Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

openssl-passwd(1ssl) [osx man page]

PASSWD(1SSL)							      OpenSSL							      PASSWD(1SSL)

NAME
openssl-passwd, passwd - compute password hashes SYNOPSIS
openssl passwd [-help] [-crypt] [-1] [-apr1] [-aixmd5] [-5] [-6] [-salt string] [-in file] [-stdin] [-noverify] [-quiet] [-table] [-rand file...] [-writerand file] {password} DESCRIPTION
The passwd command computes the hash of a password typed at run-time or the hash of each password in a list. The password list is taken from the named file for option -in file, from stdin for option -stdin, or from the command line, or from the terminal otherwise. The Unix standard algorithm crypt and the MD5-based BSD password algorithm 1, its Apache variant apr1, and its AIX variant are available. OPTIONS
-help Print out a usage message. -crypt Use the crypt algorithm (default). -1 Use the MD5 based BSD password algorithm 1. -apr1 Use the apr1 algorithm (Apache variant of the BSD algorithm). -aixmd5 Use the AIX MD5 algorithm (AIX variant of the BSD algorithm). -5 -6 Use the SHA256 / SHA512 based algorithms defined by Ulrich Drepper. See <https://www.akkadia.org/drepper/SHA-crypt.txt>. -salt string Use the specified salt. When reading a password from the terminal, this implies -noverify. -in file Read passwords from file. -stdin Read passwords from stdin. -noverify Don't verify when reading a password from the terminal. -quiet Don't output warnings when passwords given at the command line are truncated. -table In the output list, prepend the cleartext password and a TAB character to each password hash. -rand file... A file or files containing random data used to seed the random number generator. Multiple files can be specified separated by an OS- dependent character. The separator is ; for MS-Windows, , for OpenVMS, and : for all others. [-writerand file] Writes random data to the specified file upon exit. This can be used with a subsequent -rand flag. EXAMPLES
% openssl passwd -crypt -salt xx password xxj31ZMTZzkVA % openssl passwd -1 -salt xxxxxxxx password $1$xxxxxxxx$UYCIxa628.9qXjpQCjM4a. % openssl passwd -apr1 -salt xxxxxxxx password $apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0 % openssl passwd -aixmd5 -salt xxxxxxxx password xxxxxxxx$8Oaipk/GPKhC64w/YVeFD/ COPYRIGHT
Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>. 1.1.1a 2018-12-18 PASSWD(1SSL)

Check Out this Related Man Page

crypt_sunmd5(5) 					Standards, Environments, and Macros					   crypt_sunmd5(5)

NAME
crypt_sunmd5 - password hashing module using MD5 message hash algorithm SYNOPSIS
/usr/lib/security/$ISA/crypt_sunmd5.so DESCRIPTION
The crypt_sunmd5 module is a one-way password hashing module for use with crypt(3C) that uses the MD5 message hash algorithm. The algorithm identifier for crypt.conf(4) and policy.conf(4) is md5. This module is designed to make it difficult to crack passwords that use brute force attacks based on high speed MD5 implementations that use code inlining, unrolled loops, and table lookup. The maximum password length for crypt_sunmd5 is 255 characters. The following options can be passed to the module by means of crypt.conf(4): rounds=<positive_number> Specifies the number of additional rounds of MD5 to use in generation of the salt; the default number of rounds is 4096. Negative val- ues have no effect and are ignored, that is, the number of rounds cannot be lowered below 4096. The number of additional rounds is stored in the salt string returned by crypt_gensalt(3C). For example: $md5,rounds=1000$nlxmTTpz$ When crypt_gensalt(3C) is being used to generate a new salt, if the number of additional rounds configured in crypt.conf(4) is greater than that in the old salt, the value from crypt.conf(4) is used instead. This allows for migration to stronger (but more time-consum- ing) salts on password change. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |MT-Level |Safe | +-----------------------------+-----------------------------+ SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol- icy.conf(4), attributes(5) SunOS 5.10 23 Dec 2003 crypt_sunmd5(5)
Man Page