.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.38.2. .TH SHISA "1" "March 2012" "shisa 1.0.1" "User Commands" .SH NAME shisa \- Shishi database interface .SH SYNOPSIS .B shisa [\fIOPTIONS\fR]... [\fIREALM \fR[\fIPRINCIPAL\fR]]... .SH DESCRIPTION shisa 1.0.1 .PP Manipulate information stored in the Shisa user database. .TP \fB\-h\fR, \fB\-\-help\fR Print help and exit .TP \fB\-V\fR, \fB\-\-version\fR Print version and exit .SS "Operations:" .TP \fB\-a\fR, \fB\-\-add\fR Add realm or principal to database. .TP \fB\-d\fR, \fB\-\-dump\fR Dump entries in database. .TP \fB\-n\fR, \fB\-\-key\-add\fR Add new key to a principal in database. .TP \fB\-\-key\-remove\fR Remove a key from a principal in database. .TP \fB\-l\fR, \fB\-\-list\fR List entries in database. .TP \fB\-m\fR, \fB\-\-modify\fR Modify principal entry in database. .TP \fB\-r\fR, \fB\-\-remove\fR Remove realm or principal from database. .SS "Parameters:" .TP \fB\-f\fR, \fB\-\-force\fR Allow removal of non\-empty realms. (default=off) .TP \fB\-\-enabled\fR Only dump or list enabled principals. (default=off) .TP \fB\-\-disabled\fR Only dump or list disabled principals. (default=off) .TP \fB\-\-keys\fR Print cryptographic key and password in hostkey format. (default=off) .SS "Values:" .TP \fB\-E\fR, \fB\-\-encryption\-type\fR=\fISTRING\fR Override default key encryption type. Valid values include 'aes128', 'aes256', 'aes' (same as 'aes256'), '3des', 'des\-md5', \&'des\-md4', 'des\-crc', 'des' (same as \&'des\-md5'), and 'arcfour'. .TP \fB\-\-key\-version\fR=\fINUMBER\fR Version of key. .TP \fB\-\-password\fR[=\fISTRING\fR] Derive key from this password. .TP \fB\-\-priority\fR=\fINUMBER\fR Specify key priority, used to differentiate between keys when multiple keys are eligible for use. Higher value means higher priority. .IP (default is 0, which mean a random key of .IP the best etype is chosen) .TP \fB\-\-random\fR Use a random key. (default) .TP \fB\-\-salt\fR=\fISTRING\fR Use specified salt for deriving key. Defaults to concatenation of realm and (unwrapped) principal name. .TP \fB\-\-string\-to\-key\-parameter\fR=\fIHEX\fR Encryption algorithm specific parameter for .TP password derivation. Currently only the AES .IP algorithm can utilize this, where it is interpreted as the iteration count of the PKCS#5 PBKDF2 key deriver. .SS "Other options:" .HP \fB\-c\fR, \fB\-\-configuration\-file\fR=\fIFILE\fR Use specified configuration file. .TP \fB\-o\fR, \fB\-\-library\-options\fR=\fISTRING\fR Parse string as configuration file statement. .TP \fB\-v\fR, \fB\-\-verbose\fR Produce verbose output. (default=off) .TP \fB\-q\fR, \fB\-\-quiet\fR Don't produce any diagnostic output. (default=off) .PP Mandatory arguments to long options are mandatory for short options too. .SH AUTHOR Written by Simon Josefsson. .SH "REPORTING BUGS" Report bugs to: bug\-shishi@gnu.org .br GNU Shishi home page: .br General help using GNU software: .SH COPYRIGHT Copyright \(co 2012 Simon Josefsson. License GPLv3+: GNU GPL version 3 or later . .br This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. .SH "SEE ALSO" The full documentation for .B shisa is maintained as a Texinfo manual. If the .B info and .B shisa programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.