mirror of
https://github.com/asterisk/asterisk.git
synced 2025-09-05 04:11:08 +00:00
Remove as much trailing whitespace as possible.
Change-Id: I873c1c6d00f447269bd841494459efccdd2c19c0
This commit is contained in:
@@ -49,31 +49,31 @@
|
||||
.ds f2\"
|
||||
.ds f3\"
|
||||
.ds f4\"
|
||||
'\" t
|
||||
.ta 8n 16n 24n 32n 40n 48n 56n 64n 72n
|
||||
'\" t
|
||||
.ta 8n 16n 24n 32n 40n 48n 56n 64n 72n
|
||||
.TH ASTGENKEY 8 "May 14th, 2005" "Asterisk" "Linux Programmer's Manual"
|
||||
.SH NAME
|
||||
.B astgenkey \- generates keys for for Asterisk IAX2 RSA authentication
|
||||
.SH SYNOPSIS
|
||||
.PP
|
||||
.PP
|
||||
.B astgenkey
|
||||
[ \-q ] [ \-n ] [ \fIkeyname\fP ]
|
||||
|
||||
.SH DESCRIPTION
|
||||
.B astgenkey
|
||||
This script generates an RSA private and public key pair in PEM format
|
||||
for use by Asterisk. The private key should be kept a secret, as it can
|
||||
be used to fake your system's identity. Thus by default (without the
|
||||
option
|
||||
.B astgenkey
|
||||
This script generates an RSA private and public key pair in PEM format
|
||||
for use by Asterisk. The private key should be kept a secret, as it can
|
||||
be used to fake your system's identity. Thus by default (without the
|
||||
option
|
||||
.I \-n
|
||||
) the script will create a passphrase-encrypted copy of your secret key:
|
||||
without entering the passphrase you won't be able to use it.
|
||||
) the script will create a passphrase-encrypted copy of your secret key:
|
||||
without entering the passphrase you won't be able to use it.
|
||||
|
||||
However if you want to use such a key with Asterisk, you'll have to start
|
||||
However if you want to use such a key with Asterisk, you'll have to start
|
||||
it interactively, because the scripts that start asterisk can't use that
|
||||
encrypted key.
|
||||
|
||||
The key is identified by a name. If you don't write the name on the
|
||||
The key is identified by a name. If you don't write the name on the
|
||||
command-line you'll be prompted for one. The outputs of the script are:
|
||||
|
||||
.I name\fB.pub
|
||||
@@ -86,7 +86,7 @@ The public key: not secret. Send this to the other side.
|
||||
The private key: secret.
|
||||
.RE
|
||||
|
||||
Those files should be copied to
|
||||
Those files should be copied to
|
||||
.I /var/lib/asterisk/keys
|
||||
|
||||
(The private key: on your system. The public key: on other systems)
|
||||
@@ -128,16 +128,16 @@ user "asterisk").
|
||||
.RS
|
||||
.RE
|
||||
|
||||
.SH "SEE ALSO"
|
||||
asterisk(8), genrsa(1), rsa(1),
|
||||
.SH "SEE ALSO"
|
||||
asterisk(8), genrsa(1), rsa(1),
|
||||
|
||||
http://www.voip\-info.org/wiki\-Asterisk+iax+rsa+auth
|
||||
|
||||
.SH "AUTHOR"
|
||||
This manual page was written by Tzafrir Cohen <tzafrir.cohen@xorcom.com>
|
||||
Permission is granted to copy, distribute and/or modify this document under
|
||||
the terms of the GNU General Public License, Version 2 any
|
||||
later version published by the Free Software Foundation.
|
||||
.SH "AUTHOR"
|
||||
This manual page was written by Tzafrir Cohen <tzafrir.cohen@xorcom.com>
|
||||
Permission is granted to copy, distribute and/or modify this document under
|
||||
the terms of the GNU General Public License, Version 2 any
|
||||
later version published by the Free Software Foundation.
|
||||
|
||||
On Debian systems, the complete text of the GNU General Public
|
||||
License can be found in /usr/share/common\-licenses/GPL\-2.
|
||||
On Debian systems, the complete text of the GNU General Public
|
||||
License can be found in /usr/share/common\-licenses/GPL\-2.
|
||||
|
Reference in New Issue
Block a user