rkey

rkey is the PIKT encryption key utility for generating the keys.conf file.  It takes the following command-line arguments:

Usage:  rkey [options] [+H hosts -H hosts ...]

      Options:
        -u[uid]          uid generation
        -g[gid]          gid generation
        -k[key]          key generation
        -l length        key length
        -a               equivalent for -u -g -k
        -Q               displays the randomness Quality evaluation
        -v               be verbose
        -V               show version info
        -G               debug mode
        -h               help
'+H hosts -H hosts' are like their piktc and piktx counterparts with one exception:  It is possible to specify a host not registered in your systems.cfg.  Indeed, it's even possible to run rkey without any systems.cfg at all!

-u[uid] specifies that rkey should generate a random uid field.  If an integer is specified, no random generation will take place and that integer will be used instead.  The uid is limited to the range from 0 to 2^31 - 1 (2,147,483,647).

-g[gid] specifies that rkey should generate a random gid field.  If an integer is specified, no random generation will take place and that integer will be used instead.  The gid is limited to the range from 0 to 2^31 - 1 (2,147,483,647).

-k[key] specifies that rkey should generate a random key.  If a string is specified, no random generation will take place and that string will be used as the key instead.

-l length is the length of the random key in chars.  The key length must be at least 16.  The maximum key size is currently 56 chars, due to a BlowFish limitation.  (BlowFish is currently the only PIKT-supported cipher.)

-a is a shortcut for -u -g -k, i.e. when you want to generate lines with the hostname, uid, gid, and key.

-Q displays the quality rating.  This rating's purpose is to evaluate the randomness generation quality given the current environment.  The results range from 0 to 6, where 0 it the worst and 6 the best achievable rating.  The method used to calculate the rating is really simple, and is influenced by pseudo-random devices availability (/dev/urandom, for example), source lists, and installed modules.

-v gives a verbose display, and is especially useful with -Q.

-V shows the current version number.

-G activates debug mode.  This can help you locate which randomness sources succeed, and which don't.

-h outputs the help and usage display.  Using -v with -h gives detailed options help.

Unlike the other PIKT binaries (which are written using a combination of C, lex, and yacc), rkey (like piktf, pikth & piktx) is written in Perl.

Note that rkey will not generate data_encryption_type & auth_encryption_type, which are optional fields in keys.conf.  See the keys.conf section of this Reference for more information.

prev page 1st page next page
Home | FAQ | News | Intro | Samples | Tutorial | Reference | Software
DevNotes | Licensing | Authors | Pikt-Users | Pikt-Workers | Links | Site Index | Contact Us
Page best viewed at 1024x768 or greater.   Page last updated 2007-09-09.   This site is PIKT® powered.
PIKT® is a registered trademark of the University of Chicago.   Copyright © 1998-2007 Robert Osterlund. All rights reserved.
Home FAQ News Intro Samples Tutorial Reference Software
PIKT Logo
PIKT Page Title