Annotation of src/usr.bin/encrypt/encrypt.1, Revision 1.25
1.25 ! tedu 1: .\" $OpenBSD: encrypt.1,v 1.24 2014/09/03 07:47:50 giovanni Exp $
1.1 downsj 2: .\"
3: .\" Copyright (c) 1996, Jason Downs. All rights reserved.
4: .\"
5: .\" Redistribution and use in source and binary forms, with or without
6: .\" modification, are permitted provided that the following conditions
7: .\" are met:
8: .\" 1. Redistributions of source code must retain the above copyright
9: .\" notice, this list of conditions and the following disclaimer.
10: .\" 2. Redistributions in binary form must reproduce the above copyright
11: .\" notice, this list of conditions and the following disclaimer in the
12: .\" documentation and/or other materials provided with the distribution.
13: .\"
14: .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
15: .\" OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
16: .\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
17: .\" DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
18: .\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
19: .\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
20: .\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
21: .\" CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22: .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23: .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24: .\" SUCH DAMAGE.
25: .\"
1.25 ! tedu 26: .Dd $Mdocdate: September 3 2014 $
1.1 downsj 27: .Dt ENCRYPT 1
1.11 aaron 28: .Os
1.1 downsj 29: .Sh NAME
30: .Nm encrypt
1.4 downsj 31: .Nd encrypt passwords from the command line or standard input
1.1 downsj 32: .Sh SYNOPSIS
33: .Nm encrypt
1.5 provos 34: .Op Fl b Ar rounds
1.18 millert 35: .Op Fl c Ar class
1.19 jmc 36: .Op Fl p | Ar string
1.1 downsj 37: .Sh DESCRIPTION
1.12 aaron 38: .Nm
1.1 downsj 39: prints the encrypted form of
40: .Ar string
1.15 aaron 41: to the standard output.
42: This is mostly useful for encrypting passwords from within scripts.
1.1 downsj 43: .Pp
1.13 aaron 44: The options are as follows:
1.16 aaron 45: .Bl -tag -width Ds
1.5 provos 46: .It Fl b Ar rounds
1.23 tedu 47: Encrypt the string using Blowfish hashing with the specified number of
1.5 provos 48: .Ar rounds .
1.23 tedu 49: May also specify 'a' to request a variable number of rounds scaled to the
50: machine's CPU capabilities.
1.18 millert 51: .It Fl c Ar class
52: Use the cipher type specified in the given user login class.
53: See
54: .Xr login.conf 5
55: for more information.
1.10 alex 56: .It Fl p
57: Prompt for a single string with echo turned off.
1.1 downsj 58: .El
59: .Pp
60: If no
61: .Ar string
62: is specified,
1.12 aaron 63: .Nm
1.25 ! tedu 64: reads one string per line from standard input, encrypting each one.
1.18 millert 65: In the case where no specific algorithm or specific user login class was given
66: as a command line option, the algorithm specified in the default class in
1.17 millert 67: .Pa /etc/login.conf
68: will be used.
1.5 provos 69: .Pp
1.24 giovanni 70: For Blowfish, a new random salt is automatically generated for each
1.5 provos 71: password.
72: .Pp
1.11 aaron 73: Specifying the
1.3 downsj 74: .Ar string
75: on the command line should be discouraged; using the
76: standard input is more secure.
1.5 provos 77: .Sh FILES
1.17 millert 78: .Bl -tag -width /etc/login.conf -compact
79: .It Pa /etc/login.conf
1.5 provos 80: .El
1.1 downsj 81: .Sh SEE ALSO
1.25 ! tedu 82: .Xr crypt_newhash 3 ,
1.17 millert 83: .Xr login.conf 5
1.1 downsj 84: .Sh HISTORY
1.12 aaron 85: .Nm
1.6 millert 86: first appeared in
87: .Ox 1.2 .