Make use of .Ic asked by Sheldon. Spelling fix I missed yesterday.

Submitted by:	Sheldon Hearn <sheldonh@uunet.co.za>
This commit is contained in:
Philippe Charnier 2000-05-29 20:21:46 +00:00
parent bcc031b104
commit a6b855e77f
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=61079

View File

@ -97,7 +97,7 @@ to enter a single
.Ar Command
can be one of the following:
.Bl -inset
.It Nm del Ar type spi source destination
.It Ic del Ar type spi source destination
.Pp
Delete a security association between
.Ar source
@ -111,7 +111,7 @@ Example:
.Bd -literal
delete esp 90125 anderson.yes.org rabin.yes.org
.Ed
.It Nm get Ar type spi source destination
.It Ic get Ar type spi source destination
.Pp
Retrieve (and print) a security association between
.Ar source
@ -125,11 +125,11 @@ Example:
.Bd -literal
get ah 5150 eddie.vanhalen.com alex.vanhalen.com
.Ed
.It Nm dump
.It Ic dump
.Pp
Display the entire security association table. WARNING: This prints a lot
of data.
.It Nm load Ar filename
.It Ic load Ar filename
.Pp
Load security association information from a file formatted as documented in
.Xr keys 5 . If
@ -137,7 +137,7 @@ Load security association information from a file formatted as documented in
is specified for the
.Ar filename ,
load keys from the standard input.
.It Nm save Ar filename
.It Ic save Ar filename
.Pp
Save security association information to a file formatted as documented in
.Xr keys 5 . If
@ -146,21 +146,21 @@ is specified for the
.Ar filename ,
place the key file out on the standard output. (This can be used as a sort
of lightweight
.Nm dump
.Ic dump
command.)
NOTE: The
.Nm save
.Ic save
command must create a new file; it will not write into an
existing file. This is to prevent writing into a world-readable file, or a
named pipe or UNIX socket (see
.Xr socket 2
and
.Xr mkfifo 1 ).
.It Nm help Op command
.It Ic help Op command
.Pp
Offer brief help without an argument, or slightly more specific help on a
particular command.
.It Nm flush
.It Ic flush
.Pp
Erase all entries in the kernel security association table.
.El
@ -172,7 +172,7 @@ are only available by using
.Nm
in its interactive mode of operation:
.Bl -inset
.It Nm add Ar type spi source destination transform key
.It Ic add Ar type spi source destination transform key
.Op Ar iv
.Pp
Add a security association of a particular
@ -192,18 +192,18 @@ If a transform requires an initialization vector, the
argument contains it. This command is available only in interactive mode
because
.Nm
makes no attempt to destroy its argument vector after use. A malicous user
makes no attempt to destroy its argument vector after use. A malicious user
of the
.Xr ps 1
command could determine security keys if
.Nm add
.Ic add
were allowed to be used straight from the command line. Example:
.Bd -literal
add esp 2112 temples.syrinx.org priests.syrinx.org des-cbc \\
a652a476a652a476 87ac9876deac9876
.Ed
.It Nm exit
.It Nm quit
.It Ic exit
.It Ic quit
.Pp
Exit interaction with
.Nm Ns .
@ -240,7 +240,7 @@ needs a -n flag like
to avoid name lookups.
.Pp
The
.Nm dump
.Ic dump
and
.Nm save
.Ic save
commands currently display the first 30 or so entries.