passwd.pod revision 68651
1306196Sjkim=pod 2127131Snectar 3127131Snectar=head1 NAME 4142429Snectar 5127131Snectarpasswd - compute password hashes 6127131Snectar 7127131Snectar=head1 SYNOPSIS 8127131Snectar 9127131SnectarB<openssl passwd> 10127131Snectar[B<-crypt>] 11127131Snectar[B<-1>] 12127131Snectar[B<-apr1>] 13127131Snectar[B<-salt> I<string>] 14127131Snectar[B<-in> I<file>] 15127131Snectar[B<-stdin>] 16127131Snectar[B<-quiet>] 17127131Snectar[B<-table>] 18127131Snectar{I<password>} 19127131Snectar 20215698Ssimon=head1 DESCRIPTION 21215698Ssimon 22215698SsimonThe B<passwd> command computes the hash of a password typed at 23215698Ssimonrun-time or the hash of each password in a list. The password list is 24215698Ssimontaken from the named file for option B<-in file>, from stdin for 25127131Snectaroption B<-stdin>, and from the command line otherwise. 26127131SnectarThe Unix standard algorithm B<crypt> and the MD5-based BSD password 27127131Snectaralgorithm B<1> and its Apache variant B<apr1> are available. 28127131Snectar 29127131Snectar=head1 OPTIONS 30127131Snectar 31127131Snectar=over 4 32127131Snectar 33127131Snectar=item B<-crypt> 34127131Snectar 35127131SnectarUse the B<crypt> algorithm (default). 36127131Snectar 37127131Snectar=item B<-1> 38127131Snectar 39127131SnectarUse the MD5 based BSD password algorithm B<1>. 40127131Snectar 41276864Sjkim=item B<-apr1> 42276864Sjkim 43127131SnectarUse the B<apr1> algorithm (Apache variant of the BSD algorithm). 44127131Snectar 45215698Ssimon=item B<-salt> I<string> 46215698Ssimon 47215698SsimonUse the specified salt. 48215698Ssimon 49142429Snectar=item B<-in> I<file> 50215698Ssimon 51142429SnectarRead passwords from I<file>. 52142429Snectar 53276864Sjkim=item B<-stdin> 54276864Sjkim 55276864SjkimRead passwords from B<stdin>. 56127131Snectar 57276864Sjkim=item B<-quiet> 58276864Sjkim 59276864SjkimDon't output warnings when passwords given at the command line are truncated. 60276864Sjkim 61276864Sjkim=item B<-table> 62276864Sjkim 63215698SsimonIn the output list, prepend the cleartext password and a TAB character 64276864Sjkimto each password hash. 65276864Sjkim 66276864Sjkim=back 67276864Sjkim 68276864Sjkim=head1 EXAMPLES 69215698Ssimon 70276864SjkimB<openssl passwd -crypt -salt xx password> prints B<xxj31ZMTZzkVA>. 71127131Snectar 72127131SnectarB<openssl passwd -1 -salt xxxxxxxx password> prints B<$1$xxxxxxxx$8XJIcl6ZXqBMCK0qFevqT1>. 73127131Snectar 74127131SnectarB<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>. 75127131Snectar 76127131Snectar=cut 77127131Snectar