mirror of
https://code.forgejo.org/actions/setup-node.git
synced 2025-05-22 14:04:44 +00:00
.
This commit is contained in:
parent
fc725ba36b
commit
422b9fdb15
7395 changed files with 1786235 additions and 3476 deletions
81
node_modules/sshpk/man/man1/sshpk-sign.1
generated
vendored
Normal file
81
node_modules/sshpk/man/man1/sshpk-sign.1
generated
vendored
Normal file
|
@ -0,0 +1,81 @@
|
|||
.TH sshpk\-sign 1 "Jan 2016" sshpk "sshpk Commands"
|
||||
.SH NAME
|
||||
.PP
|
||||
sshpk\-sign \- sign data using an SSH key
|
||||
.SH SYNOPSYS
|
||||
.PP
|
||||
\fB\fCsshpk\-sign\fR \-i KEYPATH [OPTION...]
|
||||
.SH DESCRIPTION
|
||||
.PP
|
||||
Takes in arbitrary bytes, and signs them using an SSH private key. The key can
|
||||
be of any type or format supported by the \fB\fCsshpk\fR library, including the
|
||||
standard OpenSSH formats, as well as PEM PKCS#1 and PKCS#8.
|
||||
.PP
|
||||
The signature is printed out in Base64 encoding, unless the \fB\fC\-\-binary\fR or \fB\fC\-b\fR
|
||||
option is given.
|
||||
.SH EXAMPLES
|
||||
.PP
|
||||
Signing with default settings:
|
||||
.PP
|
||||
.RS
|
||||
.nf
|
||||
$ printf 'foo' | sshpk\-sign \-i ~/.ssh/id_ecdsa
|
||||
MEUCIAMdLS/vXrrtWFepwe...
|
||||
.fi
|
||||
.RE
|
||||
.PP
|
||||
Signing in SSH (RFC 4253) format (rather than the default ASN.1):
|
||||
.PP
|
||||
.RS
|
||||
.nf
|
||||
$ printf 'foo' | sshpk\-sign \-i ~/.ssh/id_ecdsa \-t ssh
|
||||
AAAAFGVjZHNhLXNoYTIt...
|
||||
.fi
|
||||
.RE
|
||||
.PP
|
||||
Saving the binary signature to a file:
|
||||
.PP
|
||||
.RS
|
||||
.nf
|
||||
$ printf 'foo' | sshpk\-sign \-i ~/.ssh/id_ecdsa \\
|
||||
\-o signature.bin \-b
|
||||
$ cat signature.bin | base64
|
||||
MEUCIAMdLS/vXrrtWFepwe...
|
||||
.fi
|
||||
.RE
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
\fB\fC\-v, \-\-verbose\fR
|
||||
Print extra information about the key and signature to stderr when signing.
|
||||
.TP
|
||||
\fB\fC\-b, \-\-binary\fR
|
||||
Don't base64\-encode the signature before outputting it.
|
||||
.TP
|
||||
\fB\fC\-i KEY, \-\-identity=KEY\fR
|
||||
Select the key to be used for signing. \fB\fCKEY\fR must be a relative or absolute
|
||||
filesystem path to the key file. Any format supported by the \fB\fCsshpk\fR library
|
||||
is supported, including OpenSSH formats and standard PEM PKCS.
|
||||
.TP
|
||||
\fB\fC\-f PATH, \-\-file=PATH\fR
|
||||
Input file to sign instead of stdin.
|
||||
.TP
|
||||
\fB\fC\-o PATH, \-\-out=PATH\fR
|
||||
Output file to save signature in instead of stdout.
|
||||
.TP
|
||||
\fB\fC\-H HASH, \-\-hash=HASH\fR
|
||||
Set the hash algorithm to be used for signing. This should be one of \fB\fCsha1\fR,
|
||||
\fB\fCsha256\fR or \fB\fCsha512\fR\&. Some key types may place restrictions on which hash
|
||||
algorithms may be used (e.g. ED25519 keys can only use SHA\-512).
|
||||
.TP
|
||||
\fB\fC\-t FORMAT, \-\-format=FORMAT\fR
|
||||
Choose the signature format to use, from \fB\fCasn1\fR, \fB\fCssh\fR or \fB\fCraw\fR (only for
|
||||
ED25519 signatures). The \fB\fCasn1\fR format is the default, as it is the format
|
||||
used with TLS and typically the standard in most non\-SSH libraries (e.g.
|
||||
OpenSSL). The \fB\fCssh\fR format is used in the SSH protocol and by the ssh\-agent.
|
||||
.SH SEE ALSO
|
||||
.PP
|
||||
.BR sshpk-verify (1)
|
||||
.SH BUGS
|
||||
.PP
|
||||
Report bugs at Github
|
||||
\[la]https://github.com/arekinath/node-sshpk/issues\[ra]
|
Loading…
Add table
Add a link
Reference in a new issue