1.\" $Id: string2key.8,v 1.2 2000/03/04 14:02:55 assar Exp $ 2.\" 3.Dd March 4, 2000 4.Dt STRING2KEY 8 5.Os HEIMDAL 6.Sh NAME 7.Nm string2key 8.Nd map a password into a key 9.Sh SYNOPSIS 10.Nm 11.Op Fl 5 | Fl -version5 12.Op Fl 4 | Fl -version4 13.Op Fl a | Fl -afs 14.Oo Fl c Ar cell \*(Ba Xo 15.Fl -cell= Ns Ar cell Oc 16.Xc 17.Oo Fl w Ar password \*(Ba Xo 18.Fl -password= Ns Ar password Oc 19.Xc 20.Oo Fl p Ar principal \*(Ba Xo 21.Fl -principal= Ns Ar principal Oc 22.Xc 23.Oo Fl k Ar string \*(Ba Xo 24.Fl -keytype= Ns Ar string Oc 25.Xc 26.Ar password 27.Sh DESCRIPTION 28.Nm 29performs the string-to-key function. 30This is useful when you want to handle the raw key instead of the password. 31Supported options: 32.Bl -tag -width Ds 33.It Xo 34.Fl 5 Ns , 35.Fl -version5 36.Xc 37Output Kerberos v5 string-to-key 38.It Xo 39.Fl 4 Ns , 40.Fl -version4 41.Xc 42Output Kerberos v4 string-to-key 43.It Xo 44.Fl a Ns , 45.Fl -afs 46.Xc 47Output AFS string-to-key 48.It Xo 49.Fl c Ar cell Ns , 50.Fl -cell= Ns Ar cell 51.Xc 52AFS cell to use 53.It Xo 54.Fl w Ar password Ns , 55.Fl -password= Ns Ar password 56.Xc 57Password to use 58.It Xo 59.Fl p Ar principal Ns , 60.Fl -principal= Ns Ar principal 61.Xc 62Kerberos v5 principal to use 63.It Xo 64.Fl k Ar string Ns , 65.Fl -keytype= Ns Ar string 66.Xc 67Keytype 68.It Xo 69.Fl -version 70.Xc 71print version 72.It Xo 73.Fl -help 74.Xc 75.El 76