.\" .\" This source code is no longer held under any constraint of USA .\" `cryptographic laws' since it was exported legally. The cryptographic .\" functions were removed from the code and a "Bones" distribution was .\" made. A Commodity Jurisdiction Request #012-94 was filed with the .\" USA State Department, who handed it to the Commerce department. The .\" code was determined to fall under General License GTDA under ECCN 5D96G, .\" and hence exportable. The cryptographic interfaces were re-added by Eric .\" Young, and then KTH proceeded to maintain the code in the free world. .\" .\"Copyright (C) 1989 by the Massachusetts Institute of Technology .\" .\"Export of this software from the United States of America is assumed .\"to require a specific license from the United States Government. .\"It is the responsibility of any person or organization contemplating .\"export to obtain such a license before exporting. .\" .\"WITHIN THAT CONSTRAINT, permission to use, copy, modify, and .\"distribute this software and its documentation for any purpose and .\"without fee is hereby granted, provided that the above copyright .\"notice appear in all copies and that both that copyright notice and .\"this permission notice appear in supporting documentation, and that .\"the name of M.I.T. not be used in advertising or publicity pertaining .\"to distribution of the software without specific, written prior .\"permission. M.I.T. makes no representations about the suitability of .\"this software for any purpose. It is provided "as is" without express .\"or implied warranty. .\" .\" $OpenBSD: kdb_util.8,v 1.4 1998/02/25 15:50:50 art Exp $ .TH KDB_UTIL 8 "Kerberos Version 4.0" "MIT Project Athena" .SH NAME kdb_util \- Kerberos key distribution center database utility .SH SYNOPSIS kdb_util .B operation filename .SH DESCRIPTION .I kdb_util allows the Kerberos key distribution center (KDC) database administrator to perform utility functions on the database. .PP .I Operation must be one of the following: .TP 10n .I load initializes the KDC database with the records described by the text contained in the file .IR filename . Any existing database is overwritten. .TP .I dump dumps the KDC database into a text representation in the file .IR filename . .TP .I slave_dump performs a database dump like the .I dump operation, and additionally creates a semaphore file signalling the propagation software that an update is available for distribution to slave KDC databases. .TP .I new_master_key prompts for the old and new master key strings, and then dumps the KDC database into a text representation in the file .IR filename . The keys in the text representation are encrypted in the new master key. .TP .I convert_old_db prompts for the master key string, and then dumps the KDC database into a text representation in the file .IR filename . The existing database is assumed to be encrypted using the old format (encrypted by the key schedule of the master key); the dumped database is encrypted using the new format (encrypted directly with master key). .PP .SH DIAGNOSTICS .TP 20n "verify_master_key: Invalid master key, does not match database." The master key string entered was incorrect. .SH FILES .TP 20n /etc/kerberosIV/principal.pag, /etc/kerberosIV/principal.dir DBM files containing database .TP .IR filename .ok semaphore file created by .IR slave_dump.