summaryrefslogtreecommitdiffstats
path: root/usr.bin/key
diff options
context:
space:
mode:
authormarkm <markm@FreeBSD.org>2001-07-09 17:40:57 +0000
committermarkm <markm@FreeBSD.org>2001-07-09 17:40:57 +0000
commit1c3a14b4014991f063e1c18ff82727fd89591c3b (patch)
tree975b82d142a1efaf81b6814e8e95f6e3c1165f60 /usr.bin/key
parentcb75b1ef0e029c0157267ba43f4ea1d690e160f3 (diff)
downloadFreeBSD-src-1c3a14b4014991f063e1c18ff82727fd89591c3b.zip
FreeBSD-src-1c3a14b4014991f063e1c18ff82727fd89591c3b.tar.gz
Remove the S/Key key-handling apps, which are no longer needed, as
they are replaced by opiepasswd, opieinfo and opiekey.
Diffstat (limited to 'usr.bin/key')
-rw-r--r--usr.bin/key/Makefile12
-rw-r--r--usr.bin/key/key.150
-rw-r--r--usr.bin/key/skey.c125
3 files changed, 0 insertions, 187 deletions
diff --git a/usr.bin/key/Makefile b/usr.bin/key/Makefile
deleted file mode 100644
index f680657..0000000
--- a/usr.bin/key/Makefile
+++ /dev/null
@@ -1,12 +0,0 @@
-# @(#)Makefile 5.6 (Berkeley) 3/5/91
-# $FreeBSD$
-
-PROG= key
-SRCS= skey.c
-
-CFLAGS+= -D_SKEY_INTERNAL
-
-DPADD= ${LIBSKEY} ${LIBCRYPT} ${LIBMD}
-LDADD= -lskey -lcrypt -lmd
-
-.include <bsd.prog.mk>
diff --git a/usr.bin/key/key.1 b/usr.bin/key/key.1
deleted file mode 100644
index 1e49886..0000000
--- a/usr.bin/key/key.1
+++ /dev/null
@@ -1,50 +0,0 @@
-.\" from: @(#)key.1 1.0 (Bellcore) 12/2/91
-.\" $FreeBSD$
-.\"
-.Dd December 2, 1991
-.Dt KEY 1
-.Os
-.Sh NAME
-.Nm key
-.Nd stand-alone program for computing responses to S/Key challenges
-.Sh SYNOPSIS
-.Nm
-.Op Fl n Ar count
-.Ar sequence
-.Ar key
-.Sh DESCRIPTION
-.Nm Key
-takes the optional count of the number of one time access
-passwords to print
-along with a (maximum) sequence number and key as command line arguments,
-it prompts for the user's secret password, and produces both word
-and hex format responses.
-.Pp
-The following option is available:
-.Bl -tag -width Fl
-.It Fl n Ar count
-The number of one time access passwords to print.
-The default is 1.
-.El
-.Sh EXAMPLES
-Usage example:
-.Bd -literal -offset indent -compact
->key -n 5 99 th91334
-Enter password: <your secret password is entered here>
-OMEN US HORN OMIT BACK AHOY
-\&.... 4 more passwords.
->
-.Ed
-.Sh SEE ALSO
-.Xr keyinfo 1 ,
-.Xr keyinit 1 ,
-.Xr skey 1
-.\" .BR keysu(1),
-.Sh AUTHORS
-.An -nosplit
-Command by
-.An Phil Karn ,
-.An Neil M. Haller ,
-.An John S. Walden
-.Sh CONTACT
-.Aq staff@thumper.bellcore.com
diff --git a/usr.bin/key/skey.c b/usr.bin/key/skey.c
deleted file mode 100644
index 6dc5a0a..0000000
--- a/usr.bin/key/skey.c
+++ /dev/null
@@ -1,125 +0,0 @@
-/* Stand-alone program for computing responses to S/Key challenges.
- * Takes the iteration count and seed as command line args, prompts
- * for the user's key, and produces both word and hex format responses.
- *
- * Usage example:
- * >skey 88 ka9q2
- * Enter password:
- * OMEN US HORN OMIT BACK AHOY
- * C848 666B 6435 0A93
- * >
- */
-
-#ifndef lint
-static const char rcsid[] =
- "$FreeBSD$";
-#endif /* not lint */
-
-#include <err.h>
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <unistd.h>
-
-#ifdef __MSDOS__
-#include <dos.h>
-#else /* Assume BSD Unix */
-#include <fcntl.h>
-#endif
-
-#include <skey.h>
-
-static void usage __P((void));
-
-int
-main(argc,argv)
-int argc;
-char *argv[];
-{
- int n,cnt,i;
- char passwd[256] /* ,passwd2[256] */;
- char key[8];
- char *seed;
- char buf[33];
- char *slash;
-
- cnt = 1;
- while((i = getopt(argc,argv,"n:")) != -1){
- switch(i){
- case 'n':
- cnt = atoi(optarg);
- break;
- }
- }
- /* could be in the form <number>/<seed> */
- if(argc <= optind + 1){
- /*look for / in it */
- if(argc <= optind)
- usage();
-
- slash = strchr(argv[optind], '/');
- if(slash == NULL)
- usage();
- *slash++ = '\0';
- seed = slash;
-
- if((n = atoi(argv[optind])) < 0){
- warnx("%s not positive",argv[optind]);
- usage();
- }
- }
- else {
-
- if((n = atoi(argv[optind])) < 0){
- warnx("%s not positive",argv[optind]);
- usage();
- }
- seed = argv[++optind];
- }
- fprintf(stderr,"Reminder - Do not use this program while logged in via telnet or rlogin.\n");
-
- /* Get user's secret password */
- for(;;){
- fprintf(stderr,"Enter secret password: ");
- readpass(passwd,sizeof(passwd));
- break;
- /************
- fprintf(stderr,"Again secret password: ");
- readpass(passwd2,sizeof(passwd));
- if(strcmp(passwd,passwd2) == 0) break;
- fprintf(stderr, "Sorry no match\n");
- **************/
-
- }
-
- /* Crunch seed and password into starting key */
- if(keycrunch(key,seed,passwd) != 0)
- errx(1, "key crunch failed");
- if(cnt == 1){
- while(n-- != 0)
- f(key);
- printf("%s\n",btoe(buf,key));
-#ifdef HEXIN
- printf("%s\n",put8(buf,key));
-#endif
- } else {
- for(i=0;i<=n-cnt;i++)
- f(key);
- for(;i<=n;i++){
-#ifdef HEXIN
- printf("%d: %-29s %s\n",i,btoe(buf,key),put8(buf,key));
-#else
- printf("%d: %-29s\n",i,btoe(buf,key));
-#endif
- f(key);
- }
- }
- return 0;
-}
-
-static void
-usage()
-{
- fprintf(stderr,"usage: key [-n count] <sequence #>[/] <key>\n");
- exit(1);
-}
OpenPOWER on IntegriCloud