[BACK]Return to encrypt.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / encrypt

Annotation of src/usr.bin/encrypt/encrypt.1, Revision 1.25

1.25    ! tedu        1: .\"    $OpenBSD: encrypt.1,v 1.24 2014/09/03 07:47:50 giovanni Exp $
1.1       downsj      2: .\"
                      3: .\" Copyright (c) 1996, Jason Downs.  All rights reserved.
                      4: .\"
                      5: .\" Redistribution and use in source and binary forms, with or without
                      6: .\" modification, are permitted provided that the following conditions
                      7: .\" are met:
                      8: .\" 1. Redistributions of source code must retain the above copyright
                      9: .\"    notice, this list of conditions and the following disclaimer.
                     10: .\" 2. Redistributions in binary form must reproduce the above copyright
                     11: .\"    notice, this list of conditions and the following disclaimer in the
                     12: .\"    documentation and/or other materials provided with the distribution.
                     13: .\"
                     14: .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
                     15: .\" OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
                     16: .\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
                     17: .\" DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
                     18: .\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
                     19: .\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
                     20: .\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
                     21: .\" CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     22: .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     23: .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     24: .\" SUCH DAMAGE.
                     25: .\"
1.25    ! tedu       26: .Dd $Mdocdate: September 3 2014 $
1.1       downsj     27: .Dt ENCRYPT 1
1.11      aaron      28: .Os
1.1       downsj     29: .Sh NAME
                     30: .Nm encrypt
1.4       downsj     31: .Nd encrypt passwords from the command line or standard input
1.1       downsj     32: .Sh SYNOPSIS
                     33: .Nm encrypt
1.5       provos     34: .Op Fl b Ar rounds
1.18      millert    35: .Op Fl c Ar class
1.19      jmc        36: .Op Fl p | Ar string
1.1       downsj     37: .Sh DESCRIPTION
1.12      aaron      38: .Nm
1.1       downsj     39: prints the encrypted form of
                     40: .Ar string
1.15      aaron      41: to the standard output.
                     42: This is mostly useful for encrypting passwords from within scripts.
1.1       downsj     43: .Pp
1.13      aaron      44: The options are as follows:
1.16      aaron      45: .Bl -tag -width Ds
1.5       provos     46: .It Fl b Ar rounds
1.23      tedu       47: Encrypt the string using Blowfish hashing with the specified number of
1.5       provos     48: .Ar rounds .
1.23      tedu       49: May also specify 'a' to request a variable number of rounds scaled to the
                     50: machine's CPU capabilities.
1.18      millert    51: .It Fl c Ar class
                     52: Use the cipher type specified in the given user login class.
                     53: See
                     54: .Xr login.conf 5
                     55: for more information.
1.10      alex       56: .It Fl p
                     57: Prompt for a single string with echo turned off.
1.1       downsj     58: .El
                     59: .Pp
                     60: If no
                     61: .Ar string
                     62: is specified,
1.12      aaron      63: .Nm
1.25    ! tedu       64: reads one string per line from standard input, encrypting each one.
1.18      millert    65: In the case where no specific algorithm or specific user login class was given
                     66: as a command line option, the algorithm specified in the default class in
1.17      millert    67: .Pa /etc/login.conf
                     68: will be used.
1.5       provos     69: .Pp
1.24      giovanni   70: For Blowfish, a new random salt is automatically generated for each
1.5       provos     71: password.
                     72: .Pp
1.11      aaron      73: Specifying the
1.3       downsj     74: .Ar string
                     75: on the command line should be discouraged; using the
                     76: standard input is more secure.
1.5       provos     77: .Sh FILES
1.17      millert    78: .Bl -tag -width /etc/login.conf -compact
                     79: .It Pa /etc/login.conf
1.5       provos     80: .El
1.1       downsj     81: .Sh SEE ALSO
1.25    ! tedu       82: .Xr crypt_newhash 3 ,
1.17      millert    83: .Xr login.conf 5
1.1       downsj     84: .Sh HISTORY
1.12      aaron      85: .Nm
1.6       millert    86: first appeared in
                     87: .Ox 1.2 .