Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

makekey(8) [ultrix man page]

makekey(8)						      System Manager's Manual							makekey(8)

Name
       makekey - generate encryption key

Syntax
       /usr/lib/makekey

Description
       The  command  improves  the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key
       space.  It reads 10 bytes from its standard input, and writes 13 bytes on its standard output.  The output depends on the input	in  a  way
       intended to be difficult to compute (that is, to require a substantial fraction of a second).

       The  first  eight  input  bytes (the input key) can be arbitrary ASCII characters.  The last two (the salt) are best chosen from the set of
       digits, uppercase and lowercase letters, the period (.), and the slash (/).  The salt characters are repeated as the first  two	characters
       of the output.  The remaining 11 output characters are chosen from the same set as the salt and constitute the output key.

       The  transformation  performed is essentially the following: the salt is used to select one of 4096 cryptographic machines all based on the
       National Bureau of Standards DES algorithm, but modified in 4096 different ways.  Using the input key as key, a constant string is fed into
       the machine and recirculated a number of times.	The 64 bits that come out are distributed into the 66 useful key bits in the result.

       The command is intended for programs that perform encryption (for instance, Usually input and output of will be pipes.

See Also
       ed(1)

																	makekey(8)

Check Out this Related Man Page

makekey(8)						      System Manager's Manual							makekey(8)

NAME
makekey - generate encryption key SYNOPSIS
/usr/lbin/makekey DESCRIPTION
The command improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key space. It reads 10 bytes from its standard input, and writes 13 bytes on its standard output. The output depends on the input in a way intended to be difficult to compute (that is, to require a substantial fraction of a second). The first eight input bytes (the "input key") can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of digits, uppercase and lowercase letters, the period (.), and the slash (/). The salt characters are repeated as the first two characters of the output. The remaining 11 output characters are chosen from the same set as the salt and constitute the "output key". The transformation performed is essentially the following: the salt is used to select one of 4096 cryptographic machines all based on the National Bureau of Standards DES algorithm, but modified in 4096 different ways. Using the input key as key, a constant string is fed into the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 useful key bits in the result. The command is intended for programs that perform encryption (for instance, Usually input and output for are pipes. RELATED INFORMATION
Commands: crypt(1), ed(1), ex(1), vi(1) delim off makekey(8)
Man Page

7 More Discussions You Might Find Interesting

1. Linux

Find node of a command

I want to know how to find a node path of a unix command. I tried the command which, but it didn't find the "makekey" command node path... Are there any tricks about the "which" command? Should I use this command on a special level of directories? Moreover, I am accessing in remote the computers of... (5 Replies)
Discussion started by: blueberryffin
5 Replies

2. UNIX for Dummies Questions & Answers

how to know the list of all commands supported by unix ?

how to know the list of all commands supported by unix. how to know the list of functions supported by unix. (4 Replies)
Discussion started by: Gopi Krishna P
4 Replies

3. UNIX for Advanced & Expert Users

compile a c program in a encrypted way

Hi Guys, I wonder I had have a look to the cc compile options but I could be missing one but basically I'm compliling a c program where I will storing a command to connect to a database and also userid and password. The issue is that after the module is generated using a command like strings I... (14 Replies)
Discussion started by: arizah
14 Replies

4. AIX

Not picking up the GNU version of make

Hi team, I am new to unix,and need your advice on the below. I am using aix5.3 and have installed make-3.82 on the server. I need to use gmake for configuring and installing a package ,but it is giving error at the below root@sapsrp:/usr/tmp/xymon-4.3.2 # ./configure.server ... (7 Replies)
Discussion started by: sonal kumar
7 Replies

5. Programming

C++ Exception class missing?

Hi I tried googling about it and I couldn't really find a solid answer. Why is the compiler missing the exception class when it seems to be a standard class? The code is here: //Rijndael.h #ifndef __RIJNDAEL_H__ #define __RIJNDAEL_H__ #include <exception> #include <cstring> using... (6 Replies)
Discussion started by: flagman5
6 Replies

6. Shell Programming and Scripting

Script to set password in HP-UX 11.31

Hi, I am unable to set the password remotely. I am using the script as below: ep=`echo "$p" | /usr/lbin/makekey` ssh -t $i "/usr/local/bin/sudo useradd -c "$user_c" -m -d /home/$user_id -s /bin/ksh $user_id; /usr/local/bin/sudo /usr/sam/lbin/usermod.sam -F -p $ep $user_id" The... (0 Replies)
Discussion started by: Kits
0 Replies

7. AIX

Random password generation

Hello, I have created a script to generate a random password on Linux/Solaris, but I simply cannot use it on my AIX VMs since Bash isn't installed on them. I need a password that is randomly created with the following... (12 Replies)
Discussion started by: gfroute
12 Replies