1.\" $Id: string2key.8,v 1.2 2000/03/04 14:02:55 assar Exp $ 2.\" 3.Dd March 4, 2000 4.Dt STRING2KEY 8 5.Os HEIMDAL 6.Sh NAME 7.Nm string2key
| 1.\" $Id: string2key.8,v 1.2 2000/03/04 14:02:55 assar Exp $ 2.\" 3.Dd March 4, 2000 4.Dt STRING2KEY 8 5.Os HEIMDAL 6.Sh NAME 7.Nm string2key
|
10.Sh SYNOPSIS 11.Nm 12.Op Fl 5 | Fl -version5 13.Op Fl 4 | Fl -version4 14.Op Fl a | Fl -afs 15.Oo Fl c Ar cell \*(Ba Xo 16.Fl -cell= Ns Ar cell Oc 17.Xc 18.Oo Fl w Ar password \*(Ba Xo 19.Fl -password= Ns Ar password Oc 20.Xc 21.Oo Fl p Ar principal \*(Ba Xo 22.Fl -principal= Ns Ar principal Oc 23.Xc 24.Oo Fl k Ar string \*(Ba Xo 25.Fl -keytype= Ns Ar string Oc 26.Xc 27.Ar password 28.Sh DESCRIPTION 29.Nm 30performs the string-to-key function. 31This is useful when you want to handle the raw key instead of the password. 32Supported options: 33.Bl -tag -width Ds 34.It Xo 35.Fl 5 Ns , 36.Fl -version5 37.Xc 38Output Kerberos v5 string-to-key 39.It Xo 40.Fl 4 Ns , 41.Fl -version4 42.Xc 43Output Kerberos v4 string-to-key 44.It Xo 45.Fl a Ns , 46.Fl -afs 47.Xc 48Output AFS string-to-key 49.It Xo 50.Fl c Ar cell Ns , 51.Fl -cell= Ns Ar cell 52.Xc 53AFS cell to use 54.It Xo 55.Fl w Ar password Ns , 56.Fl -password= Ns Ar password 57.Xc 58Password to use 59.It Xo 60.Fl p Ar principal Ns , 61.Fl -principal= Ns Ar principal 62.Xc 63Kerberos v5 principal to use 64.It Xo 65.Fl k Ar string Ns , 66.Fl -keytype= Ns Ar string 67.Xc 68Keytype 69.It Xo 70.Fl -version 71.Xc 72print version 73.It Xo 74.Fl -help 75.Xc 76.El
| 9.Sh SYNOPSIS 10.Nm 11.Op Fl 5 | Fl -version5 12.Op Fl 4 | Fl -version4 13.Op Fl a | Fl -afs 14.Oo Fl c Ar cell \*(Ba Xo 15.Fl -cell= Ns Ar cell Oc 16.Xc 17.Oo Fl w Ar password \*(Ba Xo 18.Fl -password= Ns Ar password Oc 19.Xc 20.Oo Fl p Ar principal \*(Ba Xo 21.Fl -principal= Ns Ar principal Oc 22.Xc 23.Oo Fl k Ar string \*(Ba Xo 24.Fl -keytype= Ns Ar string Oc 25.Xc 26.Ar password 27.Sh DESCRIPTION 28.Nm 29performs the string-to-key function. 30This is useful when you want to handle the raw key instead of the password. 31Supported options: 32.Bl -tag -width Ds 33.It Xo 34.Fl 5 Ns , 35.Fl -version5 36.Xc 37Output Kerberos v5 string-to-key 38.It Xo 39.Fl 4 Ns , 40.Fl -version4 41.Xc 42Output Kerberos v4 string-to-key 43.It Xo 44.Fl a Ns , 45.Fl -afs 46.Xc 47Output AFS string-to-key 48.It Xo 49.Fl c Ar cell Ns , 50.Fl -cell= Ns Ar cell 51.Xc 52AFS cell to use 53.It Xo 54.Fl w Ar password Ns , 55.Fl -password= Ns Ar password 56.Xc 57Password to use 58.It Xo 59.Fl p Ar principal Ns , 60.Fl -principal= Ns Ar principal 61.Xc 62Kerberos v5 principal to use 63.It Xo 64.Fl k Ar string Ns , 65.Fl -keytype= Ns Ar string 66.Xc 67Keytype 68.It Xo 69.Fl -version 70.Xc 71print version 72.It Xo 73.Fl -help 74.Xc 75.El
|