Deleted Added
full compact
string2key.8 (72445) string2key.8 (76371)
1.\" $Id: string2key.8,v 1.2 2000/03/04 14:02:55 assar Exp $
2.\"
3.Dd March 4, 2000
4.Dt STRING2KEY 8
5.Os HEIMDAL
6.Sh NAME
7.Nm string2key
1.\" $Id: string2key.8,v 1.2 2000/03/04 14:02:55 assar Exp $
2.\"
3.Dd March 4, 2000
4.Dt STRING2KEY 8
5.Os HEIMDAL
6.Sh NAME
7.Nm string2key
8.Nd
9map a password into a key
8.Nd map a password into a key
10.Sh SYNOPSIS
11.Nm
12.Op Fl 5 | Fl -version5
13.Op Fl 4 | Fl -version4
14.Op Fl a | Fl -afs
15.Oo Fl c Ar cell \*(Ba Xo
16.Fl -cell= Ns Ar cell Oc
17.Xc
18.Oo Fl w Ar password \*(Ba Xo
19.Fl -password= Ns Ar password Oc
20.Xc
21.Oo Fl p Ar principal \*(Ba Xo
22.Fl -principal= Ns Ar principal Oc
23.Xc
24.Oo Fl k Ar string \*(Ba Xo
25.Fl -keytype= Ns Ar string Oc
26.Xc
27.Ar password
28.Sh DESCRIPTION
29.Nm
30performs the string-to-key function.
31This is useful when you want to handle the raw key instead of the password.
32Supported options:
33.Bl -tag -width Ds
34.It Xo
35.Fl 5 Ns ,
36.Fl -version5
37.Xc
38Output Kerberos v5 string-to-key
39.It Xo
40.Fl 4 Ns ,
41.Fl -version4
42.Xc
43Output Kerberos v4 string-to-key
44.It Xo
45.Fl a Ns ,
46.Fl -afs
47.Xc
48Output AFS string-to-key
49.It Xo
50.Fl c Ar cell Ns ,
51.Fl -cell= Ns Ar cell
52.Xc
53AFS cell to use
54.It Xo
55.Fl w Ar password Ns ,
56.Fl -password= Ns Ar password
57.Xc
58Password to use
59.It Xo
60.Fl p Ar principal Ns ,
61.Fl -principal= Ns Ar principal
62.Xc
63Kerberos v5 principal to use
64.It Xo
65.Fl k Ar string Ns ,
66.Fl -keytype= Ns Ar string
67.Xc
68Keytype
69.It Xo
70.Fl -version
71.Xc
72print version
73.It Xo
74.Fl -help
75.Xc
76.El
9.Sh SYNOPSIS
10.Nm
11.Op Fl 5 | Fl -version5
12.Op Fl 4 | Fl -version4
13.Op Fl a | Fl -afs
14.Oo Fl c Ar cell \*(Ba Xo
15.Fl -cell= Ns Ar cell Oc
16.Xc
17.Oo Fl w Ar password \*(Ba Xo
18.Fl -password= Ns Ar password Oc
19.Xc
20.Oo Fl p Ar principal \*(Ba Xo
21.Fl -principal= Ns Ar principal Oc
22.Xc
23.Oo Fl k Ar string \*(Ba Xo
24.Fl -keytype= Ns Ar string Oc
25.Xc
26.Ar password
27.Sh DESCRIPTION
28.Nm
29performs the string-to-key function.
30This is useful when you want to handle the raw key instead of the password.
31Supported options:
32.Bl -tag -width Ds
33.It Xo
34.Fl 5 Ns ,
35.Fl -version5
36.Xc
37Output Kerberos v5 string-to-key
38.It Xo
39.Fl 4 Ns ,
40.Fl -version4
41.Xc
42Output Kerberos v4 string-to-key
43.It Xo
44.Fl a Ns ,
45.Fl -afs
46.Xc
47Output AFS string-to-key
48.It Xo
49.Fl c Ar cell Ns ,
50.Fl -cell= Ns Ar cell
51.Xc
52AFS cell to use
53.It Xo
54.Fl w Ar password Ns ,
55.Fl -password= Ns Ar password
56.Xc
57Password to use
58.It Xo
59.Fl p Ar principal Ns ,
60.Fl -principal= Ns Ar principal
61.Xc
62Kerberos v5 principal to use
63.It Xo
64.Fl k Ar string Ns ,
65.Fl -keytype= Ns Ar string
66.Xc
67Keytype
68.It Xo
69.Fl -version
70.Xc
71print version
72.It Xo
73.Fl -help
74.Xc
75.El