70 lines
1.2 KiB
Plaintext
70 lines
1.2 KiB
Plaintext
|
=pod
|
||
|
|
||
|
=head1 NAME
|
||
|
|
||
|
passwd - compute password hashes
|
||
|
|
||
|
=head1 SYNOPSIS
|
||
|
|
||
|
B<openssl passwd>
|
||
|
[B<-crypt>]
|
||
|
[B<-apr1>]
|
||
|
[B<-salt> I<string>]
|
||
|
[B<-in> I<file>]
|
||
|
[B<-stdin>]
|
||
|
[B<-quiet>]
|
||
|
[B<-table>]
|
||
|
{I<password>}
|
||
|
|
||
|
=head1 DESCRIPTION
|
||
|
|
||
|
The B<passwd> command computes the hash of a password typed at
|
||
|
run-time or the hash of each password in a list. The password list is
|
||
|
taken from the named file for option B<-in file>, from stdin for
|
||
|
option B<-stdin>, and from the command line otherwise.
|
||
|
The Unix standard algorithm B<crypt> and the MD5-based B<apr1> algorithm
|
||
|
are available.
|
||
|
|
||
|
=head1 OPTIONS
|
||
|
|
||
|
=over 4
|
||
|
|
||
|
=item B<-crypt>
|
||
|
|
||
|
Use the B<crypt> algorithm (default).
|
||
|
|
||
|
=item B<-apr1>
|
||
|
|
||
|
Use the B<apr1> algorithm.
|
||
|
|
||
|
=item B<-salt> I<string>
|
||
|
|
||
|
Use the specified salt.
|
||
|
|
||
|
=item B<-in> I<file>
|
||
|
|
||
|
Read passwords from I<file>.
|
||
|
|
||
|
=item B<-stdin>
|
||
|
|
||
|
Read passwords from B<stdin>.
|
||
|
|
||
|
=item B<-quiet>
|
||
|
|
||
|
Don't output warnings when passwords given at the command line are truncated.
|
||
|
|
||
|
=item B<-table>
|
||
|
|
||
|
In the output list, prepend the cleartext password and a TAB character
|
||
|
to each password hash.
|
||
|
|
||
|
=back
|
||
|
|
||
|
=head1 EXAMPLES
|
||
|
|
||
|
B<openssl passwd -crypt -salt xx password> prints B<xxj31ZMTZzkVA>.
|
||
|
|
||
|
B<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>.
|
||
|
|
||
|
=cut
|