freebsd-nq/crypto/openssl/doc/apps/passwd.pod

77 lines
1.4 KiB
Plaintext
Raw Normal View History

2000-04-13 06:33:22 +00:00
=pod
=head1 NAME
passwd - compute password hashes
=head1 SYNOPSIS
B<openssl passwd>
[B<-crypt>]
2000-11-13 01:03:58 +00:00
[B<-1>]
2000-04-13 06:33:22 +00:00
[B<-apr1>]
[B<-salt> I<string>]
[B<-in> I<file>]
[B<-stdin>]
[B<-quiet>]
[B<-table>]
{I<password>}
=head1 DESCRIPTION
The B<passwd> command computes the hash of a password typed at
run-time or the hash of each password in a list. The password list is
taken from the named file for option B<-in file>, from stdin for
option B<-stdin>, and from the command line otherwise.
2000-11-13 01:03:58 +00:00
The Unix standard algorithm B<crypt> and the MD5-based BSD password
algorithm B<1> and its Apache variant B<apr1> are available.
2000-04-13 06:33:22 +00:00
=head1 OPTIONS
=over 4
=item B<-crypt>
Use the B<crypt> algorithm (default).
2000-11-13 01:03:58 +00:00
=item B<-1>
Use the MD5 based BSD password algorithm B<1>.
2000-04-13 06:33:22 +00:00
=item B<-apr1>
2000-11-13 01:03:58 +00:00
Use the B<apr1> algorithm (Apache variant of the BSD algorithm).
2000-04-13 06:33:22 +00:00
=item B<-salt> I<string>
Use the specified salt.
=item B<-in> I<file>
Read passwords from I<file>.
=item B<-stdin>
Read passwords from B<stdin>.
=item B<-quiet>
Don't output warnings when passwords given at the command line are truncated.
=item B<-table>
In the output list, prepend the cleartext password and a TAB character
to each password hash.
=back
=head1 EXAMPLES
B<openssl passwd -crypt -salt xx password> prints B<xxj31ZMTZzkVA>.
2000-11-13 01:03:58 +00:00
B<openssl passwd -1 -salt xxxxxxxx password> prints B<$1$xxxxxxxx$8XJIcl6ZXqBMCK0qFevqT1>.
2000-04-13 06:33:22 +00:00
B<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>.
=cut