Provided by: whois_5.5.13_amd64
mkpasswd - Overfeatured front end to crypt(3)
mkpasswd PASSWORD [SALT]
mkpasswd encrypts the given password with the crypt(3) libc function, using the given salt.
-S, --salt=STRING Use the STRING as salt. If it begins with $ then it will be passed straight to crypt(3) without any checks. -R, --rounds=NUMBER Use NUMBER rounds. This argument is ignored if the method chosen does not support variable rounds. For the OpenBSD Blowfish method this is the logarithm of the number of rounds. The behavior is undefined if this option is used without --method. -m, --method=TYPE Compute the password using the TYPE method. If TYPE is help then the list of available methods is printed. If TYPE begins and end with $ characters then the string is passed to crypt_gensalt(3) as-is. -5 Like --method=md5crypt. -P NUM, --password-fd=NUM Read the password from file descriptor NUM instead of using getpass(3). If the file descriptor is not connected to a tty then no other text than the hashed password is printed on stdout. -s, --stdin Like --password-fd=0.
MKPASSWD_OPTIONS A list of options which will be evaluated before the ones specified on the command line.
If the --stdin option is used then passwords containing some control characters may not be read correctly. This program suffers of a bad case of featuritis.
passwd(1), passwd(5), crypt(3), crypt(5), crypt_gensalt(3), getpass(3).
mkpasswd and this man page were written by Marco d'Itri <firstname.lastname@example.org> and are licensed under the terms of the GNU General Public License, version 2 or higher.