xref: /minix3/crypto/external/bsd/heimdal/dist/kdc/string2key.8 (revision 0a6a1f1d05b60e214de2f05a7310ddd1f0e590e7)
1*0a6a1f1dSLionel Sambuc.\"	$NetBSD: string2key.8,v 1.3 2014/04/24 13:45:34 pettai Exp $
2ebfedea0SLionel Sambuc.\"
3ebfedea0SLionel Sambuc.\" Copyright (c) 2000 - 2002 Kungliga Tekniska Högskolan
4ebfedea0SLionel Sambuc.\" (Royal Institute of Technology, Stockholm, Sweden).
5ebfedea0SLionel Sambuc.\" All rights reserved.
6ebfedea0SLionel Sambuc.\"
7ebfedea0SLionel Sambuc.\" Redistribution and use in source and binary forms, with or without
8ebfedea0SLionel Sambuc.\" modification, are permitted provided that the following conditions
9ebfedea0SLionel Sambuc.\" are met:
10ebfedea0SLionel Sambuc.\"
11ebfedea0SLionel Sambuc.\" 1. Redistributions of source code must retain the above copyright
12ebfedea0SLionel Sambuc.\"    notice, this list of conditions and the following disclaimer.
13ebfedea0SLionel Sambuc.\"
14ebfedea0SLionel Sambuc.\" 2. Redistributions in binary form must reproduce the above copyright
15ebfedea0SLionel Sambuc.\"    notice, this list of conditions and the following disclaimer in the
16ebfedea0SLionel Sambuc.\"    documentation and/or other materials provided with the distribution.
17ebfedea0SLionel Sambuc.\"
18ebfedea0SLionel Sambuc.\" 3. Neither the name of the Institute nor the names of its contributors
19ebfedea0SLionel Sambuc.\"    may be used to endorse or promote products derived from this software
20ebfedea0SLionel Sambuc.\"    without specific prior written permission.
21ebfedea0SLionel Sambuc.\"
22ebfedea0SLionel Sambuc.\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
23ebfedea0SLionel Sambuc.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24ebfedea0SLionel Sambuc.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25ebfedea0SLionel Sambuc.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
26ebfedea0SLionel Sambuc.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27ebfedea0SLionel Sambuc.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28ebfedea0SLionel Sambuc.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29ebfedea0SLionel Sambuc.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30ebfedea0SLionel Sambuc.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31ebfedea0SLionel Sambuc.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32ebfedea0SLionel Sambuc.\" SUCH DAMAGE.
33ebfedea0SLionel Sambuc.\"
34ebfedea0SLionel Sambuc.\" Id
35ebfedea0SLionel Sambuc.\"
36ebfedea0SLionel Sambuc.Dd March  4, 2000
37ebfedea0SLionel Sambuc.Dt STRING2KEY 8
38ebfedea0SLionel Sambuc.Os
39ebfedea0SLionel Sambuc.Sh NAME
40ebfedea0SLionel Sambuc.Nm string2key
41ebfedea0SLionel Sambuc.Nd map a password into a key
42ebfedea0SLionel Sambuc.Sh SYNOPSIS
43ebfedea0SLionel Sambuc.Nm
44*0a6a1f1dSLionel Sambuc.Op Fl 5 | Fl Fl version5
45*0a6a1f1dSLionel Sambuc.Op Fl 4 | Fl Fl version4
46*0a6a1f1dSLionel Sambuc.Op Fl a | Fl Fl afs
47ebfedea0SLionel Sambuc.Oo Fl c Ar cell \*(Ba Xo
48*0a6a1f1dSLionel Sambuc.Fl Fl cell= Ns Ar cell
49ebfedea0SLionel Sambuc.Xc
50ebfedea0SLionel Sambuc.Oc
51ebfedea0SLionel Sambuc.Oo Fl w Ar password \*(Ba Xo
52*0a6a1f1dSLionel Sambuc.Fl Fl password= Ns Ar password
53ebfedea0SLionel Sambuc.Xc
54ebfedea0SLionel Sambuc.Oc
55ebfedea0SLionel Sambuc.Oo Fl p Ar principal \*(Ba Xo
56*0a6a1f1dSLionel Sambuc.Fl Fl principal= Ns Ar principal
57ebfedea0SLionel Sambuc.Xc
58ebfedea0SLionel Sambuc.Oc
59ebfedea0SLionel Sambuc.Oo Fl k Ar string \*(Ba Xo
60*0a6a1f1dSLionel Sambuc.Fl Fl keytype= Ns Ar string
61ebfedea0SLionel Sambuc.Xc
62ebfedea0SLionel Sambuc.Oc
63ebfedea0SLionel Sambuc.Ar password
64ebfedea0SLionel Sambuc.Sh DESCRIPTION
65ebfedea0SLionel Sambuc.Nm
66ebfedea0SLionel Sambucperforms the string-to-key function.
67ebfedea0SLionel SambucThis is useful when you want to handle the raw key instead of the password.
68ebfedea0SLionel SambucSupported options:
69ebfedea0SLionel Sambuc.Bl -tag -width Ds
70*0a6a1f1dSLionel Sambuc.It Fl 5 , Fl Fl version5
71ebfedea0SLionel SambucOutput Kerberos v5 string-to-key
72*0a6a1f1dSLionel Sambuc.It Fl 4 , Fl Fl version4
73ebfedea0SLionel SambucOutput Kerberos v4 string-to-key
74*0a6a1f1dSLionel Sambuc.It Fl a , Fl Fl afs
75ebfedea0SLionel SambucOutput AFS string-to-key
76*0a6a1f1dSLionel Sambuc.It Fl c Ar cell , Fl Fl cell= Ns Ar cell
77ebfedea0SLionel SambucAFS cell to use
78*0a6a1f1dSLionel Sambuc.It Fl w Ar password , Fl Fl password= Ns Ar password
79ebfedea0SLionel SambucPassword to use
80*0a6a1f1dSLionel Sambuc.It Fl p Ar principal , Fl Fl principal= Ns Ar principal
81ebfedea0SLionel SambucKerberos v5 principal to use
82*0a6a1f1dSLionel Sambuc.It Fl k Ar string , Fl Fl keytype= Ns Ar string
83ebfedea0SLionel SambucKeytype
84*0a6a1f1dSLionel Sambuc.It Fl Fl version
85ebfedea0SLionel Sambucprint version
86*0a6a1f1dSLionel Sambuc.It Fl Fl help
87ebfedea0SLionel Sambuc.El
88