table of contents
MKPASSWD(1) | Debian GNU/Linux | MKPASSWD(1) |
NAME¶
mkpasswd - Overfeatured front end to crypt(3)
SYNOPSIS¶
mkpasswd PASSWORD [SALT]
DESCRIPTION¶
mkpasswd encrypts the given password with the crypt(3) libc function, using the given salt.
OPTIONS¶
- -S, --salt=STRING
- Use the STRING as salt. If it begins with $ then it will be passed straight to crypt(3) without any checks.
- -R, --rounds=NUMBER
- Use NUMBER rounds. This argument is ignored if the method chosen does not support variable rounds. For the OpenBSD Blowfish method this is the logarithm of the number of rounds. The behavior is undefined if this option is used without --method.
- -m, --method=TYPE
- Compute the password using the TYPE method. If TYPE is help then the list of available methods is printed. If TYPE begins and end with $ characters then the string is passed to crypt_gensalt(3) as-is.
- -5
- Like --method=md5crypt.
- -P
- NUM, --password-fd=NUM Read the password from file descriptor NUM instead of using getpass(3). If the file descriptor is not connected to a tty then no other text than the hashed password is printed on stdout.
- -s, --stdin
- Like --password-fd=0.
ENVIRONMENT¶
- MKPASSWD_OPTIONS
- A list of options which will be evaluated before the ones specified on the command line.
BUGS¶
If the --stdin option is used then passwords containing some control characters may not be read correctly.
This programs suffers of a bad case of featuritis.
SEE ALSO¶
passwd(1), passwd(5), crypt(3), crypt(5), crypt_gensalt(3), getpass(3).
AUTHOR¶
mkpasswd and this man page were written by Marco d'Itri <md@linux.it> and are licensed under the terms of the GNU General Public License, version 2 or higher.
2019-12-30 | Marco d'Itri |