]> &title; &package; &firstname; &surname; Code and documentation.
&email;
Gabor Z. papp Testing.
gzp@papp.hu
2012 &firstname; &surname; <&email;> This manual page was written for the DeforaOS project (and may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 3 as published by the Free Software Foundation.
&name; §ion; &name; &purpose; &name; &name; Description &name; is a program that generates pseudo-random passwords of a desired length and, if so desired, along with their corresponding hashes for a given encryption algorithm. Options The following options are available: In this operation mode, &name; enumerates through all possible values for a password, given the list of characters allowed and the length specified. Sets the string of characters allowed within passwords, when generating them randomly. Apply a specific hashing algorithm to the password generated. The list of passwords currently supported is: base64 (always supported) blowfish (Blowfish) des (single DES) md5 (MD5, always supported) sha1 (SHA-1) sha256 (SHA-256) shmd5 (shadow MD5) none (always supported) For the algorithms not explicitly mentioned as always supported, their availability depends on the implementation of the crypt 3 library on the system where &name; was compiled. Force a number of iterations to be performed when hashing passwords, for algorithms effectively supporting it. It otherwise defaults to a random value, in a range considered reasonable for the hashing algorithm selected. Force a number of iterations to be performed when hashing passwords, for algorithms effectively supporting it. It otherwise defaults to a random value, in a range considered reasonable for the hashing algorithm selected. Force the passwords generated to be of a fixed length. Maximum length for the passwords generated. Minimum length for the passwords generated. Total number of passwords to generate. When not set, it defaults to only one, except in enumeration mode where it processes the complete range of possibilities until exhaustion. Force a given value for the password generated. This is useful when generating hashes for pre-determined passwords. Do not seed the PRNG (pseudo-random number generator) ourselves. With this option set, the entropy pool is often not initialized, and the passwords generated predictable as a result. Use this option carefully, when you know that either the system does provide better entropy than &name;, or that it hurts performance in a situation where entropy is not required. Force a given value when salting the resulting password hash. This is only useful when selecting a hashing algorithm that effectively uses salt. Bugs Issues can be listed and reported at . See also login 1 , passwd 1