From 87e8e7fb24b8e53be6de3fcce36e67c9f9d20cd8 Mon Sep 17 00:00:00 2001 From: Klas Lindfors Date: Thu, 9 Jan 2014 10:07:14 +0100 Subject: [PATCH] update man page for ykpersonalize --- ykpersonalize.1 | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/ykpersonalize.1 b/ykpersonalize.1 index fc448a6..3896ffe 100644 --- a/ykpersonalize.1 +++ b/ykpersonalize.1 @@ -74,8 +74,9 @@ read configuration from file. format to be used with \fB-s\fR and \fB-i\fR. Valid options are \fBycfg\fR and \fBlegacy\fR. .TP -\fB\-a\fIxxx\fR -the secret key, 32 char (40 for OATH-HOTP and HMAC challenge-response) hex value (not modhex). +\fB\-a\fR[\fIxxx\fR] +the AES secret key as a 32 (or 40 for OATH-HOTP/HMAC CHAL-RESP) char hex value (not modhex) (none to prompt for key on stdin) +If -a is not used a random key will be generated. .TP \fB\-c\fIxxx\fR A 12 char hex value (not modhex) to use as access code for @@ -86,10 +87,6 @@ NOTE: this does NOT SET the access code, that's done with \fB-oaccess\fI=\fR. change configuration option. Possible option arguments are .RS .TP -\fBsalt\fR=\fIssssssss\fR -Salt to be used when deriving key from a password. -If none is given, a unique random one will be generated. -.TP \fBfixed\fR=\fIfffffffffff\fR The modhex \fIpublic identity\fR of the YubiKey, 0-32 characters long (encoding up to 16 bytes). -- 2.39.5