passwd.pod revision 68651
1306196Sjkim=pod
2127131Snectar
3127131Snectar=head1 NAME
4142429Snectar
5127131Snectarpasswd - compute password hashes
6127131Snectar
7127131Snectar=head1 SYNOPSIS
8127131Snectar
9127131SnectarB<openssl passwd>
10127131Snectar[B<-crypt>]
11127131Snectar[B<-1>]
12127131Snectar[B<-apr1>]
13127131Snectar[B<-salt> I<string>]
14127131Snectar[B<-in> I<file>]
15127131Snectar[B<-stdin>]
16127131Snectar[B<-quiet>]
17127131Snectar[B<-table>]
18127131Snectar{I<password>}
19127131Snectar
20215698Ssimon=head1 DESCRIPTION
21215698Ssimon
22215698SsimonThe B<passwd> command computes the hash of a password typed at
23215698Ssimonrun-time or the hash of each password in a list.  The password list is
24215698Ssimontaken from the named file for option B<-in file>, from stdin for
25127131Snectaroption B<-stdin>, and from the command line otherwise.
26127131SnectarThe Unix standard algorithm B<crypt> and the MD5-based BSD password
27127131Snectaralgorithm B<1> and its Apache variant B<apr1> are available.
28127131Snectar
29127131Snectar=head1 OPTIONS
30127131Snectar
31127131Snectar=over 4
32127131Snectar
33127131Snectar=item B<-crypt>
34127131Snectar
35127131SnectarUse the B<crypt> algorithm (default).
36127131Snectar
37127131Snectar=item B<-1>
38127131Snectar
39127131SnectarUse the MD5 based BSD password algorithm B<1>.
40127131Snectar
41276864Sjkim=item B<-apr1>
42276864Sjkim
43127131SnectarUse the B<apr1> algorithm (Apache variant of the BSD algorithm).
44127131Snectar
45215698Ssimon=item B<-salt> I<string>
46215698Ssimon
47215698SsimonUse the specified salt.
48215698Ssimon
49142429Snectar=item B<-in> I<file>
50215698Ssimon
51142429SnectarRead passwords from I<file>.
52142429Snectar
53276864Sjkim=item B<-stdin>
54276864Sjkim
55276864SjkimRead passwords from B<stdin>.
56127131Snectar
57276864Sjkim=item B<-quiet>
58276864Sjkim
59276864SjkimDon't output warnings when passwords given at the command line are truncated.
60276864Sjkim
61276864Sjkim=item B<-table>
62276864Sjkim
63215698SsimonIn the output list, prepend the cleartext password and a TAB character
64276864Sjkimto each password hash.
65276864Sjkim
66276864Sjkim=back
67276864Sjkim
68276864Sjkim=head1 EXAMPLES
69215698Ssimon
70276864SjkimB<openssl passwd -crypt -salt xx password> prints B<xxj31ZMTZzkVA>.
71127131Snectar
72127131SnectarB<openssl passwd -1 -salt xxxxxxxx password> prints B<$1$xxxxxxxx$8XJIcl6ZXqBMCK0qFevqT1>.
73127131Snectar
74127131SnectarB<openssl passwd -apr1 -salt xxxxxxxx password> prints B<$apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0>.
75127131Snectar
76127131Snectar=cut
77127131Snectar