Provided by: whois_5.5.22_amd64 bug

NAME

       mkpasswd - Overfeatured front end to crypt(3)

SYNOPSIS

       mkpasswd PASSWORD [SALT]

DESCRIPTION

       mkpasswd encrypts the given password with the crypt(3) libc function, using the given salt.

OPTIONS

       -S, --salt=STRING
              Use  the  STRING  as salt. If it begins with $ then it will be passed straight to crypt(3) without
              any checks.

       -R, --rounds=NUMBER
              Use NUMBER rounds. This argument is ignored if the method chosen does not support variable rounds.
              For  the  OpenBSD  Blowfish method this is the logarithm of the number of rounds.  The behavior is
              undefined if this option is used without --method.

       -m, --method=TYPE
              Compute the password using the TYPE method.  If TYPE is help then the list of available methods is
              printed.   If  TYPE begins and end with $ characters then the string is passed to crypt_gensalt(3)
              as-is.

       -5     Like --method=md5crypt.

       -P NUM, --password-fd=NUM
              Read the password from file descriptor NUM instead of using getpass(3).  If the file descriptor is
              not connected to a tty then no other text than the hashed password is printed on stdout.

       -s, --stdin
              Like --password-fd=0.

ENVIRONMENT

       MKPASSWD_OPTIONS
              A list of options which will be evaluated before the ones specified on the command line.

BUGS

       If  the  --stdin  option  is  used  then  passwords  containing  some  control characters may not be read
       correctly.

       This program suffers of a bad case of featuritis.

SEE ALSO

       passwd(1), passwd(5), crypt(3), crypt(5), crypt_gensalt(3), getpass(3).

AUTHOR

       mkpasswd and this man page were written by Marco d'Itri <md@linux.it> and are licensed under the terms of
       the GNU General Public License, version 2 or later.