1.\" $NetBSD: string2key.8,v 1.3 2014/04/24 13:45:34 pettai Exp $ 2.\" 3.\" Copyright (c) 2000 - 2002 Kungliga Tekniska Högskolan 4.\" (Royal Institute of Technology, Stockholm, Sweden). 5.\" All rights reserved. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions 9.\" are met: 10.\" 11.\" 1. Redistributions of source code must retain the above copyright 12.\" notice, this list of conditions and the following disclaimer. 13.\" 14.\" 2. Redistributions in binary form must reproduce the above copyright 15.\" notice, this list of conditions and the following disclaimer in the 16.\" documentation and/or other materials provided with the distribution. 17.\" 18.\" 3. Neither the name of the Institute nor the names of its contributors 19.\" may be used to endorse or promote products derived from this software 20.\" without specific prior written permission. 21.\" 22.\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 23.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 24.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 25.\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 26.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32.\" SUCH DAMAGE. 33.\" 34.\" Id 35.\" 36.Dd March 4, 2000 37.Dt STRING2KEY 8 38.Os 39.Sh NAME 40.Nm string2key 41.Nd map a password into a key 42.Sh SYNOPSIS 43.Nm 44.Op Fl 5 | Fl Fl version5 45.Op Fl 4 | Fl Fl version4 46.Op Fl a | Fl Fl afs 47.Oo Fl c Ar cell \*(Ba Xo 48.Fl Fl cell= Ns Ar cell 49.Xc 50.Oc 51.Oo Fl w Ar password \*(Ba Xo 52.Fl Fl password= Ns Ar password 53.Xc 54.Oc 55.Oo Fl p Ar principal \*(Ba Xo 56.Fl Fl principal= Ns Ar principal 57.Xc 58.Oc 59.Oo Fl k Ar string \*(Ba Xo 60.Fl Fl keytype= Ns Ar string 61.Xc 62.Oc 63.Ar password 64.Sh DESCRIPTION 65.Nm 66performs the string-to-key function. 67This is useful when you want to handle the raw key instead of the password. 68Supported options: 69.Bl -tag -width Ds 70.It Fl 5 , Fl Fl version5 71Output Kerberos v5 string-to-key 72.It Fl 4 , Fl Fl version4 73Output Kerberos v4 string-to-key 74.It Fl a , Fl Fl afs 75Output AFS string-to-key 76.It Fl c Ar cell , Fl Fl cell= Ns Ar cell 77AFS cell to use 78.It Fl w Ar password , Fl Fl password= Ns Ar password 79Password to use 80.It Fl p Ar principal , Fl Fl principal= Ns Ar principal 81Kerberos v5 principal to use 82.It Fl k Ar string , Fl Fl keytype= Ns Ar string 83Keytype 84.It Fl Fl version 85print version 86.It Fl Fl help 87.El 88