AT&T UNIX™PC Unix System V Users Manual - tenox
AT&T UNIX™PC Unix System V Users Manual - tenox AT&T UNIX™PC Unix System V Users Manual - tenox
.� ... ,' ' · - -
MAKEKEY (l) (Domestic Version Only ) MAKEKEY (l) NAME makekey - generate encryption key SYNOPSIS /usr/lib/makekey DESCRIPTION This feature is available only in the domestic (U.S.) version of the UNIX PC software. Makekey improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input, and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (i.e., to require a substantial fraction of a second). The first eight input bytes (the input key) can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of digits, ., /, and upper- and lower-case letters. The salt characters are repeated as the first two characters of the output. The remaining 11 output characters are chosen from the same set as the salt and constitute the output key. The transformation performed is essentially the following: the salt is used to select one of 4,096 cryptographic machines all based on the National Bureau of Standards DES algorithm, but broken in 4,096 different ways. Using the input key as key, a constant string is fed into the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 output key bits in the result. Makekey is intended for programs that perform encryption (e.g., ed(l) and crypt( !)). Usually, its input and output will be pipes. SEE ALSO crypt(l), ed(l), passwd(4). - 1 -
- Page 378 and 379: KSH(l) KSH(l) using paper terminals
- Page 380 and 381: KSH ( 1) KSH ( 1) [count]Tc Equival
- Page 382 and 383: KSH ( 1) KSH(I) Line feed and print
- Page 384 and 385: KSH ( 1 ) KSH ( 1) fc -e - [ old= n
- Page 386 and 387: KSH ( 1 ) KSH(l) ?, the remainder o
- Page 388 and 389: KSH (l) KSH(l) test [ expr ] Evalua
- Page 390 and 391: KSH ( 1 ) KSH(l) ulimit [ -cdfmpt 1
- Page 393 and 394: LD ( 1 ) LD (1) NAME ld - link edit
- Page 395: LD ( 1 ) FILES LD ( 1) allow compat
- Page 398 and 399: LEX(l) LEX(l) EXAMPLE character def
- Page 401 and 402: LINT ( l ) LINT ( 1 ) NAME lint - a
- Page 403: LOGNAME ( l ) LOGNAME ( l ) NAME lo
- Page 406 and 407: I� �- '--- . ·
- Page 408 and 409: LP (l) LP (l) -ooption Specify prin
- Page 410 and 411: LPSTAT (l) LPSTAT (l) SEE ALSO enab
- Page 412 and 413: LS (l) LS (l) -f Force each argumen
- Page 415 and 416: M4 ( 1 ) M4 ( 1) NAME m4 - macro pr
- Page 417 and 418: M4 (1) undivert divnum dnl if else
- Page 419 and 420: MAIL ( 1) MAIL (l) NAME mail, rmail
- Page 421 and 422: MAKE(l) MAKE(l) NAME make - maintai
- Page 423 and 424: MAKE ( I) MAKE (l) MAKEFLAGS macro
- Page 425 and 426: MAKE(l) MAKE (I) .C .C - .Sh .sh- .
- Page 427: MAKE (l) MAKE (l) In the above exam
- Page 431 and 432: MESG ( 1) MESG ( 1) NAME mesg - per
- Page 433 and 434: MESSAGE( ! ) ( AT&T UNIX PC only )
- Page 435: MKDIR (l) MKDIR (l) NAME mkdir - ma
- Page 438 and 439: MM (l) HINTS MM (l) Mm reads the st
- Page 440 and 441: i�
- Page 442 and 443: MORE(l) MORE (l) stand-out mode, mo
- Page 444 and 445: MORE( I) MORE(l) The terminal is se
- Page 446 and 447: NEWFORM ( l ) -ck -pn -an NEWFORM (
- Page 449: NEWGRP ( I ) NEWGRP ( I ) NAME newg
- Page 452 and 453: � ', y n \,..._ --
- Page 454 and 455: NL(l) NL(l) -ssep Sep is the charac
- Page 456 and 457: NM (l) FILES NM ( l ) -V Print the
- Page 459 and 460: NROFF(l) NROFF(l) NAME nroff - form
- Page 461 and 462: OD (1) OD (1) NAME od - octal dump
- Page 463 and 464: PACK ( 1) PACK( l ) NAME pack, peat
- Page 465: PASSWD ( l ) PASSWD ( l ) NAME pass
- Page 468 and 469: PASTE (l) PASTE (l) pr(l): pr -t -
- Page 471 and 472: PR (l) PR (l) NAME pr - print files
- Page 473 and 474: PROF ( 1) PROF ( 1) NAME prof - dis
- Page 475 and 476: PRS ( l ) PRS ( l ) NAME prs - prin
- Page 477 and 478: PRS ( 1 ) PRS ( 1 ) TABLE 1 (Contin
MAKEKEY (l) (Domestic Version Only ) MAKEKEY (l)<br />
NAME<br />
makekey - generate encryption key<br />
SYNOPSIS<br />
/usr/lib/makekey<br />
DESCRIPTION<br />
This feature is available only in the domestic (U.S.) version of the<br />
UNIX PC software. Makekey improves the usefulness of encryption<br />
schemes depending on a key by increasing the amount of time<br />
required to search the key space. It reads 10 bytes from its standard<br />
input, and writes 13 bytes on its standard output. The output<br />
depends on the input in a way intended to be difficult to compute<br />
(i.e., to require a substantial fraction of a second).<br />
The first eight input bytes (the input key) can be arbitrary ASCII<br />
characters. The last two (the salt) are best chosen from the set of<br />
digits, ., /, and upper- and lower-case letters. The salt characters<br />
are repeated as the first two characters of the output. The<br />
remaining 11 output characters are chosen from the same set as<br />
the salt and constitute the output key.<br />
The transformation performed is essentially the following: the salt<br />
is used to select one of 4,096 cryptographic machines all based on<br />
the National Bureau of Standards DES algorithm, but broken in<br />
4,096 different ways. Using the input key as key, a constant string<br />
is fed into the machine and recirculated a number of times. The<br />
64 bits that come out are distributed into the 66 output key bits<br />
in the result.<br />
Makekey is intended for programs that perform encryption (e.g.,<br />
ed(l) and crypt( !)). Usually, its input and output will be pipes.<br />
SEE ALSO<br />
crypt(l), ed(l), passwd(4).<br />
- 1 -