Lines Matching full:host
11 .Nd Create a NTP host key
25 if the OpenSSL software library has been installed, it can generate host keys,
69 If no password is specified, the host name returned by the Unix
71 command, normally the DNS name of the host, is used as the the default read
89 If not specified, the host name is used.
93 without specifying an explicit password but only on the same host.
94 If the write password used for encryption is specified as the host name,
95 these files can be read by that host with no explicit password.
97 Normally, encrypted files for each host are generated by that host and
98 used only by that host, although exceptions exist as noted later on
125 and include the file type, generating host and filestamp,
150 host key and matching
160 The host key is used to encrypt the cookie when required and so must be
163 By default, the host key is also the sign key used to encrypt signatures.
229 Ordinarily, cryptographic files are generated by the host that uses them,
233 of the host generating the files, but can be changed by command line options.
236 The owner name is also used for the host and sign key files,
246 Normally, the files for each host are generated by that host
247 and used only by that host, although exceptions exist
251 including the host key, sign key and identification parameters,
290 Designate one of them as the trusted host (TH) using
298 ascendant host towards the TH to sign its certificate, which is then
299 provided to the immediately descendant host on request.
302 The host key is used to encrypt the cookie when required and so must be
304 By default, the host key is also the sign key used to encrypt
323 filestamps, which means the host should already be synchronized before
326 when the host is started for the first time.
327 Accordingly, the host time
330 After that and when the host is synchronized to a proventic source, the
383 a certificate trail ending at a trusted host.
390 On each trusted host as root, change to the keys directory.
439 However, if the host or sign key is changed,
462 by a trusted host and certificate trails that end on that host.
463 The name of a trusted host is also the name of its sugroup
465 The TA is not necessarily a trusted host in this sense, but often is.
476 The PC scheme supports only one trusted host in the group.
477 On trusted host alice run
481 to generate the host key file
488 On each host
492 to the host key file and soft link
496 by trusted host alice.
506 and certificates for all group hosts, then for every trusted host in the group,
510 On trusted host alice run
549 and certificates for all group hosts, then for every trusted host
553 On trusted host alice run
565 In addition, on each host
687 .It Fl H Fl \-host\-key
690 public/private host key file.
708 In that role, the default is the host name if no group is provided.
716 .Ar host @ group
748 These include the host, sign and identify key files.
773 .It Fl s Fl \-subject\-key Ns = Ar Oo host Oc Op @ Ar group
774 Specify the Autokey host name, where
775 .Ar host
776 is the optional host name and
779 The host name, and if provided, group name are used in
780 .Ar host @ group
784 is allowed, and results in leaving the host name unchanged, as with
786 The group name, or if no group is provided, the host name are also used in the
793 .Ar host
794 is not specified, the default host name is the string returned by the Unix
799 By default, the sign key is the host key and has the same type.
877 The first line contains the file name, including the generated host name
884 is the host or group name and
1059 .It Fl H , Fl \-host\-key
1060 generate RSA host key.
1062 Generate new host keys, obsoleting any that may exist.
1073 that role, the default is the host name if this option is not
1076 is also a part of the self\-signed host certificate subject and
1124 .It Fl s Ar host@group , Fl \-subject\-name Ns = Ns Ar host@group
1125 set host and optionally group name.
1127 Set the Autokey host name, and optionally, group name specified
1128 following an '\fB@\fP' character. The host name is used in the file
1129 name of generated host and signing certificates, without the
1130 group name. The host name, and if provided, group name are used
1131 in \fBhost@group\fP form for the host certificate subject and issuer
1133 leaving the host name unchanged while appending \fB@group\fP to the
1135 if not provided, the host name are also used in the file names
1141 that may exist. By default, the program uses the host key as the