1.\" $Id: string2key.8,v 1.2 2000/03/04 14:02:55 assar Exp $ 2.\" 3.Dd March 4, 2000 4.Dt STRING2KEY 8 5.Os HEIMDAL 6.Sh NAME 7.Nm string2key 8.Nd 9map a password into a key 10.Sh SYNOPSIS 11.Nm 12.Op Fl 5 | Fl -version5 13.Op Fl 4 | Fl -version4 14.Op Fl a | Fl -afs 15.Oo Fl c Ar cell \*(Ba Xo 16.Fl -cell= Ns Ar cell Oc 17.Xc 18.Oo Fl w Ar password \*(Ba Xo 19.Fl -password= Ns Ar password Oc 20.Xc 21.Oo Fl p Ar principal \*(Ba Xo 22.Fl -principal= Ns Ar principal Oc 23.Xc 24.Oo Fl k Ar string \*(Ba Xo 25.Fl -keytype= Ns Ar string Oc 26.Xc 27.Ar password 28.Sh DESCRIPTION 29.Nm 30performs the string-to-key function. 31This is useful when you want to handle the raw key instead of the password. 32Supported options: 33.Bl -tag -width Ds 34.It Xo 35.Fl 5 Ns , 36.Fl -version5 37.Xc 38Output Kerberos v5 string-to-key 39.It Xo 40.Fl 4 Ns , 41.Fl -version4 42.Xc 43Output Kerberos v4 string-to-key 44.It Xo 45.Fl a Ns , 46.Fl -afs 47.Xc 48Output AFS string-to-key 49.It Xo 50.Fl c Ar cell Ns , 51.Fl -cell= Ns Ar cell 52.Xc 53AFS cell to use 54.It Xo 55.Fl w Ar password Ns , 56.Fl -password= Ns Ar password 57.Xc 58Password to use 59.It Xo 60.Fl p Ar principal Ns , 61.Fl -principal= Ns Ar principal 62.Xc 63Kerberos v5 principal to use 64.It Xo 65.Fl k Ar string Ns , 66.Fl -keytype= Ns Ar string 67.Xc 68Keytype 69.It Xo 70.Fl -version 71.Xc 72print version 73.It Xo 74.Fl -help 75.Xc 76.El 77