pwhash(1) 맨 페이지 - 윈디하나의 솔라나라

개요

섹션
맨 페이지 이름
검색(S)

pwhash(1)

pwhash(1)                        User Commands                       pwhash(1)



NAME
       pwhash - generate password hashes

SYNOPSIS
       pwhash [-a algorithm | -s salt] [-u user]

DESCRIPTION
       With  no arguments, pwhash prompts for input (and confirms it) and gen‐
       erates  a  password  hash  by  using  crypt_gensalt(3C)   followed   by
       crypt(3C), and then displays the generated hash on stdout.


       If  input is redirected from stdin then that is used instead. The pass‐
       word is only required once on stdin. When reading from  stdin,  if  the
       last character is a newline, it is discarded.

OPTIONS
       The following options are supported:

       -a algorithm
       --algorithm=algorithm

           Specifies  a  preference for the algorithm. If the algorithm is not
           allowed or does not exist, an error is shown.

           The values are as  per  the  key  in  crypt.conf(5).  For  example,
           __unix__, 1, md5, 2a, 5, or 6.



       -s salt
       --salt=salt

           Full  specification of the algorithm and salt. This option bypasses
           the crypt_gensalt(3C) call and instead  passes  the  supplied  salt
           directly to crypt(3C). This option is mutually exclusive with -a.



       -u user
       --user=user

           Specifies the username to be used with crypt_gensalt(3C). Note that
           while the API allows for it, no current plugins delivered with Ora‐
           cle Solaris for crypt_gensalt(3C) make use of this.

           If  the  user is not found then an error is returned and no hash is
           generated.



       -h
       --help

           Displays the usage message.



EXAMPLES
       Example 1 Generating a SHA256 Based Hash Typing in the Password



       The following example generates a SHA256 based hash typing in the pass‐
       word.



         $ pwhash -a 5
         Password:
         Re-enter Password:
         $5$DA/w/BgH$cB394/iYqj6pk/J6W0smfmKsGrYSGeWUvHsIMnUaZh.


       Example 2 Generating a Hash Using stdin



       The  following  example  generates  a  hash by using the system default
       algorithm using stdin.



         $ pwhash <<EOM
         Ap@ssW0rdOnStdIN
         EOM
         $5$abaev.V6$9uyBXruzgbZn/OhqtIbvrjHpuoyDFbkQkJ47pdZA/JC


       Example 3 Generating a Hash Using an Existing Salt Specification



       The following example generates a hash by using an existing salt speci‐
       fication.



         $ pwhash -s '$5$abaev.V6$'
         Password:
         Re-enter Password:
         $5$abaev.V6$0pPY.0X/4tsis67eCsMdJ63NO9cfHKokKvjtTOQ80jA


       Example 4 Attempting to Generate a Hash Using a Deprecated Algorithm



       The following example attempts to generate a hash by using a deprecated
       algorithm



         $ pwhash -a __unix__
         Requested algorithm not allowed by current crypt policy, see
         policy.conf(5).


ATTRIBUTES
       See attributes(7) for descriptions of the following attributes:


       tab() box; cw(2.75i) |cw(2.75i) lw(2.75i) |lw(2.75i) ATTRIBUTE  TYPEAT‐
       TRIBUTE VALUE _ Interface StabilityCommitted


SEE ALSO
       crypt(3C), crypt_gensalt(3C), crypt.conf(5), policy.conf(5)

HISTORY
       The pwhash command was added to Oracle Solaris in Solaris 11.3.3.



Oracle Solaris 11.4               21 Jun 2021                        pwhash(1)
맨 페이지 내용의 저작권은 맨 페이지 작성자에게 있습니다.
RSS ATOM XHTML 5 CSS3