.ll 6i .pl 10.5i .\" @(#)key.1 1.0 (Bellcore) 12/2/91 .\" .lt 6.0i .TH KEY 1 "20 March 1994" .AT 3 .SH NAME key \- Stand\-alone program for computing responses to S/Key challenges. .SH SYNOPSIS .B key [\-n ] .SH DESCRIPTION .I key Takes the optional count of the number of one time access passwords to print along with a (maximum) sequence number and key as command line args, it prompts for the user's secret password, and produces both word and hex format responses. .SH EXAMPLE .sh Usage example: .sp 0 >key \-n 5 99 th91334 .sp 0 Enter password: .sp 0 OMEN US HORN OMIT BACK AHOY .sp 0 .... 4 more passwords. .sp 0 > .LP .SH OPTIONS .LP .B \-n the number of one time access passwords to print. The default is one. .SH DIAGNOSTICS .\" Bug added by Dan McDonald & Ran Atkinson (NRL) .SH BUGS .BR key(1) can lull a user into revealing his/her password when remotely logged in. This is especially a problem with xterms and could be fixed by having the program check the DISPLAY environment variable before doing any key operations. .br Also, the key program can support either MD4 or MD5 depending on a compile-time option. That should really be a command line option with the key program supporting both algorithms. .LP .SH SEE ALSO .BR skey(1), .BR keyinit(1), .BR keysu(1), .BR keyinfo(1) .SH AUTHOR Command by Phil Karn, Neil M. Haller, John S. Walden .SH CONTACT staff@thumper.bellcore.com