey
-This script generates an RSA private and public key pair in PEM format
-for use by Asterisk. The private key should be kept a secret, as it can
-be used to fake your system's identity. Thus by default (without the
-option
+.B astgenkey
+This script generates an RSA private and public key pair in PEM format
+for use by Asterisk. The private key should be kept a secret, as it can
+be used to fake your system's identity. Thus by default (without the
+option
.I \-n
-) the script will create a passphrase-encrypted copy of your secret key:
-without entering the passphrase you won't be able to use it.
+) the script will create a passphrase-encrypted copy of your secret key:
+without entering the passphrase you won't be able to use it.
-However if you want to use such a key with Asterisk, you'll have to start
+However if you want to use such a key with Asterisk, you'll have to start
it interactively, because the scripts that start asterisk can't use that
encrypted key.
-The key is identified by a name. If you don't write the name on the
+The key is identified by a name. If you don't write the name on the
command-line you'll be prompted for one. The outputs of the script are:
.I name\fB.pub
@@ -86,7 +86,7 @@ The public key: not secret. Send this to the other side.
The private key: secret.
.RE
-Those files should be copied to
+Those files should be copied to
.I /var/lib/asterisk/keys
(The private key: on your system. The public key: on other systems)
@@ -128,16 +128,16 @@ user "asterisk").
.RS
.RE
-.SH "SEE ALSO"
-asterisk(8), genrsa(1), rsa(1),
+.SH "SEE ALSO"
+asterisk(8), genrsa(1), rsa(1),
http://www.voip\-info.org/wiki\-Asterisk+iax+rsa+auth
-.SH "AUTHOR"
-This manual page was written by Tzafrir Cohen <tzafrir.cohen@xorcom.com>
-Permission is granted to copy, distribute and/or modify this document under
-the terms of the GNU General Public License, Version 2 any
-later version published by the Free Software Foundation.
+.SH "AUTHOR"
+This manual page was written by Tzafrir Cohen <tzafrir.cohen@xorcom.com>
+Permission is granted to copy, distribute and/or modify this document under
+the terms of the GNU General Public License, Version 2 any
+later version published by the Free Software Foundation.
-On Debian systems, the complete text of the GNU General Public
-License can be found in /usr/share/common\-licenses/GPL\-2.
+On Debian systems, the complete text of the GNU General Public
+License can be found in /usr/share/common\-licenses/GPL\-2.